Search results

Jump to navigation Jump to search

Page title matches

  • ==Business-IT Alignment== ...er to develop a few concrete steps that companies can take to better align business and IT, consider the following points.<br> ...
    5 KB (847 words) - 17:07, 25 April 2007
  • ==Information Security Aspects of Business Continuity Management== ...re timely resumption from, and if possible prevention of, interruptions to business activities and processes caused by failures of information systems. ...
    9 KB (1,274 words) - 00:17, 1 June 2007
  • ==Business Impact Analysis== ...size and complexity of the institution. The institution should include all business functions and departments in this process, not just data processing.<br> ...
    3 KB (453 words) - 18:45, 25 April 2007
  • [[Image:BCPLifecycle.gif|Business continuity planning life cycle]] ...t is also called ''business continuity and resiliency planning'' (BCRP). A business continuity plan is a road-map for continuing operations under adverse condi ...
    15 KB (2,046 words) - 11:39, 27 October 2012
  • ==Business Continuity Planning== ...institution back in business. Without a BCP that considers every critical business unit, including personnel, physical workspace, and similar issues, an insti ...
    5 KB (705 words) - 13:42, 30 May 2007
  • ==Motion to exclude computer-generated evidence—Laying business record exception foundation== ...ded by the proponent of the evidence, to establish the requirements of the business record exception. ...
    4 KB (684 words) - 20:10, 22 February 2009

Page text matches

  • ...plementation that reflects the recovery time frame that is required by the business. ...he technology support takes to deliver the recovered infrastructure to the business. ...
    2 KB (237 words) - 11:16, 27 October 2012
  • ...on) in order to avoid unacceptable consequences associated with a break in business continuity. ...able strategy options would include any which would enable resumption of a business process in a time frame at or near the RTO. This would include alternate or ...
    2 KB (272 words) - 11:15, 27 October 2012
  • ...RPO and RTO, RCO defines a measurement for the consistency of distributed business data within interlinked systems after a disaster incident. Similar terms us ...n actual and targeted state of business data across systems for individual business processes or process groups. ...
    2 KB (313 words) - 11:24, 27 October 2012
  • ...o admit computerized records is the business record exception. The Uniform Business Records as Evidence Act is a widely followed statement of this exception: ...d the mode of its preparation, and if it was made in the regular course of business at or near the time of the act, condition or event, and if, in the opinion ...
    1 KB (169 words) - 20:08, 22 February 2009
  • ==Business Impact Analysis== ...size and complexity of the institution. The institution should include all business functions and departments in this process, not just data processing.<br> ...
    3 KB (453 words) - 18:45, 25 April 2007
  • ...met or third parties have inappropriate access to business data stores and business processes.'''<br> Obtain the criteria and business case used for selection of third-party service providers. Assess whether th ...
    2 KB (317 words) - 18:30, 14 June 2006
  • '''DS 11.1 Business Requirements for Data Management '''<br> ...data received from the business are processed, all output required by the business is prepared and delivered, and restart and reprocessing needs are supported ...
    2 KB (244 words) - 17:51, 5 May 2006
  • ...the IT continuity plan is kept up to date and continually reflects actual business requirements. It is essential that changes in procedures and responsibiliti ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with ente ...
    3 KB (436 words) - 14:30, 4 May 2006
  • ...business in strategy and operations, encouraging co-responsibility between business and IT for making strategic decisions and obtaining benefits from IT-enable ...
    3 KB (410 words) - 13:30, 4 May 2006
  • ...met or third parties have inappropriate access to business data stores and business processes.'''<br> ...
    2 KB (297 words) - 14:38, 13 June 2006
  • ...met or third parties have inappropriate access to business data stores and business processes.'''<br> ...
    2 KB (297 words) - 18:29, 13 June 2006
  • ==Business-IT Alignment== ...er to develop a few concrete steps that companies can take to better align business and IT, consider the following points.<br> ...
    5 KB (847 words) - 17:07, 25 April 2007
  • ...Limit your storage amount and retention time to that which is required for business, legal, and/or regulatory purposes, as documented in the data retention pol ...cardholder data (e.g., cardholder data needs to be held for X period for Y business reasons). ...
    3 KB (420 words) - 14:46, 28 February 2007
  • ...leged system commands may disrupt business processes, and corrupt critical business data stores.'''<br> '''3. Risk: Unscheduled access by support vendors may result in business process interruptions or loss of production data.'''<br> ...
    6 KB (821 words) - 18:11, 28 August 2006
  • ...leged system commands may disrupt business processes, and corrupt critical business data stores.'''<br> '''3. Risk: Unscheduled access by support vendors may result in business process interruptions or loss of production data.'''<br> ...
    6 KB (766 words) - 13:42, 23 June 2006
  • ...leged system commands may disrupt business processes, and corrupt critical business data stores.'''<br> '''3. Risk: Unscheduled access by support vendors may result in business process interruptions or loss of production data.'''<br> ...
    6 KB (816 words) - 13:41, 23 June 2006
  • ...leged system commands may disrupt business processes, and corrupt critical business data stores.'''<br> '''3. Risk: Unscheduled access by support vendors may result in business process interruptions or loss of production data.'''<br> ...
    7 KB (901 words) - 13:44, 23 June 2006
  • ...leged system commands may disrupt business processes, and corrupt critical business data stores.'''<br> '''3. Risk: Unscheduled access by support vendors may result in business process interruptions or loss of production data.'''<br> ...
    6 KB (779 words) - 13:45, 23 June 2006
  • ...met or third parties have inappropriate access to business data stores and business processes.'''<br> ...
    2 KB (294 words) - 18:21, 14 June 2006
  • ...leged system commands may disrupt business processes, and corrupt critical business data stores.'''<br> '''3. Risk: Unscheduled access by support vendors may result in business process interruptions or loss of production data.'''<br> ...
    7 KB (901 words) - 13:43, 23 June 2006
  • '''1. Risk: Unauthorized users might exploit unauthorized access to critical business processes and data.'''<br> '''2. Risk: Unnecessary disruptions to business processes or data corruption may occur.'''<br> ...
    6 KB (729 words) - 13:40, 23 June 2006
  • ...tives, measures, targets and benchmarks, and has them signed off on by the business and other relevant stakeholders.<br> * Business contribution including, but not limited to financials.<br> ...
    3 KB (362 words) - 12:33, 4 May 2006
  • ==Business Continuity Planning== ...institution back in business. Without a BCP that considers every critical business unit, including personnel, physical workspace, and similar issues, an insti ...
    5 KB (705 words) - 13:42, 30 May 2007
  • ...met or third parties have inappropriate access to business data stores and business processes.'''<br> ...
    2 KB (306 words) - 18:32, 14 June 2006
  • ...leged system commands may disrupt business processes, and corrupt critical business data stores.'''<br> '''3. Risk: Unscheduled access by support vendors may result in business process interruptions or loss of production data.'''<br> ...
    7 KB (895 words) - 13:44, 23 June 2006
  • * Business address * Home and business telephone numbers ...
    789 bytes (113 words) - 16:17, 18 February 2009
  • ...e to adjust staffing requirements and sourcing strategies to meet expected business objectives and changing circumstances.<br> ...h potential impact to financial reporting bypass processes for identifying business requirements, risks, and for designing needed controls.'''<br> ...
    4 KB (583 words) - 12:06, 23 June 2006
  • ...ce providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...ce providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    3 KB (408 words) - 16:10, 25 June 2006
  • ...ibility and alternative courses of action and make a recommendation to the business sponsor.<br> ...
    2 KB (357 words) - 14:15, 3 May 2006
  • ...tages. Each sign-off follows successful completion of quality reviews. The business sponsor has the final decision with respect to choice of solution and acqui ...
    2 KB (288 words) - 14:17, 3 May 2006
  • '''AI 1.1 Definition and Maintenance of Business Functional and Technical Requirements'''<br> ...d include any changes required to the nature of the enterprise’s business, business processes, people skills and competencies, organization structure, and the ...
    4 KB (538 words) - 13:16, 23 June 2006
  • ...ines Company objectives for establishing specific standards on appropriate business use of the Company's information and telecommunications systems and equipme ...ager, voice mail and fax, are provided for official and authorized Company business purposes. Any use of such systems and equipment perceived to be illegal, ha ...
    3 KB (464 words) - 17:48, 14 January 2014
  • Admissibility of Computerized Business Records, 14 Am. Jur. Proof of Facts 2d 173. ...
    266 bytes (41 words) - 16:55, 1 March 2009
  • ...rganizational level, so the management of security actions is in line with business requirements. ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with ente ...
    3 KB (394 words) - 17:12, 22 March 2007
  • Define and implement physical security measures in line with business requirements. Measures should include, but are not limited to, the layout o ...ce providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    4 KB (517 words) - 18:12, 21 June 2006
  • See Admissibility of Computerized Business Records, 14 Am. Jur. Proof of Facts 2d 173, for an example of laying the fo ...
    286 bytes (42 words) - 17:13, 1 March 2009
  • * [[KY E-BUSINESS CONTROLS:|'''E-BUSINESS CONTROLS''']] ...
    924 bytes (100 words) - 20:14, 25 June 2006
  • * [[GA E-BUSINESS CONTROLS:|'''E-BUSINESS CONTROLS''']] ...
    923 bytes (100 words) - 20:08, 25 June 2006
  • * [[LA E-BUSINESS CONTROLS:|'''E-BUSINESS CONTROLS''']] ...
    925 bytes (100 words) - 20:09, 25 June 2006
  • * [[TX E-BUSINESS CONTROLS:|'''E-BUSINESS CONTROLS''']] ...
    921 bytes (100 words) - 20:10, 25 June 2006
  • * [[WI E-BUSINESS CONTROLS:|'''E-BUSINESS CONTROLS''']] ...
    925 bytes (100 words) - 20:11, 25 June 2006
  • ...met or third parties have inappropriate access to business data stores and business processes.'''<br> ...
    3 KB (379 words) - 18:17, 14 June 2006
  • ...aknesses in internal control and oversight, and their actual and potential business impact. The enterprise’s IT risk position should be transparent to all stak ...
    2 KB (334 words) - 13:36, 4 May 2006
  • * [[FL E-BUSINESS CONTROLS:|'''E-BUSINESS CONTROLS''']] ...
    928 bytes (100 words) - 20:06, 25 June 2006
  • ...e.g., one to four hours, four to 24 hours, more than 24 hours and critical business operational periods. ITIL 7.3 The business continuity life cycle.<br> ...
    2 KB (303 words) - 18:16, 25 April 2007
  • ...the Company objectives for establishing specific standards on appropriate business use of the Company's information and telecommunications systems and equipme ...ager, voice mail and fax, are provided for official and authorized Company business purposes. Any use of such systems and equipment perceived to be illegal, ha ...
    4 KB (507 words) - 14:58, 21 January 2014
  • Translate business requirements into a high-level design specification for software developmen ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with ente ...
    2 KB (323 words) - 15:09, 3 May 2006
  • ...ce providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    2 KB (295 words) - 15:33, 25 June 2006
  • ...ftware|software]] and [[Computer hardware|hardware]] that are found in the business environment. ...organization is enforced by the compliance industry by companies such as [[Business Software Alliance]], [[SIIA]] and [[Federation Against Software Theft|FAST] ...
    5 KB (705 words) - 13:29, 23 May 2007
  • ...ns. The design and implementation of the information system supporting the business process can be crucial for security. Security requirements should be identi ...of a project and justified, agreed, and documented as part of the overall business case for an information system.<br> ...
    5 KB (649 words) - 18:23, 5 May 2006
  • ...ce providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    2 KB (291 words) - 16:02, 25 June 2006
  • Sufficiency of description of business records under Fourth Amendment requirement of particularity in federal warr ...
    374 bytes (49 words) - 11:18, 3 March 2009
  • ...eminated to all relevant system users (including vendors, contractors, and business partners). ...is reviewed at least annually and updated as needed to reflect changes to business objectives or the risk environment. ...
    2 KB (296 words) - 14:47, 2 March 2007
  • ...t and asset management, or enterprise-wide activities such as security and business continuity planning. This dual role and the increasing use of technology ra ...le of aligning its IT infrastructure to support its business strategy adds value to its organization and positions itself for sustained success. The board o ...
    5 KB (645 words) - 18:03, 27 April 2007
  • ==Information Security Aspects of Business Continuity Management== ...re timely resumption from, and if possible prevention of, interruptions to business activities and processes caused by failures of information systems. ...
    9 KB (1,274 words) - 00:17, 1 June 2007
  • ...st model. IT services should be linked to business processes such that the business can identify associated service billing levels. ...
    2 KB (243 words) - 14:06, 5 May 2006
  • [[Business_Continuity_Management: | Business Continuity Considerations]]<br> ...
    431 bytes (45 words) - 13:31, 10 April 2007
  • ...ormation assets are consistently available to conduct business and support business operations. ...modified business application must include a Security Impact Statement and Business Impact Analysis. ...
    5 KB (646 words) - 21:03, 15 January 2014
  • Fenwick & Davidson, Use of Computerized Business Records as Evidence, 19 Jurimetrics J 19 (no. 1 1978). ...
    365 bytes (43 words) - 17:08, 1 March 2009
  • ...on of IT services by helping organizations match their IT resources to the business demands. The high-level activities are Application Sizing, Workload Managem ...
    352 bytes (43 words) - 15:46, 20 March 2007
  • ...ce providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ITIL The Business Perspective, Supplier Relationship Management<br> ...
    3 KB (366 words) - 18:00, 25 April 2007
  • ...y Program that empowers the Program to manage Information Security-related business risks.<br> ...Standard for information assets will be provided only to meet an approved business need or perform prescribed job responsibilities to comply with ISO Organiza ...
    2 KB (202 words) - 12:40, 15 June 2007
  • ...ns. The design and implementation of the information system supporting the business process can be crucial for security. Security requirements should be identi ...of a project and justified, agreed, and documented as part of the overall business case for an information system.<br> ...
    5 KB (730 words) - 19:05, 17 April 2007
  • ...esults or do not meet usability requirements. A project that does not meet business requirements for internal controls at a milestone may continue without revi ::'''2. Risk: A project that has been implemented fails to meet the business needs.'''<br> ...
    3 KB (394 words) - 11:59, 23 June 2006
  • ...he importance of IT within the enterprise, specifically its criticality to business strategy and the level of operational dependence on IT. The reporting line ITIL Business Perspective.<br> ...
    3 KB (393 words) - 17:18, 1 May 2006
  • '''ME 4.3 Value Delivery'''<br> ...approach to portfolio, program and project management, insisting that the business takes ownership of all IT-enabled investments and IT ensures optimization o ...
    3 KB (393 words) - 14:35, 21 June 2006
  • ...ficient manner on a continual basis. Ensure contracts conform to universal business standards in accordance with legal and regulatory requirements. Risk manage ...ce providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    7 KB (958 words) - 16:01, 25 June 2006
  • ...ritization of IT-enabled investment programs in line with the enterprise’s business strategy and priorities; Track status of projects and resolve resource conf ::'''1. Risk: nformation security and business requirements may be compromised. Inaccurate results are produced.'''<br> ...
    4 KB (506 words) - 20:00, 25 June 2006
  • ...dents and thus to minimize the adverse impact of incidents and problems on business that are caused by errors within the IT infrastructure, and to prevent recu ...rn the service to normal level as soon as possible, with smallest possible business impact. ...
    3 KB (480 words) - 16:20, 20 March 2007
  • ==PO 1.2 Business-IT Alignment== ...tegy) is critically dependent on IT and mediate between imperatives of the business and the technology, so agreed priorities can be established.<br> ...
    9 KB (1,301 words) - 16:55, 25 April 2007
  • ...ramework breaks policy into a hierarchical structure which is traceable to business needs and is based on:'''<br> Company business and interests.'''<br> ...
    2 KB (318 words) - 16:08, 3 August 2006
  • ...ramework breaks policy into a hierarchical structure which is traceable to business needs and is based on:'''<br> Company business and interests.'''<br> ...
    2 KB (322 words) - 16:10, 3 August 2006
  • ...rganization’s change management procedure. Include periodic review against business needs, patch management and upgrade strategies, risks, vulnerabilities asse ...ns. The design and implementation of the information system supporting the business process can be crucial for security. Security requirements should be identi ...
    6 KB (819 words) - 13:54, 23 June 2006
  • ...esults or do not meet usability requirements. A project that does not meet business requirements for internal controls at a milestone may continue without revi ...
    3 KB (354 words) - 13:39, 22 June 2006
  • ...ands IT recovery times and the necessary technology investments to support business recovery and resumption needs. ...
    2 KB (294 words) - 14:52, 4 May 2006
  • ...ns. The design and implementation of the information system supporting the business process can be crucial for security. Security requirements should be identi ...of a project and justified, agreed, and documented as part of the overall business case for an information system.<br> ...
    5 KB (738 words) - 20:24, 1 May 2006
  • ...al conditions such as support issues and upgrades, periodic review against business needs, risks and security requirements.<br> ::'''1. Risk: In-House and or Package applications may not meet all business and application control requirements.'''<br> ...
    6 KB (878 words) - 13:34, 23 June 2006
  • == Requirement 7: Restrict access to data by business need-to-know. == ...
    638 bytes (92 words) - 16:45, 7 July 2006
  • ITIL The Business Perspective.<br> ITIL 2.9 Business change The Business Perspective.<br> ...
    3 KB (424 words) - 17:01, 21 June 2006
  • ...appropriate remedial action should be taken and, if necessary, the program business case should be updated.<br> ...
    2 KB (303 words) - 18:29, 1 May 2006
  • ...ime is known as business activity monitoring. KPIs are frequently used to "value" difficult to measure activities such as the benefits of leadership develop ...he school understand its position in the educational community, whereas a business might consider the percentage of income from return customers as a potentia ...
    5 KB (786 words) - 16:48, 22 March 2007
  • ...of the existing plans and information systems in terms of contribution to business objectives, functionality, stability, complexity, costs, strengths and weak :::Projections of future capacity requirements should take account of new business and system requirements and current and projected trends in the organizatio ...
    4 KB (586 words) - 01:37, 1 May 2006
  • ...ated infrastructure, facilities, hardware, software and services satisfies business requirements.<br> ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with ente ...
    3 KB (442 words) - 13:59, 23 June 2006
  • ...the table of contents or executive overview of the strategic plan for the business and information systems.'''<br> ...
    2 KB (354 words) - 20:12, 25 June 2006
  • :*'''[[Business Continuity Management:|'''Business Continuity Management''']]<br> ...es for Information Security standards that are required to comply with ISO Business Continuity Management objectives and support the objectives established in ...
    8 KB (1,023 words) - 17:25, 24 October 2006
  • ...services and disseminating fictitious testimonials over the internet, the business engaged in false advertising in violation of the consumer protection law. S ...
    551 bytes (77 words) - 12:10, 18 February 2009
  • ...er of competent IT staff. Staffing takes into consideration co-location of business/IT staff, cross-functional training, job rotation and outsourcing opportuni ...
    2 KB (309 words) - 18:13, 1 May 2006
  • ...own under several titles (often interpreted as having increasing levels of business relevance) including: ...ir ICT requirements. A Service Desk seeks to facilitate the integration of business processes into the Service Management infrastructure. In addition to active ...
    4 KB (552 words) - 16:15, 20 March 2007
  • ...s record, getting testimony that it was not made in the ordinary course of business is quite valuable to the defense effort. ...
    2 KB (311 words) - 13:50, 22 February 2009
  • ...esults or do not meet usability requirements. A project that does not meet business requirements for internal controls at a milestone may continue without revi ::'''2. Risk: A project that does not meet business requirements for internal controls at a milestone may continue without revi ...
    4 KB (594 words) - 19:50, 25 June 2006
  • Provide the business with procedures and tools enabling it to address its responsibilities for o ITIL The Business Perspective, Roles, Responsibilities and Interfaces.<br> ...
    2 KB (303 words) - 18:06, 1 May 2006
  • ==PO 1.1 IT Value Management== ...ored. Establish fair, transparent, repeatable and comparable evaluation of business cases including financial worth, the risk of not delivering a capability an ...
    6 KB (847 words) - 17:21, 25 April 2007
  • ::* Strategy for business continuity post compromise. ...s a requirement in the event of an actual or suspected compromise, for any business with California residents in their database). ...
    3 KB (357 words) - 20:12, 2 March 2007
  • ...ce providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    3 KB (385 words) - 16:14, 25 June 2006
  • See, generally, Admissibility of Computerized Business Records, 14 Am. Jur. Proof of Facts 2d 173. ...
    535 bytes (79 words) - 17:10, 1 March 2009
  • ==Motion to exclude computer-generated evidence—Laying business record exception foundation== ...ded by the proponent of the evidence, to establish the requirements of the business record exception. ...
    4 KB (684 words) - 20:10, 22 February 2009
  • ...liance. This entity directs IT architecture design ensuring it enables the business strategy and considers regulatory compliance and continuity requirements. T ::'''1. Risk: Systems do not meet business needs because not all business functional and non functional requirements are effectively gathered.'''<br> ...
    3 KB (446 words) - 16:36, 1 May 2006
  • [[Business_Continuity_Management: | Business Continuity Management]] ...
    464 bytes (58 words) - 13:24, 30 April 2007
  • Develop a framework for IT continuity to support enterprise wide business continuity management with a consistent process. The objective of the frame ITIL 7.3 The business continuity life cycle<br> ...
    3 KB (456 words) - 17:15, 15 February 2007
  • ...admissibility of computerized evidence, see Admissibility of Computerized Business Records, 14 Am. Jur. Proof of Facts 2d 173. ...
    625 bytes (91 words) - 12:35, 28 February 2009
  • ::'''1. Risk: Information security and business requirements may be compromised. Inaccurate results are produced.'''<br> ...h potential impact to financial reporting bypass processes for identifying business requirements, risks, and for designing needed controls.'''<br> ...
    3 KB (460 words) - 16:08, 21 June 2006
  • ...a potential impact on the goals or operations of the enterprise, including business, regulatory, legal, technology, trading partner, human resources and operat ...ce providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    3 KB (459 words) - 17:56, 21 June 2006
  • ==AI 4.2 Knowledge Transfer to Business Management== ...de access approval, privilege management, segregation of duties, automated business controls, backup/recovery, physical security and source document archival.< ...
    3 KB (362 words) - 23:55, 14 June 2007
  • ...ntification of irregularities, limitation of losses and timely recovery of business assets.<br> ...
    2 KB (331 words) - 18:47, 1 May 2006
  • ...re specific to IT, enterprise portfolio management, business processes and business change processes. The IT process framework should be integrated in a qualit ::'''1. Risk: Business needs may not be met or adequate data safeguards may not be implemented or ...
    5 KB (699 words) - 19:59, 25 June 2006
  • ...). Verify that the PCI Data Security Standard requirements relevant to the business relationship between the organization and the third party are included in t ::'''PCI-12.8.3:''' Contract provisions include appropriate business continuity provided by the third party such that the third party’s services ...
    3 KB (377 words) - 14:37, 2 March 2007
  • ...ogy manager and should be designed to support the organization's overall [[business plan]]. ** Relationship to overall business strategy ...
    5 KB (777 words) - 17:59, 16 February 2007
  • ...f one or more configuration items (CI's)” Manage approved, cost effective, business enhancing changes (fixes) - with minimum risk to IT infrastructure. The goa ...from seeking imposed efficiency and effectiveness or to enable or reflect business initiatives, or from programmes, projects or service improvement initiative ...
    4 KB (588 words) - 16:23, 21 March 2007
  • ...igure these firewalls to deny or control (if such traffic is necessary for business purposes) any traffic from the wireless environment into the cardholder dat ...and that these firewalls deny or control (if such traffic is necessary for business purposes) any traffic from the wireless environment into the cardholder dat ...
    2 KB (314 words) - 12:16, 16 June 2010
  • .... Issues to be considered include approval that design specifications meet business, functional and technical requirements; approval of change requests; and co ::'''1. Risk: Information security and business requirements may be compromised. Inaccurate results are produced.'''<br> ...
    6 KB (804 words) - 12:14, 23 June 2006
  • ...nstitution (BSI)'s standard in the field of [[Business continuity planning|Business Continuity Management]] (BCM). This standard replaces PAS 56, a publicly av BS 25999 is a Business Continuity Management (BCM) standard published by the British Standards Ins ...
    7 KB (1,040 words) - 10:48, 27 October 2012
  • ...terests inside and outside the IT function, such as the board, executives, business units, individual users, suppliers, security officers, risk managers, the c ITIL The Business Perspective.<br> ...
    2 KB (342 words) - 18:20, 1 May 2006
  • ...ating, managing and controlling programs. This includes clarifying desired business outcomes, ensuring that program objectives support achievement of the outco ...
    3 KB (470 words) - 13:39, 6 March 2007
  • ::'''1. Risk: Systems do not meet business needs because not all business functional and non functional requirements are effectively gathered.'''<br> ITIL The Business Perspective, Managing the Provision of Service.<br> ...
    4 KB (510 words) - 13:54, 1 May 2006
  • ...esults or do not meet usability requirements. A project that does not meet business requirements for internal controls at a milestone may continue without revi ...
    3 KB (365 words) - 19:02, 17 April 2007
  • ...effective risk mitigation tool. Management should balance controls against business operations requirements, cost, efficiency, and effectiveness. ...
    655 bytes (85 words) - 19:15, 17 April 2007
  • ...er and service provider. The framework maintains continuous alignment with business requirements and priorities and facilitates common understanding between th ...h potential impact to financial reporting bypass processes for identifying business requirements, risks, and for designing needed controls.''' ...
    4 KB (524 words) - 15:03, 25 June 2006
  • ...esults or do not meet usability requirements. A project that does not meet business requirements for internal controls at a milestone may continue without revi ...and procedures that are reviewed and updated regularly for changes in the business. When policies and procedures are changed, determine if management approves ...
    4 KB (530 words) - 11:58, 23 June 2006
  • ...ty faced by the non-technically inclined in understanding the computer and business environments involved. Whether the case goes to trial or is disposed of by ...
    911 bytes (148 words) - 15:05, 22 February 2009
  • ...the framework, designed to reduce the impact of a major disruption on key business functions and processes. The plans should address requirements for resilien ISO 11.1 Aspects of [[Business_Continuity_Management: | business continuity management]]. ...
    2 KB (270 words) - 18:10, 25 April 2007
  • ...ance of the deliverables of the previous phase, and approval of an updated business case at the next major review of the program. In the event of overlapping p ::'''1. Risk: In-House and or Package applications may not meet all business and application control requirements.'''<br> ...
    3 KB (390 words) - 12:10, 23 June 2006
  • ...Also identify in the plan which technologies have the potential to create business opportunities. The plan should address systems architecture, technological ...
    3 KB (377 words) - 14:55, 1 May 2006
  • ...vides specific instructions and requirements on the proper and appropriate business use of Electronic Mail Resources. # '''Business Use''' ...
    7 KB (974 words) - 19:34, 16 January 2014
  • Establish a process to monitor business sector/industry, technology, infrastructure, legal and regulatory environme ISO 17799 11.1 Aspects of [[Business_Continuity_Planning_Booklet | business continuity management]].<br> ...
    2 KB (290 words) - 17:49, 25 April 2007
  • ...s rights to systems and data should be in line with defined and documented business needs and job requirements. User access rights are requested by user manage ...ce providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    6 KB (870 words) - 18:08, 21 June 2006
  • ...rs the Information Security Program to manage Information Security-related business risks.<br> :The Acceptable Use Policy defines objectives for ensuring the appropriate business use of information assets.<br> ...
    3 KB (404 words) - 14:53, 25 July 2006
  • Ensure that awareness and understanding of business and IT objectives and direction are communicated throughout the enterprise. ::'''2. Risk: Critical Business Systems may be compromised as the result of the failure of IT security poli ...
    3 KB (442 words) - 18:58, 1 May 2006
  • :[[Business Application Best Practice Configuration Samples:|'''Business Application Best Practice Configuration Samples''']] ...samples and recommendations for applying secure best practices to various business applications.<br> ...
    5 KB (705 words) - 11:39, 30 May 2015
  • ...es addresses how an organization modifies system functionality to help the business meet its financial reporting objectives. Deficiencies in this area could si ...es should be tested to ensure that they achieve the necessary application, business, and user control requirements and that they do not negatively impact exist ...
    10 KB (1,393 words) - 14:28, 23 June 2006
  • ....3:|'''SOX.3.1.3''']] External system connections should be used for valid business purposes only and controls should be in place to prevent these connections ::* PCI-1.1.5 Documented list of services/ports necessary for business. ...
    6 KB (781 words) - 12:31, 23 June 2006
  • ...for backup and restoration of systems, data and documentation in line with business requirements and the continuity plan. Verify compliance with the backup pro ::'''2. Risk: Security and business continuity risks are introduced by technical designs incompatible with ente ...
    3 KB (471 words) - 12:32, 23 June 2006
  • * location and value of any real property owned, and encumbrances thereon; * business background; and ...
    1 KB (184 words) - 13:33, 22 February 2009
  • ...nagement direction and support for information security in accordance with business requirements and all relevant laws, regulations and private certificatory r ...on of trends in and anticipated changes to the organizational environment, business circumstances, and resource availability<br> ...
    8 KB (1,063 words) - 13:25, 23 May 2007
  • ...ganizations to sustain the IT service availability in order to support the business at a justifiable cost. The high-level activities are Realize Availability R ...
    1 KB (154 words) - 15:48, 20 March 2007
  • ...me. Projections of future capacity requirements should take account of new business and system requirements and current and projected trends in the organizatio ...sources. They should identify trends in usage, particularly in relation to business applications or management information system tools. ...
    3 KB (490 words) - 13:42, 4 May 2006
  • ...d defined to provide only the level of access required to meet an approved business need or perform prescribed job responsibilities. Proper identification and ...ote access to information assets will be provided only to meet an approved business need or perform prescribed job responsibilities. Remote access must be faci ...
    5 KB (673 words) - 18:16, 14 January 2014
  • ...anding of the client's difficulties rather than attempting to dispatch all business as quickly as possible. ...
    1 KB (214 words) - 16:12, 18 February 2009
  • ...or where changes to other related projects impact the program, the program business case should be updated.<br> ...
    3 KB (475 words) - 13:09, 23 June 2006
  • ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with ente ::'''3. Risk: Application or system changes may disrupt business processes or corrupt production data stores.'''<br> ...
    3 KB (497 words) - 14:57, 23 June 2006
  • ...ant, limit and revoke access to premises, buildings and areas according to business needs, including emergencies. Access to premises, buildings and areas shoul ...ce providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    5 KB (674 words) - 18:14, 21 June 2006
  • :This presentation on executive management awareness covers security and business risks, anatomy of an attack, and a security risk discussion exercise.<br> ...nclude business impact contexts, vertical regulations, and making relevant business cases for security.<br> ...
    5 KB (653 words) - 12:45, 25 April 2007
  • ...specific guidance to application developers who are creating or revising e-business and e-commerce applications.<br> :'''Building a Business Case for Computer Forensics:''' [[Media:Business-Case-for-Computer-Forensics.pdf]]<br> ...
    6 KB (839 words) - 16:22, 23 April 2007
  • :* An effective planning process that aligns IT and business objectives :* If the IT function is decentralized, and business units manage the risk, then management should coordinate risk management ef ...
    4 KB (528 words) - 16:58, 28 March 2010
  • ...esults or do not meet usability requirements. A project that does not meet business requirements for internal controls at a milestone may continue without revi ...
    4 KB (501 words) - 18:24, 25 June 2006
  • ...y Program that empowers the Program to manage Information Security-related business risks.<br> ...curity Program Charter by defining objectives for ensuring the appropriate business use of electronic communications resources.<br> ...
    5 KB (614 words) - 16:46, 25 July 2006
  • ...eminated to all relevant system users (including vendors, contractors, and business partners). ...
    2 KB (281 words) - 14:46, 2 March 2007
  • ...n of successful elimination of the known error or after agreement with the business on how to alternatively handle the problem. ...
    2 KB (235 words) - 17:48, 5 May 2006
  • ...oy media containing cardholder information when it is no longer needed for business or legal reasons:'''<br> ...
    2 KB (298 words) - 14:33, 2 March 2007
  • ...esponsibility. The control environment is based on a culture that supports value delivery while managing significant risks, encourages cross-divisional co-o ::'''1. Risk: Systems do not meet business needs because not all business functional and non functional requirements are effectively gathered.'''<br> ...
    4 KB (580 words) - 18:00, 23 June 2006
  • ...with a large amount of research and development expenditures can lead both business and technological risks since specialization does not lead to lower unit co ...
    1 KB (215 words) - 18:32, 13 April 2007
  • 1. Obtain the '''criteria''' and '''business case''' used for selection of third-party service providers. ...
    2 KB (302 words) - 15:57, 25 June 2006
  • ...try initiatives. It is an invaluable resource for legal counsel and global business leaders, as well as to anyone who wishes to litigate, research or study the ...
    3 KB (510 words) - 14:56, 10 April 2011
  • ..., it also underscores the longstanding general principle that those who do business in the United States must accept the burdens along with the benefits of U.S ...
    899 bytes (139 words) - 10:48, 16 March 2010
  • ...and prohibits information sharing outside of that required for legitimate business needs. Management should obtain signed confidentiality agreements before gr ...iding specific instructions and requirements on the proper and appropriate business use of Internet resources.<br> ...
    10 KB (1,327 words) - 12:54, 10 April 2007
  • ::'''5. Risk: Unapproved application changes negatively impact business processing or may corrupt production data stores.''' ...
    2 KB (305 words) - 14:32, 23 June 2006
  • ...eminated to all relevant system users (including vendors, contractors, and business partners). ...
    2 KB (294 words) - 14:46, 2 March 2007
  • ...he barriers and persuading them that the likely costs of attack exceed the value of making the attack.<br> ...ormation; prevent loss, damage or compromise of assets and interruption to business activities; and prevent compromise or theft of information and information ...
    4 KB (592 words) - 19:28, 14 June 2007
  • ...ate IT reporting on regulatory requirements with similar output from other business functions.<br> ...
    2 KB (252 words) - 13:19, 4 May 2006
  • ::'''1. Risk: Information security and business requirements may be compromised. Inaccurate results are produced.'''<br> ...h potential impact to financial reporting bypass processes for identifying business requirements, risks, and for designing needed controls.'''<br> ...
    6 KB (863 words) - 13:12, 23 June 2006
  • ...d defined to provide only the level of access required to meet an approved business need or perform prescribed job responsibilities. Proper identification and ...ote access to information assets will be provided only to meet an approved business need or perform prescribed job responsibilities. Remote access must be faci ...
    10 KB (1,314 words) - 18:06, 15 March 2009
  • ...erts, and distributing information to appropriate information security and business unit management personnel is formally assigned. ...
    2 KB (303 words) - 16:00, 2 March 2007
  • ...oy media containing cardholder information when it is no longer needed for business or legal reasons:'''<br> ...
    2 KB (323 words) - 14:31, 2 March 2007
  • ...t. Monitor how much effort is applied to firefighting rather than enabling business improvements and, where necessary, improve these processes to minimize prob ...
    2 KB (248 words) - 17:50, 5 May 2006
  • ...ion of assets. In so doing the financial institution seeks to control its business risk rather than the client's portfolio risk. ...roach to long-range plans.", Linneman, Robert E, Kennell, John D.; Harvard Business Review; Mar/Apr77, Vol. 55 Issue 2, p141 ...
    4 KB (607 words) - 18:29, 16 February 2007
  • ...acy of individuals as well as to the well-being of financial institutions, business concerns, governmental agencies and others within the state that lawfully u ...
    2 KB (244 words) - 14:48, 17 February 2009
  • ...that appropriate IT Service Continuity plans have been made to support the business and its continuity requirements. ...
    2 KB (253 words) - 15:44, 20 March 2007
  • [[AI1.1:| 1.1 Definition and Maintenance of Business Functional and Technical Requirements]]<br> [[AI4.2:| 4.2 Knowledge Transfer to Business Management]]<br> ...
    3 KB (341 words) - 19:07, 14 June 2007
  • ...is an integral part of the organization's information systems, and of the business processes associated with those systems.<br> Statements of business requirements for new information systems, or enhancements to existing infor ...
    9 KB (1,170 words) - 14:05, 22 May 2007
  • ...defines objectives for establishing specific standards on the appropriate business use of information assets.<br> ...vides specific instructions and requirements on the proper and appropriate business use of Internet resources.<br> ...
    8 KB (1,184 words) - 14:12, 1 May 2010
  • '''7. Risk: Unidentifiable users may compromise critical business processes and data.'''<br> ...
    3 KB (356 words) - 17:48, 28 June 2006
  • ...ards and procedures, including legal and regulatory requirements, based on business and IT management’s governance oversight and operation of internal controls ...
    2 KB (271 words) - 13:16, 4 May 2006
  • ::'''1. Risk: Business needs may not be met or adequate data safeguards may not be implemented or ...
    3 KB (341 words) - 16:17, 21 June 2006
  • Base definitions of IT services on service characteristics and business requirements, organized and stored centrally via the implementation of a se ...
    2 KB (279 words) - 14:17, 3 May 2006
  • ...communications equipment, in line with laws and regulations, technical and business requirements, vendor specifications, and health and safety guidelines. ...
    2 KB (268 words) - 15:01, 8 May 2006
  • ...charge model to maintain its relevance and appropriateness to the evolving business and IT activities. ...
    2 KB (270 words) - 14:54, 5 May 2006
  • ...and that these firewalls deny or control (if such traffic is necessary for business purposes) any traffic from the wireless environment into systems storing ca ...
    3 KB (332 words) - 11:38, 3 March 2007
  • ...-generated evidence in order to lay a foundation for its admission under a business records exception to hearsay rule, especially where the data consists of th ...balancing test as to whether such evidence, though relevant, had probative value that was not substantially outweighed by the danger of unfair prejudice, co ...
    2 KB (289 words) - 19:06, 22 February 2009
  • ...and procedures that are reviewed and updated regularly for changes in the business. When policies and procedures are changed, determine if management approves ...
    3 KB (364 words) - 17:41, 21 June 2006
  • ...vides specific instructions and requirements on the proper and appropriate business use of Company Technology Resources while using a Company supported and or # '''Business Use''' ...
    10 KB (1,433 words) - 18:15, 14 January 2014
  • ...). Verify that the PCI Data Security Standard requirements relevant to the business relationship between the organization and the third party are included in t ...
    3 KB (345 words) - 14:38, 2 March 2007
  • ...ations and systems, promotes a common understanding of data amongst IT and business users, and prevents incompatible data elements from being created.<br> ...
    2 KB (288 words) - 14:15, 1 May 2006
  • ...). Verify that the PCI Data Security Standard requirements relevant to the business relationship between the organization and the third party are included in t ...
    3 KB (348 words) - 14:41, 2 March 2007
  • ...n systems are normally identified as "critical" in the insurance company's business continuity plan.<br> * Section K – This scoping note considers the status of current or planned e-business initiatives. ...
    8 KB (1,155 words) - 20:14, 25 June 2006
  • ...Content of backup storage needs to be determined in collaboration between business process owners and IT personnel. Management of the offsite storage facility ...PCI-3.2.2 Do not store the card-validation code (Three-digit or four-digit value printed on the front or back of a payment card (e.g., CVV2 and CVC2 data)) ...
    5 KB (700 words) - 18:07, 23 June 2006
  • ...at if a law requires that a business retain a record of a transaction, the business satisfies the requirement by retaining an electronic record, as long as the ...
    3 KB (456 words) - 11:26, 30 October 2011
  • ...). Verify that the PCI Data Security Standard requirements relevant to the business relationship between the organization and the third party are included in t ...
    3 KB (350 words) - 14:39, 2 March 2007
  • Business continuity planning <br> ...
    3 KB (360 words) - 16:59, 25 June 2006
  • ...). Verify that the PCI Data Security Standard requirements relevant to the business relationship between the organization and the third party are included in t ...
    3 KB (353 words) - 14:40, 2 March 2007
  • ...from seeking improved efficiency and effectiveness or to enable or reflect business initiatives, or from programs, projects or service improvement initiatives. ...sessing the impact, cost, benefit and risk of proposed changes, developing business justification and obtaining approval, '''managing''' and coordinating chang ...
    4 KB (523 words) - 10:24, 23 April 2010
  • ...received. See Charles R. Merrill, A Cryptographic Primer, The Internet and Business: A Lawyer's Guide to the Emerging Legal Issues 14 ( Joseph F. Ruh, Jr., ed. ...
    1 KB (144 words) - 12:26, 16 October 2014
  • ...and availability management. Incidents should be classified according to a business and service priority and routed to the appropriate problem management team, ...
    2 KB (299 words) - 17:41, 5 May 2006
  • Ensure that business controls are properly translated into application controls such that proces ...
    2 KB (307 words) - 15:06, 3 May 2006
  • ...el facilitates the optimal creation, use and sharing of information by the business and in a way that maintains integrity and is flexible, functional, cost-eff ...
    2 KB (311 words) - 14:12, 1 May 2006
  • ::'''1. Risk: Information security and business requirements may be compromised. Inaccurate results are produced.'''<br> ...
    3 KB (369 words) - 16:09, 21 June 2006
  • ::'''1. Risk: Information security and business requirements may be compromised. Inaccurate results are produced.'''<br> ...
    3 KB (368 words) - 11:58, 22 June 2006
  • ...users to effectively and efficiently use the application system to support business processes. The knowledge transfer should include the development of a train ...
    2 KB (298 words) - 16:59, 3 May 2006
  • ...nstitutions should integrate IT resources and investments into the overall business planning process. Major investments in IT resources have long-term implicat ...he plan. The individual departments and functional areas identify specific business needs and, ultimately, implement the plans.<br> ...
    19 KB (2,609 words) - 13:51, 23 May 2007
  • Essentially, it requires an agency, person or business that conducts business in California and owns or licenses computerized 'personal information' to d ...
    3 KB (522 words) - 13:52, 26 October 2011
  • Establish a formal, approved integrated project plan (covering business and information systems resources) to guide project execution and project c ...
    2 KB (329 words) - 01:35, 2 May 2006
  • ...the production environment and critical functions must be reflected in the business continuity and recovery plans.<br> ...<br>Mandatory and must be implemented.</td><td>Implemented within 10 (ten) business days of approval.</td></tr> ...
    12 KB (1,684 words) - 14:14, 1 May 2010
  • ...es to execute the current and future strategic objectives and keep up with business demands. Management should put clear, consistent and enforced human resourc ...
    2 KB (329 words) - 13:34, 4 May 2006
  • [[Image:BCPLifecycle.gif|Business continuity planning life cycle]] ...t is also called ''business continuity and resiliency planning'' (BCRP). A business continuity plan is a road-map for continuing operations under adverse condi ...
    15 KB (2,046 words) - 11:39, 27 October 2012
  • ...reporting on compliance progress and status with similar output from other business functions.<br> ...
    2 KB (327 words) - 13:18, 4 May 2006
  • ...that all software can be conceptually optimized to meet the demands of the business processes. ...
    2 KB (352 words) - 16:42, 20 March 2007
  • ...ines. This forum directs technology standards and practices based on their business relevance, risks and compliance with external requirements.<br> ...
    2 KB (311 words) - 16:29, 1 May 2006
  • ...continuous approach regarding quality management that is aligned with the business requirements. The QMS identifies quality requirements and criteria, key IT ...
    2 KB (337 words) - 19:47, 1 May 2006
  • ...defines objectives for establishing specific standards on the appropriate business use of information assets.<br> ...ble content, Users should contact <Specify Contact> no later than the next business day of each occurrence.<br> ...
    6 KB (857 words) - 12:22, 19 July 2007
  • ...rs the Information Security Program to manage Information Security-related business risks.<br> :The Acceptable Use Standard defines objectives for ensuring the appropriate business use of information assets.<br> ...
    4 KB (581 words) - 17:06, 30 December 2013
  • ITIL The Business Perspective.<br> ...
    2 KB (332 words) - 12:39, 4 May 2006
  • ...r each day the violation continues and at each office, branch, or place of business at which a violation occurs or continues.<br> ...f not more than $500 on any financial institution or nonfinancial trade or business which negligently violates any provision of this subchapter or any regulati ...
    9 KB (1,369 words) - 23:09, 1 November 2012
  • ...defines objectives for establishing specific standards on the appropriate business use of information assets.<br> ...vides specific instructions and requirements on the proper and appropriate business use of telecommunications resources.<br> ...
    10 KB (1,473 words) - 14:13, 1 May 2010
  • ...et and risks mitigated. Integrate reporting with similar output from other business functions. The performance measures should be approved by key stakeholders. ...
    2 KB (347 words) - 13:38, 4 May 2006
  • ...security standards may allow unauthorized access to production systems and business data stores.'''<br> ...
    3 KB (405 words) - 00:10, 13 June 2006
  • ...in 1986. American Express attempted to own almost every field of financial business (although there was little synergy between them). Things culminated in 1997 ...to buy insurance underwriters, as they seek to engage in a more profitable business of insurance brokerage by selling products of other insurance companies. Ot ...
    15 KB (2,184 words) - 17:02, 15 June 2007
  • :* Business Continuity Planning ===Business Continuity Planning=== ...
    15 KB (2,060 words) - 17:47, 15 June 2007
  • :1. Current and future business needs and strategy ...
    2 KB (333 words) - 16:42, 5 May 2006
  • * [[PCI 7:|'''Requirement 7: Restrict access to data by business need-to-know.''']] ...undertaken a risk analysis and have legitimate technological or documented business constraints can consider the use of compensating controls to achieve compli ...
    8 KB (1,208 words) - 17:00, 9 April 2007
  • ITIL 4.2 The SLM process The Business Perspective, Concepts.<br> ...
    2 KB (346 words) - 18:25, 1 May 2006
  • ...al sites for IT equipment to support the technology strategy linked to the business strategy. The selection and design of the layout of a site should take into ...
    2 KB (350 words) - 18:15, 5 May 2006
  • ::'''1. Risk: A project that does not meet business requirements for internal controls at a milestone may continue without revi ...
    3 KB (367 words) - 16:28, 21 June 2006
  • ...tion's customers and to assist management by providing detailed and costed business cases for proposed changes to IT services"<br> ...used as a first step towards an IT organisation operating as an autonomous business. It may also be used to encourage users to move in a strategically importa ...
    6 KB (885 words) - 10:12, 23 March 2007
  • The following illustration represents the business process involved with the removal of access credentials from any system or ...
    3 KB (366 words) - 16:39, 26 June 2006
  • [[Business Continuity Management:|'''Business Continuity Management''']]<br> ...
    3 KB (378 words) - 21:27, 18 January 2015
  • ::[[Image:Key-control.jpg]][[PCI-12.8.3:|PCI-12.8.3 Business continuity in the event of a major disruption, disaster or failure.]]<br> ...e the plan addresses, at a minimum, specific incident response procedures, business recovery and continuity procedures, data backup processes, roles and respon ...
    7 KB (988 words) - 19:11, 7 July 2006
  • ::Interested Executive and Business Unit Management. ...
    2 KB (315 words) - 18:46, 25 September 2006
  • ...ource acquisition; and 2.) To report delivered service availability to the business as required by the SLA. Accompany all exception reports with recommendation ...
    2 KB (351 words) - 13:57, 4 May 2006
  • ITIL 1.6.1 Organizational structure Business Perspective.<br> ...
    3 KB (356 words) - 17:11, 1 May 2006
  • ...clude do not exceed amounts commensurate with the customary conduct of the business, industry or profession of the customer concerned;<br> (9) Nor by a person engaged as a business in the transportation of currency, monetary instruments and other commercia ...
    4 KB (657 words) - 23:02, 1 November 2012
  • ISO 17799 9.1 Business requirement for access control.<br> ...
    3 KB (363 words) - 16:53, 9 April 2007
  • ::'''2. Risk: Data destruction or business process disruptions occur as a result of inadequately maintained anti-virus ...ar reviews of the software and data content of systems supporting critical business processes; the presence of any unapproved files or unauthorized amendments ...
    8 KB (1,177 words) - 19:00, 25 June 2006
  • ...T assets, which form the basis for the current IT budget. Provide input to business cases for new investments, taking into account current IT asset and service ...
    2 KB (353 words) - 18:22, 1 May 2006
  • ...defines objectives for establishing specific standards on the appropriate business use of information assets.<br> ...vides specific instructions and requirements on the proper and appropriate business use of Company software.<br> ...
    7 KB (953 words) - 14:13, 1 May 2010
  • ISO 11.1 Aspects of [[Business_Continuity_Management: | business continuity management]].<br> ...
    2 KB (272 words) - 18:05, 25 April 2007
  • Identify, document and analyze risks associated with the business processes as part of the organization’s process for the development of requ ...
    2 KB (269 words) - 23:52, 14 June 2007
  • ...ams that execute the strategy, the individual investment programs, and the business and IT projects that make up the programs. The framework should provide for ...
    3 KB (397 words) - 13:28, 4 May 2006
  • ISO 11.1 Aspects of [[Business_Continuity_Management: | business continuity management]]. ...
    2 KB (278 words) - 18:21, 25 April 2007
  • ...ple whose work normally involves making contact with the victim's place of business, such as postal employees, janitors, customers, and salespeople. Other empl ...
    3 KB (418 words) - 15:26, 22 February 2009
  • ...[Business continuity management]] - protecting, maintaining and recovering business-critical processes and systems ...
    6 KB (847 words) - 16:57, 26 March 2007
  • Embed ownership and responsibility for IT-related risks within the business at an appropriate senior level. Define and assign roles critical for managi ...
    3 KB (370 words) - 18:04, 1 May 2006
  • ...ata, consistent with statutory, regulatory, certificatory, contractual and business requirements<br> ...it data on operational systems, while minimizing the risk of disruption to business processes. ...
    6 KB (774 words) - 12:41, 25 May 2007
  • '''PO 9.1 IT and Business Risk Management Alignment'''<br> ...
    3 KB (377 words) - 14:10, 8 August 2006
  • ::'''2. Risk: Security and business requirements are not check listed adequately, enforced, and tested. Project ...
    3 KB (403 words) - 12:37, 23 June 2006
  • ::[[Image:Key-control.jpg]][[PCI-1.1.5:|PCI-1.1.5 Documentation and business justification for use of all services, protocols, and ports allowed, includ ...igure these firewalls to deny or control (if such traffic is necessary for business purposes) any traffic from the wireless environment into the cardholder dat ...
    5 KB (702 words) - 12:20, 16 June 2010
  • ISO 11.1 Aspects of [[Business_Continuity_Management: | business continuity management]]. ...
    2 KB (297 words) - 18:35, 25 April 2007
  • A “recovery point objective” or “RPO”, is defined by [[business continuity planning]]. It is the maximum tolerable period in which data mi ...common mistakes around the use and definition of RPO. First, staff use a [[business impact analysis]] to determine RPO for each service. RPO is NOT determined ...
    13 KB (2,264 words) - 11:10, 27 October 2012
  • ...and procedures that are reviewed and updated regularly for changes in the business. When policies and procedures are changed, determine if management approves ...
    3 KB (432 words) - 12:23, 23 June 2006
  • ...es should be tested to ensure that they achieve the necessary application, business, and user control requirements and that they do not negatively impact exist ...
    3 KB (432 words) - 13:02, 23 June 2006
  • * ITIL The Business Perspective, The Value of IT.<br> * ITIL 3.4 Establishing a value culture.<br> ...
    3 KB (421 words) - 18:02, 23 June 2006
  • :'''Documentation and business justification for use of all services, protocols, and ports allowed, includ ...s include a documented list of services, protocols and ports necessary for business—for example, hypertext transfer protocol (HTTP) and Secure Sockets Layer (S ...
    3 KB (353 words) - 12:28, 16 June 2010
  • [[PO1.1:| 1.1 IT Value Management]]<br> [[PO1.2:| 1.2 Business-IT Alignment]]<br> ...
    4 KB (517 words) - 19:07, 14 June 2007
  • ...ster_Recovery_Requirements_Analysis | disaster recovery plan]] and wider [[business continuity planning]] of an organization. A backup site can be another loca [[Category:Business continuity and disaster recovery]] ...
    5 KB (785 words) - 11:34, 27 October 2012
  • ...ations by electronic means. It is used to transfer electronic documents or business data from one computer system to another computer system, i.e. from one tra EDI is considered to be a technical representation of a business conversation between two entities, either internal or external. Note that t ...
    18 KB (2,828 words) - 11:22, 27 August 2011
  • ...ers a variety of solutions that can be tailored to the needs of individual business units and negotiated on an application-by-application basis. IT must carefu ...application-by-application basis when negotiating service levels with the business units. The goal is to determine all of the application requirements before ...
    20 KB (3,195 words) - 02:47, 23 February 2007
  • ...ay need to be addressed. Access to the logging information is in line with business requirements in terms of access rights and retention requirements.<br> ...h potential impact to financial reporting bypass processes for identifying business requirements, risks, and for designing needed controls.'''<br> ...
    7 KB (975 words) - 16:57, 9 April 2007
  • ...cess to monitor service delivery to ensure the supplier is meeting current business requirements and is continuing to adhere to the contract agreements and ser ...ce providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    21 KB (3,010 words) - 15:52, 25 June 2006
  • Translate business information requirements, IT configuration, information risk action plans a ISO 9.1 Business requirement for access control<br> ...
    10 KB (1,333 words) - 17:44, 25 June 2006
  • ...and maintenance of the technological infrastructure that meets established business functional and technical requirements and is in accord with the organizatio ...
    4 KB (496 words) - 17:26, 21 June 2006
  • ...e warrant calls for a search that would have the effect of shutting down a business because of its reliance on the computers, it must be determined if the sear ...
    3 KB (541 words) - 18:50, 22 February 2009
  • A SLA is generally business oriented and doesn't go into much technical detail. Its technical specifica ...
    3 KB (527 words) - 16:06, 22 March 2007
  • ...oy media containing cardholder information when it is no longer needed for business or legal reasons:'''<br> ...
    4 KB (604 words) - 15:30, 1 March 2007
  • ...oes not include a system that is to be used for routine administrative and business applications (including payroll, finance, logistics, and personnel manageme ...
    2 KB (327 words) - 00:58, 1 June 2010
  • ...Limit your storage amount and retention time to that which is required for business, legal, and or regulatory purposes, as documented in the data retention pol ...PCI-3.2.2 Do not store the card-validation code [three-digit or four-digit value printed on the front or back of a payment card (e.g., CVV2 data or CVC2 dat ...
    4 KB (635 words) - 11:52, 28 March 2008
  • ...html Interprative Guidance on Providing Banking Services to Money Services Business Operating in the United States]<br> ...l3205.html Joint Statement on Providing Banking Services to Money Services Business]<br> ...
    13 KB (1,838 words) - 14:57, 20 April 2007
  • #[[A business case for an integrated legal hold and discovery manage... | A business case for an integrated legal hold and discovery manage...]] #[[Bringing Email Filing to Business | Bringing Email Filing to Business]] ...
    16 KB (2,124 words) - 11:06, 16 March 2010
  • ...ach risk management effectively. Risk simply put is the negative impact to business assets by the exercise of vulnerabilities to those assets, considering both ...ation’s intellectual property and information assets and subsequently, the business mission, from information technology related security risks. Each organizat ...
    23 KB (3,630 words) - 10:19, 27 October 2012
  • ...y Program that empowers the Program to manage Information Security-related business risks.<br> ...
    4 KB (535 words) - 16:51, 25 July 2006
  • ...rated process approach to effectively deliver managed services to meet the business and customer requirements".<br> ...
    2 KB (298 words) - 14:25, 23 April 2010
  • [[DS11.1:| 11.1 Business Requirements for Data Management]]<br> ...
    4 KB (538 words) - 19:08, 14 June 2007
  • ...|Business continuity management]] - protecting, maintaining and recovering business-critical processes and systems ...
    8 KB (1,111 words) - 10:30, 15 April 2012
  • ...e the plan addresses, at a minimum, specific incident response procedures, business recovery and continuity procedures, data backup processes, roles and respon ...
    4 KB (548 words) - 14:21, 4 May 2006
  • ...ion does not apply to a system that is used for routine administrative and business applications (including payroll, finance, logistics, and personnel manageme ...
    3 KB (368 words) - 00:50, 1 June 2010
  • ...and procedures that are reviewed and updated regularly for changes in the business. When policies and procedures are changed, determine if management approves ...
    4 KB (537 words) - 13:57, 23 June 2006
  • ...fine Company objectives for establishing specific standards on appropriate business use of the Company's information and telecommunications systems and equipme ...
    4 KB (465 words) - 15:46, 13 January 2014
  • ...f [[corporate governance]] and deals primarily with the connection between business focus and IT management of an organization. It highlights the importance of # Assure that the investments in IT generate business value, and ...
    12 KB (1,686 words) - 11:47, 30 May 2015
  • ISO 17799 9.1 Business requirement for access control.<br> ...
    4 KB (550 words) - 14:34, 1 May 2006
  • ...ause most jurisdictions have recognized the widespread use of computers by business and government. Nonetheless, many judges are still suspicious of computers ...
    3 KB (506 words) - 20:06, 22 February 2009
  • ...w an organization maintains reliable application systems in support of the business to initiate, record, process and report financial information. Deficiencies ...
    4 KB (522 words) - 20:12, 25 June 2006
  • '''Section 13402''' of the HITECH Act requires cover entities and business associates in the event of a breach of any PHI to notify each individual wh ...nd other related entities and service providers. HIPAA covered entities, business associates, PHR vendors, PHR related entities and third party service vendo ...
    9 KB (1,358 words) - 16:25, 6 September 2011
  • ...ards and guidelines must be properly communicated to Company corporate and business unit management. Specific instructions and requirements for providing secur ...
    3 KB (418 words) - 19:53, 14 January 2014
  • ...identifiers. CIs should be recorded at a level of detail justified by the business need, typically to the level of "independent change". This includes definin ...
    4 KB (570 words) - 16:12, 23 March 2007
  • ...her processes. This gave rise to a more general concept that is applied to business processes and to developing people. ...isk management, system acquisition, information technology (IT), services, business processes generally, and human capital management. The CMM has been used ex ...
    12 KB (1,863 words) - 11:32, 9 June 2010
  • ...see Recommended Reading section). These fundamental differences define the value proposition of the open-source software model; however, they can also creat ...r to adopter. A useful reference point such as the [http://www.openbrr.org Business Readiness Rating] can also help.<br> ...
    11 KB (1,601 words) - 12:58, 10 April 2007
  • ...mal service operation as quickly as possible and to minimize the impact on business operations, thus ensuring that the best possible levels of service quality ...ations as quickly as possible with the least possible impact on either the business or the user, at a cost-effective price". ...
    9 KB (1,371 words) - 16:40, 23 May 2007
  • ...t, or ridicule or to injure that person in the maintenance of the person's business. ...
    4 KB (675 words) - 11:40, 5 March 2009
  • :::A. Analyze business requirements.<br> :::*Perform information asset value analysis.<br> ...
    12 KB (1,656 words) - 14:15, 1 May 2010
  • ...compilation of information which is used in business and which gives [the business] an opportunity to obtain an advantage over competitors who do not know or ...generally known to the public or to other persons who can obtain economic value from its disclosure or use; and (2) is the subject of efforts that are reas ...
    7 KB (1,065 words) - 16:48, 13 April 2011
  • The increased value of information in computer systems makes it attractive to some criminals. I '''Value of removed business files:''' Evidence was sufficient to show that value of computer files wrongfully removed from defendant's work computer and tra ...
    4 KB (562 words) - 12:09, 18 February 2009
  • ...utgoing connections as well as internal connections to those necessary for business purposes. ...
    4 KB (568 words) - 17:25, 10 April 2007
  • ...erational expectations of its users and, ultimately, the objectives of the business. Roles and responsibilities are defined and an accountability and measureme ...
    5 KB (666 words) - 15:23, 25 June 2006
  • ...access code system renders the records hearsay that are not admissible as business records ...
    4 KB (717 words) - 18:04, 22 February 2009
  • ...ly, daily, weekly, monthly, etc. depending on the nature of the underlying business cycle for a given assertion. ...nomy, timely and reliable financial information is critical for day-to-day business decisions regarding strategic planning, capital acquisition, credit decisio ...
    15 KB (2,212 words) - 17:29, 19 February 2015
  • ...mpliance|compliance]], [[audits|auditing]], [[Business continuity planning|business continuity]], and [[disaster recovery]] as they relate to information syste ...
    7 KB (983 words) - 10:41, 15 April 2012
  • '''Business Description'''<br> ...
    5 KB (665 words) - 14:40, 11 April 2007
  • Your database is the foundation of your online business. Follow this advice to avoid compromising your strongest corporate asset.<b ...l based, the database forms the foundation for all but the simplest online business systems. The roles of databases are many, including storing system configur ...
    28 KB (4,261 words) - 11:45, 28 March 2008
  • ...ablish storage and retention arrangements to satisfy legal, regulatory and business requirements for documents, data, archives, programs, reports and messages ...
    5 KB (721 words) - 11:49, 28 March 2008
  • ...find what they are looking for. Domainers can make a lot of money in this business of buying and selling domain names. ...day grace period, no fee is incurred. An industry has grown up out of this business with domainers taking part in these mass registrations. Domain tasting has ...
    10 KB (1,540 words) - 12:16, 21 March 2011
  • ::*Generally accepted as cost of doing business<br> ::*Business unit level<br> ...
    8 KB (1,149 words) - 14:09, 1 May 2010
  • ...nformation confined to use only within Company for purposes related to its business. ...
    5 KB (583 words) - 17:44, 23 January 2014
  • *Change Sponsor (CS) - The Person who gives business approval for a change. ...
    3 KB (533 words) - 14:15, 23 April 2010
  • ...aid that it was common for people who ran businesses like the time-sharing business to make computer time available so that these adjustments to the program co ...
    6 KB (1,154 words) - 21:04, 22 February 2009
  • ...Inc., --- F.3d. ---, (7th Cir. July 10, 2006). McCready operated an online business buying and selling items through eBay. Several buyers complained that McCre ...
    3 KB (428 words) - 17:03, 13 April 2011
  • ...e is reliable, policy-compliant, cost-effective, and adaptable to changing business needs. ...
    3 KB (461 words) - 14:19, 23 April 2010
  • ...ners, financial auditors, and anyone who verifies that controls exist over business systems. Our intention is that the HORSE project evolves into the most comp <font color=blue>'''Lazarus Alliance is a proud veteran owned business.'''</font> ...
    9 KB (1,241 words) - 20:49, 13 September 2016
  • ...nesses, etc.). Companies located in and out of North Carolina that conduct business in state or keep personal information of state residents are required to co * http://www.noscamnc.gov/business.html ...
    3 KB (488 words) - 13:02, 12 November 2011
  • ...luding a computer, to obtain money, goods, services, or any other thing of value, or that can be used to initiate a transfer of funds with the intent to def ...eparate and apart from the pattern of racketeering, the very nature of the business alleged by gamblers required a finding that there was no ongoing organizati ...
    4 KB (642 words) - 11:15, 18 February 2009
  • N.Y. Penal Law § 175.05 Falsifying business records in the second degree.<br> N.Y. Penal Law § 175.10 Falsifying business records in the first degree.<br> ...
    9 KB (1,358 words) - 22:11, 5 September 2011
  • ...e]]s that are intended to support businesses in achieving both quality and value, in a financial sense, in IT operations. These procedures are supplier inde ...claims that its "Yellow Books" (''A Management System for the Information Business'') were key precursors. According to IBM: ...
    37 KB (5,348 words) - 10:12, 8 September 2011
  • ...e granted only to Users who require such remote access to meet an approved business need or perform prescribed job responsibilities.<br> ...f remote access to information assets that is required to meet an approved business need or perform prescribed job responsibilities.<br> ...
    14 KB (1,956 words) - 14:16, 1 May 2010
  • ...) and governmental matters. Consequently, transactions with no relation to business, commercial or governmental transactions would not be subject to this Act. ...
    9 KB (1,499 words) - 11:31, 30 October 2011
  • ...trigger entitlement to nominal damages; employee was disrupting employer's business by using its property, employer was hurt by loss of productivity caused by ...
    5 KB (763 words) - 12:30, 18 February 2009
  • ...ble for approving major projects and ensuring projects support, not drive, business objectives. ...t Manager – Project managers are responsible for ensuring projects support business objectives, project goals and expectations are clearly defined, and project ...
    12 KB (1,538 words) - 22:41, 25 April 2007
  • ...l levels of the organization e.g. engineers, developers, project managers, business managers etc.<br> ...
    7 KB (942 words) - 15:09, 23 March 2007
  • ...or physical records that are used by the Company or in support of Company business processes, including all data maintained or accessed through systems owned ...mployees and our customers and among the many constituents of our emerging business and societal ecosystem. The rapidly growing phenomenon of user generated we ...
    9 KB (1,430 words) - 14:56, 28 August 2009
  • ...edures shall be provided and limited to Users required to meet an approved business need or perform prescribed job responsibilities.<br> ...
    5 KB (728 words) - 14:07, 1 May 2010
  • .... Indeed, such laws will be particularly important to U.S. companies doing business overseas or who have subsidiaries or partners overseas with whom data will ...e Act of 1998 took effect in October 2001, and U.S. companies that conduct business in the U.K. are subject to the Act. Transfer of U.K. employee, customer and ...
    19 KB (2,863 words) - 16:43, 21 September 2011
  • ...ity. Intangible risk management allows risk management to create immediate value from the identification and reduction of risks that reduce productivity. * create value. ...
    27 KB (4,185 words) - 23:45, 10 March 2010
  • ...e shall be developed to describe how the SIRT will work within established business resumption and recovery capabilities. ...
    5 KB (737 words) - 15:24, 21 January 2014
  • ...property, which a recipient is not, otherwise than in the normal course of business, authorised by the principal to divulge. ...
    5 KB (747 words) - 16:25, 29 August 2014
  • ...m '''person''' means an individual, partnership, association, corporation, business trust, or legal representative, an organized group of individuals, a State, ...
    5 KB (795 words) - 00:35, 1 June 2010
  • ::7. All temporary identification badges must be returned by the end of the business day.<br> ...eria; and ensuring the revocation of access for those who no longer have a business need to access information assets.<br> ...
    12 KB (1,711 words) - 14:16, 1 May 2010
  • ===Business Impact=== Do you use email in your business? The CAN-SPAM Act, a law that sets the rules for commercial email, establis ...
    26 KB (4,026 words) - 12:15, 5 May 2011
  • ...f the data center is to align data center activities with the goals of the business while maintaining the security and integrity of critical information and pr ...y rely on to access company information, and lost connectivity could cause business interruption. ...
    21 KB (3,112 words) - 16:52, 15 June 2007
  • ...has sufficient audit expertise and is independent of the operations of the business.<br> * Inadequate alignment between IT systems and business objectives ...
    28 KB (4,089 words) - 14:37, 16 April 2007
  • ...the organization's information and information processing facilities from business processes involving external parties should be identified and appropriate c ...o account characteristics of external users, their type of access, and the value and sensitivity of the information involved<br> ...
    8 KB (996 words) - 12:49, 22 May 2007
  • ...sible approach to IT security risk management and may be found here: Risky Business: [[IT Security Risk Management Demystified]] ...ity. Intangible risk management allows risk management to create immediate value from the identification and reduction of risks that reduce productivity.<br ...
    43 KB (6,368 words) - 11:22, 4 July 2015
  • '''Corporate governance''' is the set of business process, customs, policies, laws, and institutions affecting the way a corp ...stakeholders, by directing and controlling management activities with good business savvy, objectivity, accountability and integrity. Sound corporate governanc ...
    29 KB (4,284 words) - 17:19, 20 April 2010
  • ...l Services Commission (the “Commission”) regulates the fiduciary and trust business sectors, pursuant to the Banks and Trust Companies Act, 1990 (as amended). ...
    5 KB (762 words) - 16:03, 29 August 2014
  • ::* Any significant changes in business strategy, activities, or technology that could affect the audit function; ...nse to information needs and to address risks that may arise from changing business conditions ...
    32 KB (4,518 words) - 17:53, 11 April 2007
  • ...met or third parties have inappropriate access to business data stores and business processes.''' ::'''2. Risk: Third party entities have inappropriate access to critical business processes and data.''' ...
    39 KB (5,914 words) - 17:55, 13 April 2007
  • (2) California Business & Professions Code Section 17538 applies legal restrictions on telephone an ...e,” The Children’s Advertising Review Unit (CARU) of the Council of Better Business Bureaus has updated its guidelines to cover marketing to children via the I ...
    16 KB (2,394 words) - 13:40, 26 April 2011
  • ...ined root access to business's computers in Connecticut obtained access to business's intangible property, for purposes of Computer Fraud and Abuse Act (CFAA), ...
    20 KB (3,032 words) - 13:27, 12 October 2011
  • ...he laws might force companies to consult a lawyer just to engage in simple business practices such as server logging, user registration, and credit checks. Som * The UK Interception of Communications (Lawful Business Practice) Regulations 2000 ...
    12 KB (1,899 words) - 12:24, 12 November 2011
  • ...h as claiming a company cares more selling stock than running a legitimate business, are not sufficient to support a finding of defamation); SPX Corp. v. Doe, ...
    9 KB (1,422 words) - 14:29, 10 April 2011
  • * Commensurate with the organization's business needs, and with relevant legal-regulatory-certificating requirements<br> ...
    10 KB (1,387 words) - 14:04, 22 May 2007
  • ...ed $5,000 in aggregate damages due to the misappropriation of the economic value of plaintiffs’ personalities resulting from defendants’ placement of identi ...to another’s private affairs or concerns), trespass to chattels and unfair business practices. ...
    21 KB (3,283 words) - 13:26, 26 April 2011
  • ...tion for "records of regularly conducted activity"--or more commonly, the "business records" exception--without first asking whether the records are hearsay. S ...e, such as: a personal letter; a memo; bookkeeping records; and records of business transactions inputted by persons. Third, mixed hearsay and non-hearsay reco ...
    43 KB (6,432 words) - 13:22, 5 August 2011
  • ...ining secure and reliable databases, upon which the Company enterprise and business processes depend, requires a consistent approach to security standards in t ...d be reviewed no less than once every 12 months for technical accuracy and business validity. Modifications to this document must be submitted in writing to Da ...
    18 KB (2,920 words) - 17:59, 18 May 2007
  • ...k''' is a distinctive sign (semiotics) or indicator used by an individual, business organizations, or other Juristic person to identify that the Good (economic ...dge of origin''. In other words, trademarks serve to identify a particular business as the source of goods or services. The use of a trademark in this way is k ...
    39 KB (6,281 words) - 14:29, 26 April 2011
  • ...ranted remote access to Company information or systems to meet an approved business need or perform prescribed job responsibilities should receive information ...
    10 KB (1,206 words) - 14:05, 1 May 2010
  • * In a multi-tier environment, run Web logic and business logic on separate computers. ...
    7 KB (1,018 words) - 13:53, 14 May 2007
  • ...or physical records that are used by the Company or in support of Company business processes, including all data maintained or accessed through systems owned ...on the sensitivity, criticality, confidentiality/privacy requirements, and value of the information. All information assets, whether generated internally or ...
    8 KB (1,068 words) - 17:23, 16 October 2009
  • ...s, insurers, pharmacies and other health-care providers, as well as their 'business associates' which include service providers who have access to, process, st ...ion lawsuits. The law exempts faxes to recipients that have an established business relationship with the company on whose behalf the fax is sent, as long as t ...
    14 KB (2,027 words) - 15:57, 29 August 2014
  • ...laim: Professional standard to send in claims. As there are many different business applications for the Health Care claim, there can be slight derivations to ...which are grouped in functional groups, used in defining transactions for business data interchange. This standard does not cover the semantic meaning of the ...
    32 KB (4,732 words) - 19:36, 29 November 2013
  • * Organizations that are deemed to be a 'federal work, undertaking or business' (eg banks, telecommunications companies, airlines, railways, and other int ...anization may be able to rely on implied consent when there is an existing business relationship with the recipient of the message, based on: ...
    18 KB (2,700 words) - 16:17, 29 August 2014
  • ...level of access to information assets that is required to meet an approved business need or perform prescribed job responsibilities. ...
    8 KB (1,182 words) - 19:41, 15 January 2014
  • To explain the value of digital signatures in legal applications, this tutorial begins with an o ..., the law has only begun to adapt to advances in technology. The legal and business communities must develop rules and practices which use new technology to ac ...
    22 KB (3,420 words) - 15:18, 3 April 2007
  • ...could not constitute “commercial use,” where defendants had not conducted business or advertised under the domain name, nor had they attempted to sell the dom ...in name back to the trademark holder or by using the domain name to divert business from the trademark holder to the domain name holder." DaimlerChrysler v. Th ...
    29 KB (4,582 words) - 10:16, 13 April 2011
  • '''Corporate governance''' is the set of Business processes, customs, policies, laws, and institutions affecting the way a co ...stakeholders, by directing and controlling management activities with good business savvy, objectivity, accountability and integrity. Sound corporate governan ...
    45 KB (6,604 words) - 15:20, 15 April 2010
  • ...itution orders for identity theft cases may include an amount equal to the value of the victim’s time spent in remediation of the actual or intended harm of ...ted computer with the intent to defraud and there by obtaining anything of value. ...
    14 KB (2,101 words) - 11:35, 27 August 2011
  • ...f fraud. Merchants can implement these prevention measures but risk losing business if the customer chooses not to use the measures. ...hants and the financial institutions bear the loss. The merchant loses the value of any goods or services sold, and any associated fees. If the financial i ...
    25 KB (3,921 words) - 12:53, 12 November 2011
  • * [[Motion to exclude computer-generated evidence—Laying business record exception foundation]] ...
    9 KB (1,069 words) - 20:29, 22 February 2009
  • ...lished, and their activities should be limited to the minimum required for business purposes.<br> ...outsourcing relationships, and contractors may also be identified, and the business need for access determined during the hiring or contracting process.<br> ...
    78 KB (11,440 words) - 02:00, 10 April 2007
  • ...artist to employ his own helpers; whether creation was in hirer’s line of business; hirer’s control over when and how long hired party is to work; method of p ...
    6 KB (1,026 words) - 06:44, 11 April 2011
  • :* Recovering keys that are lost or corrupted as part of business continuity management; ...
    13 KB (2,019 words) - 11:46, 28 March 2008
  • :* Monitoring and oversight of third-parties doing business as agents or on behalf of the financial institution (for example, an Intern ...
    11 KB (1,523 words) - 10:04, 28 April 2007
  • ...t into law, stating it included "the most far-reaching reforms of American business practices since the time of Franklin D. Roosevelt." ...f hundreds and hundreds of billions, indeed trillions of dollars in market value. The hearings set out to lay the foundation for legislation. We scheduled 1 ...
    38 KB (5,614 words) - 14:31, 15 April 2010
  • ...cipient into believing that message might be from friend, acquaintance, or business contact who was sending confidential email. U.S.C.A. Const.Amend. 1; West's ...
    8 KB (1,176 words) - 10:17, 5 May 2011
  • For market risk the preferred approach is VaR (value at risk). ...ate strategy, as well as the country in which to base a particular type of business, based in part on how Basel II is ultimately interpreted by various countri ...
    19 KB (2,934 words) - 21:46, 2 September 2012
  • ...er to secure those rights. It also requires contractual assurances for any business associates of health care institutions that handle health care information ...must also, as noted, include privacy requirements in their contracts with business associates. All employees (and volunteers) must be educated about privacy p ...
    19 KB (2,886 words) - 16:53, 29 August 2014
  • ...ally based on the business needs and the role of the individual within the business. ...inancial institution to transfer funds to the account of another person or business. Payment is typically made by ACH credit or by the institution (or bill pay ...
    74 KB (11,078 words) - 13:08, 9 April 2007
  • ...tween the value of the property had it been as represented, and its actual value. Special damages may be allowed if shown proximately caused by defendant's * Thomas Petters is an American masquerading as a business man who turned out to be a con man and was the former CEO and chairman of P ...
    15 KB (2,222 words) - 15:20, 12 November 2011
  • ...located, and 3) the laws of the state/nation which apply to the person or business with whom the transaction takes place. So a user in one of the United Stat ...
    20 KB (2,921 words) - 16:47, 29 August 2014
  • ...ud and the thing obtained consists only of the use of the computer and the value of such use is not more than $5,000 in any 1-year period; (7) with intent to extort from any person any money or other thing of value, transmits in interstate or foreign commerce any communication containing a ...
    85 KB (12,600 words) - 16:49, 1 March 2009
  • ...th for general advice and specific case-related assistance. During regular business hours, a CCIPS attorney is on duty to answer questions and provide assistan ...
    11 KB (1,632 words) - 12:36, 5 August 2011
  • ...family-oriented Web site that was willing to purchase the entire Toysmart business and agree to the terms of the order. In August, however, the federal bankru ...rom the Children’s Advertising Review Unit (CARU) of the Council of Better Business Bureaus, Inc., ESRB Privacy Online, and TRUSTe. See http://www.ftc.gov/priv ...
    31 KB (4,666 words) - 13:19, 26 April 2011
  • <li>obtained anything of value</li> <li>Section 215 allows the FBI secretly to order anyone to turn over business records or any other "tangible things," so long as the FBI tells the secret ...
    22 KB (3,315 words) - 00:16, 16 September 2011
  • ...tity theft protection/insurance services have been heavily marketed, their value has been called into question. ...ing agencies gather and disclose personal and credit information to a wide business client base. ...
    37 KB (5,577 words) - 14:50, 12 November 2011
  • ...ity, trespassing in a government computer, accessing to defraud and obtain value, damaging a computer or information, trafficking in passwords, and threaten ....D.N.Y.2004) (finding that lost revenue due to unfair competition and lost business opportunity does not constitute a loss under CFAA). Andritz, Inc. v. Southe ...
    53 KB (7,910 words) - 21:25, 13 April 2011
  • ...the means to be safe against risks. When protecting information it is the value of the information that has to be protected. These values are stipulated by ...to guarantee safety of information. When protecting information it is the value of the information that has to be protected. These values are stipulated by ...
    32 KB (4,804 words) - 14:10, 27 February 2009
  • ...ak to a supervisor in the electronic surveillance unit. Outside of regular business hours, contact the DOJ Command Center at (202) 514-5000. ...(1977) (noting that § 2511(2)(a)(i) "excludes all normal telephone company business practices" from the prohibition of Title III). These cases generally arose ...
    97 KB (14,928 words) - 13:21, 5 August 2011
  • # obtained anything of value # Section 215 allows the FBI secretly to order anyone to turn over business records or any other "tangible things," so long as the FBI tells the secret ...
    23 KB (3,434 words) - 17:34, 13 April 2011
  • ...QUEST:''' A petition for modifying the behaviour of a system due to normal business changes or because there is a bug in the system (TheFreeDictionary.com). ...
    22 KB (3,132 words) - 19:07, 17 April 2007
  • ..., will have to follow data protection regulation. In principle, any online business trading with EU citizens would process some personal data and would be usin ...
    15 KB (2,297 words) - 16:59, 21 September 2011
  • (5) Government agencies increasingly use computers to conduct agency business and to store publicly valuable agency records and information; and<br> ...
    18 KB (2,889 words) - 10:47, 22 May 2010
  • ...of works. Obviously, the right of reproduction would be of little economic value if the owner of copyright could not authorize the distribution of the copie ...k as a whole; and the likely effect of the use on the potential commercial value of the work.<br> ...
    46 KB (7,265 words) - 12:09, 2 May 2010
  • ...ntly, the district court held a hearing inquiring into the manner in which Business Week came into possession of the documents and issued a permanent injunctio ...
    32 KB (4,920 words) - 19:22, 10 April 2011
  • of business. It is very easy to forge an Email message to make it comes from an unknown source to a computer storing business records, ...
    75 KB (10,622 words) - 14:38, 3 April 2007
  • 2. mailing addresses, residential addresses, business addresses, email addresses, and other contact information; b. mailing addresses, residential addresses, business addresses, email addresses, and other contact information; ...
    83 KB (12,981 words) - 12:42, 5 August 2011
  • ...he court granted immunity from defamation and tortious interference with a business expectancy claims to a website that included consumer complaints. The court ...eider, 31 P.3d at 41-42 (negligent misrepresentation and interference with business expectancy). It extends to state causes of action for violating a statute t ...
    38 KB (5,571 words) - 14:45, 10 April 2011
  • # the effect of the use upon the potential market for or value of the copyrighted work. .... “Courts are more willing to find a secondary use fair when it produces a value that benefits the broader public interest.” Id. "The immediate effect of ou ...
    31 KB (4,913 words) - 07:20, 11 April 2011
  • ...ay, but merely took advantage of the opportunity to do so "to increase his business opportunities (and thus his profits)," eBay's User Agreement was not a cont ...
    18 KB (2,884 words) - 17:00, 13 April 2011
  • ...search computers for evidence of a crime only; the computer might contain business records relevant to a white-collar prosecution, for example, but the comput ...believe that the criminal activity under investigation pervades the entire business. See United States v. Ford, 184 F.3d 566, 576 (6th Cir. 1999) (citing cases ...
    138 KB (21,660 words) - 13:18, 5 August 2011
  • ...-phone style billing system of Cellphone overage charges, free-to-telecom "value added" services, and bundling. Critics of net neutrality also argue that da ...ntee quality or premium delivery would create what Tim Wu calls an "unfair business model." Advocates warn that by charging "every Web site, from the smallest ...
    52 KB (7,736 words) - 20:12, 1 October 2011
  • ...27, 2011|accessdate=May 27, 2011}}</ref> [[roving wiretap]]s, searches of business records (the "[[library records provision]]"), and conducting surveillance ...hout a court order, and the expanded access of law enforcement agencies to business records, including library and financial records. Since its passage, severa ...
    142 KB (21,198 words) - 10:23, 23 August 2011
  • ...ling Effects (group) clearinghouse. Takedown notices targeting a competing business made up over half (57%) of the notices Google has received, the company sai ...
    26 KB (3,969 words) - 11:00, 30 October 2011
  • ...f privacy in customer account records maintained by and for the provider's business. See United States v. Perrine, 518 F.3d 1196, 1204 (10th Cir. 2008) ("Every ...whether the network belongs to a communication service provider, a private business, or a government entity. ...
    154 KB (23,956 words) - 13:16, 5 August 2011