Search results

Jump to navigation Jump to search
View (previous 50 | ) (20 | 50 | 100 | 250 | 500)
  • ...sually created by an organization's [[Chief Information Officer]] (CIO) or technology manager and should be designed to support the organization's overall [[busi One of the principal purposes of creation of a technology strategy is to create consensus and stakeholder buy-in. There are many methods to t ...
    5 KB (777 words) - 17:59, 16 February 2007
  • ...between the business and IT. Enable the alignment of IT to the business in strategy and operations, encouraging co-responsibility between business and IT for m ...
    3 KB (410 words) - 13:30, 4 May 2006
  • ...nd followed for all significant changes in applications and infrastructure technology, which addresses unit, system, integration and user-acceptance-level testin ...
    709 bytes (91 words) - 13:46, 23 June 2006
  • ...nd followed for all significant changes in applications and infrastructure technology, which addresses unit, system, integration and user-acceptance-level testin ...lete and accurate reporting, these interfaces were included in the testing strategy. ...
    3 KB (475 words) - 13:09, 23 June 2006
  • The ISO/IEC 38500 Corporate governance of information technology standard, provides a framework for effective governance of IT to assist tho ...ganizations on the effective, efficient, and acceptable use of Information Technology (IT) within their organizations. It is organized into three prime sections, ...
    1 KB (147 words) - 12:21, 2 May 2010
  • ...cial institution risk management processes to ensure effective information technology (IT) management.<br> ...and business continuity planning. This dual role and the increasing use of technology raise the importance of IT management in effective corporate governance.<br ...
    5 KB (645 words) - 18:03, 27 April 2007
  • ...ring the protection of information assets, and for implementing a security strategy or program. Generally brief in length, policies are independent of particul ...s to a companies Board of Directors. Standards are approved by a companies technology review board.<br> ...
    4 KB (581 words) - 17:06, 30 December 2013
  • ...for IT equipment to support the technology strategy linked to the business strategy. The selection and design of the layout of a site should take into account ...
    2 KB (350 words) - 18:15, 5 May 2006
  • ...th the business organization’s overall procurement process and acquisition strategy to ensure that the acquisition of IT-related infrastructure, facilities, ha ...nd followed for all significant changes in applications and infrastructure technology, which addresses unit, system, integration and user-acceptance-level testin ...
    3 KB (442 words) - 13:59, 23 June 2006
  • ...y Act (SOX) requires companies to document their financial and Information Technology (IT) controls and attest to the effectiveness of the controls on an annual ...ring the protection of information assets, and for implementing a security strategy or program. Generally brief in length, policies are independent of particul ...
    1 KB (204 words) - 13:03, 14 July 2006
  • ..., people skills and competencies, organization structure, and the enabling technology. ...nd followed for all significant changes in applications and infrastructure technology, which addresses unit, system, integration and user-acceptance-level testin ...
    4 KB (538 words) - 13:16, 23 June 2006
  • ...nd followed for all significant changes in applications and infrastructure technology, which addresses unit, system, integration and user-acceptance-level testin ...
    3 KB (396 words) - 14:02, 23 June 2006
  • Configuration Management (CM) is an '''Information Technology Infrastructure Library''' [[ITIL]] IT Service Management [[ITSM]] '''proces ...months in outline. It is reviewed at least twice a year and will include a strategy, policy, scope, objectives, roles and responsibilities, the CM processes, a ...
    4 KB (570 words) - 16:12, 23 March 2007
  • ...ation of the costs of delivering IT capabilities and services. Ensure that technology investments are standardized to the greatest extent possible to avoid the i ...
    3 KB (393 words) - 14:35, 21 June 2006
  • ...ng viable strategies for inclusion in the business continuity plan. Viable strategy options would include any which would enable resumption of a business proce ...://Recoveryspecialties.com/glossary.html Glossary of Business Continuity & Technology Terms] ...
    2 KB (272 words) - 11:15, 27 October 2012
  • ...nd followed for all significant changes in applications and infrastructure technology, which addresses unit, system, integration and user-acceptance-level testin ...
    3 KB (428 words) - 14:05, 23 June 2006
  • ...nd followed for all significant changes in applications and infrastructure technology, which addresses unit, system, integration and user-acceptance-level testin ...
    3 KB (425 words) - 13:19, 23 June 2006
  • ...ring the protection of information assets, and for implementing a security strategy or program. Generally brief in length, policies are independent of particul ...set Management Policy defines objectives for properly managing Information Technology infrastructure, including networks, systems, and applications that store, p ...
    3 KB (404 words) - 14:53, 25 July 2006
  • Develop a strategy and plan for infrastructure maintenance and ensure that changes are control ...nd followed for all significant changes in applications and infrastructure technology, which addresses unit, system, integration and user-acceptance-level testin ...
    6 KB (819 words) - 13:54, 23 June 2006
  • Develop a strategy and plan for the maintenance and release of software applications. Issues t ...nd followed for all significant changes in applications and infrastructure technology, which addresses unit, system, integration and user-acceptance-level testin ...
    6 KB (878 words) - 13:34, 23 June 2006
  • ...nd followed for all significant changes in applications and infrastructure technology, which addresses unit, system, integration and user-acceptance-level testin ...
    3 KB (497 words) - 14:57, 23 June 2006
  • ...nd followed for all significant changes in applications and infrastructure technology, which addresses unit, system, integration and user-acceptance-level testin ...
    6 KB (729 words) - 13:40, 23 June 2006
  • ...nd followed for all significant changes in applications and infrastructure technology, which addresses unit, system, integration and user-acceptance-level testin ...
    6 KB (766 words) - 13:42, 23 June 2006
  • ...nd followed for all significant changes in applications and infrastructure technology, which addresses unit, system, integration and user-acceptance-level testin ...
    6 KB (779 words) - 13:45, 23 June 2006
  • ...nd followed for all significant changes in applications and infrastructure technology, which addresses unit, system, integration and user-acceptance-level testin ...
    6 KB (821 words) - 18:11, 28 August 2006
  • ...nd followed for all significant changes in applications and infrastructure technology, which addresses unit, system, integration and user-acceptance-level testin ...
    6 KB (816 words) - 13:41, 23 June 2006
  • ...ies by defining goals and the strategies used to achieve them. Information technology is an integral part of financial institution operations. Therefore, financi ...focuses on a three to five year horizon and helps ensure the institution’s technology plans are consistent or aligned with its business plans. If effective, stra ...
    19 KB (2,609 words) - 13:51, 23 May 2007
  • ...nd followed for all significant changes in applications and infrastructure technology, which addresses unit, system, integration and user-acceptance-level testin ...
    7 KB (901 words) - 13:44, 23 June 2006
  • ...nd followed for all significant changes in applications and infrastructure technology, which addresses unit, system, integration and user-acceptance-level testin ...
    7 KB (895 words) - 13:44, 23 June 2006
  • ...nd followed for all significant changes in applications and infrastructure technology, which addresses unit, system, integration and user-acceptance-level testin ...
    7 KB (901 words) - 13:43, 23 June 2006
  • :::a. [[SOX.2.7.12:|'''SOX.2.7.12''']] Management has implemented a strategy for cyclical backup of data and programs. ...lder data, encrypt the transmissions by using Wi-Fi Protected Access (WPA) technology if WPA capable, or VPN or SSL at 128-bit. Never rely exclusively on WEP to ...
    5 KB (721 words) - 11:49, 28 March 2008
  • ...is a subset discipline of [[Corporate Governance]] focused on information technology (IT) systems and their performance management and [[risk management]]. The ...bility framework to encourage desirable behavior in the use of information technology."''<br> ...
    12 KB (1,686 words) - 11:47, 30 May 2015
  • ...nd followed for all significant changes in applications and infrastructure technology, which addresses unit, system, integration and user-acceptance-level testin ...
    6 KB (863 words) - 13:12, 23 June 2006
  • ...s how, with some legal and institutional infrastructure, digital signature technology can be applied as a robust computer-based alternative to traditional signat ...al and business communities must develop rules and practices which use new technology to achieve and surpass the effects historically expected from paper forms. ...
    22 KB (3,420 words) - 15:18, 3 April 2007
  • [[PO3.4:| 3.4 Technology Standards]]<br> [[PO4.2:| 4.2 IT Strategy Committee]]<br> ...
    4 KB (517 words) - 19:07, 14 June 2007
  • ...ly dependent on IT and mediate between imperatives of the business and the technology, so agreed priorities can be established.<br> ...
    9 KB (1,301 words) - 16:55, 25 April 2007
  • ...pes of services offered and the complexity of the processes and supporting technology.<br> ...me a higher level of compliance risk because of the changing nature of the technology, the speed at which errors can be replicated, and the frequency of regulato ...
    11 KB (1,523 words) - 10:04, 28 April 2007
  • #[[Enterprise Fax Technology: Changing with the Times | Enterprise Fax Technology: Changing with the Times]] ...ing technology resources for effectiv... | Ftc second requests: leveraging technology resources for effectiv...]] ...
    16 KB (2,124 words) - 11:06, 16 March 2010
  • ...nd followed for all significant changes in applications and infrastructure technology, which addresses unit, system, integration and user-acceptance-level testin ...
    10 KB (1,393 words) - 14:28, 23 June 2006
  • * Consideration of legal restrictions on technology deployments * A rollback strategy in place, including retention of prior versions as a contingency measure ...
    9 KB (1,170 words) - 14:05, 22 May 2007
  • ...Tier II questions correspond to the Uniform Rating System for Information Technology (URSIT) rating areas and can be used to determine where the examiner may re ::* Any significant changes in business strategy, activities, or technology that could affect the audit function; ...
    32 KB (4,518 words) - 17:53, 11 April 2007
  • ...proaches intended to facilitate the delivery of high quality [[information technology]] (IT) services. ITIL outlines an extensive set of management [[procedure]] ...eloped under the auspices of the CCTA was entitled "Government Information Technology Infrastructure Management Methodology" (GITMM) and over several years event ...
    37 KB (5,348 words) - 10:12, 8 September 2011
  • ...d collect and compile information regarding the organization’s information technology environment from several locations including:'''<br> ...ng and monitoring the tactical operations of the institution’s information technology as well as to identifying the access and storage points for confidential cu ...
    43 KB (6,368 words) - 11:22, 4 July 2015
  • ...rty Organization]] (WIPO). It criminalizes production and dissemination of technology, devices, or services intended to circumvent measures (commonly known as [[ ...ol technology. Exemptions are granted when it is shown that access-control technology has had a substantial adverse effect on the ability of people to make non-i ...
    26 KB (3,969 words) - 11:00, 30 October 2011
  • ...ng the Project Management Institute, the National Institute of Science and Technology, actuarial societies, and ISO standards. Methods, definitions and goals var # Prioritize risk reduction measures based on a strategy ...
    27 KB (4,185 words) - 23:45, 10 March 2010
  • ==Information Technology Auditor's Glossary== Digital subscriber line. A technology that uses existing copper telephone lines and advanced modulation schemes t ...
    74 KB (11,078 words) - 13:08, 9 April 2007
  • ...rch/en/] Forget the celebrity CEO. ''"Look beyond Six Sigma and the latest technology fad. One of the biggest strategic advantages a company can have, [BusinessW ...different companies with sufficient liquidity, based on the idea that this strategy will largely eliminate individual company financial risk or other risk and, ...
    45 KB (6,604 words) - 15:20, 15 April 2010
  • ...orate governance. It is their responsibility to endorse the organization's strategy, develop directional policy, appoint, supervise and remunerate senior execu ...ww.ccg.uts.edu.au UTS Centre for Corporate Governance at the University of Technology Sydney, Australia] ...
    29 KB (4,284 words) - 17:19, 20 April 2010
  • B. Devising a Search Strategy ...omputer's hard drive can reveal many different types of evidence. A search strategy should be chosen after considering the many possible roles of the computer ...
    138 KB (21,660 words) - 13:18, 5 August 2011
  • ...ng programs and the BSA was amended to better define anti-money laundering strategy.<ref name="Section354">USA PATRIOT Act (U.S. [[United States House of Repre ...tp://sequoyah.nist.gov/pub/nist_internal_reports/NISTAPP_Nov02.pdf "Use of Technology Standards and Interoperable Databases With Machine-Readable, Tamper-Resista ...
    142 KB (21,198 words) - 10:23, 23 August 2011
View (previous 50 | ) (20 | 50 | 100 | 250 | 500)