Discuss what constitutes sensitive data

Assignment Help Management Information Sys
Reference no: EM132182667

Create a risk register (suggested length of 3-5 pages) that identifies eight risks currently facing the company.

Explain how one of the identified risks stems from an aspect of the company's global marketplace activities (e.g., manufacturing uncertainties, problems with suppliers, political instability, currency fluctuations).

Describe the source(s) of each risk.

Explain how each risk stems from the described source(s) (suggested length of 1-2 sentences for each source).

Identify the risk level for each risk (i.e., high, medium, or low).

Justify each identified risk level in terms of the following:

• severity of the impact

• likelihood of occurrence

• controllability

Discuss an appropriate risk response for each risk from part A (suggested length of 1 paragraph per risk) to reduce the possible damage to the company.

Create a business contingency plan (BCP) (suggested length of 6-10 pages), such as that included in a policy manual, that the company would follow if faced with a major business disruption by doing the following:

Discuss what strategic pre-incident changes the company could follow to ensure the well-being of the company.

Discuss the ethical use and protection of sensitive data by doing the following:

Discuss what constitutes sensitive data.

Explain how data will be physically protected during normal business operations.

Explain how data will by physically protected in the event of a disruption.

Explain how the company will ensure data is used ethically.

Discuss the ethical use and protection of customer records by doing the following:

Discuss what constitutes customer records for your chosen company.

Discuss the systems or security measures that would be put in place to protect customer records during normal business operations.

Discuss the systems or security measures that would be put in place to protect customer records in the event of a disruption.

Explain how the company will ensure customer records are used ethically.

Discuss the communication plan to be used during and following a disruption.

Identify the stakeholders who would need to be contacted in the event of a disruption.

Describe the specific actions that will need to take place to communicate with each stakeholder.

Discuss how normal operations will be restored after a disruption has occurred (post-incident).

Create an implementation plan (suggested length of 1-2 pages) for the BCP from part C by doing the following:

Discuss how the BCP will be implemented into the company.

Discuss how the BCP will be communicated to the organization.

Discuss how the BCP will be monitored or tested before the incident to ensure the plan would be effective in the event of a disruption.

Discuss how the BCP will be adjusted over time.

Discuss how changes to the plan will be communicated to the company.

If you use sources, include all in-text citations and references in APA format.

Reference no: EM132182667

Questions Cloud

Most expensive healthcare system in the world : The US has the most expensive healthcare system in the world: why is it not the best?
Evidence suggest war is becoming less common and less deadly : Select one reason and explain the logic linking it to declining incidence of war, deadliness of war, or both. Be sure to refer to specific facts to support
Explain how admissions officers practice affirmative action : One issue that continues to be debated in our political system is Affirmative Action A) Explain HOW admissions officers practice affirmative action,
Summarize what you learned in sentences : Summarize what you learned in 5+ sentences, and in 5+ more sentences, tell me why this problem occurred, what can be done, and how you would fix the problem.
Discuss what constitutes sensitive data : Discuss an appropriate risk response for each risk from part A (suggested length of 1 paragraph per risk) to reduce the possible damage to the company.
What types of injury of public health concern : What types of injury of public health concern are associated with exposure to each of the different forms of radiation? How does the risk of each injury vary.
Rawls second theory of justice : What are "the system of natural liberty," "liberal equality," and "natural aristocracy" in Rawls second theory of justice and why does he reject each of them?
What are some of the network security testing tools used : What are some of the Network Security Testing Tools used on networks. Describe them, provide a link to the tool.
Explain american political culture : What did French writer Alexis De Tocqueville observe about the United State and how does his observations help explain American Political Culture?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Research report describing sap key erp systems

A description of each ERP - a list and description of each associated models - Write a research report describing SAP key ERP systems

  Discuss how this relationship is even more challenging

Discuss how this relationship is even more challenging in the U.S. Provide examples to illustrate. (Are there examples in cyber?)

  Analysis phase of systems development

The analysis phase of systems development includes the fact-finding process in terms of the situation pertaining to the system utilization. Mr. X believes that the only way to find facts is to interview system users.

  Usa today technologyyou and your partner go out to lunch in

usa today technologyyou and your partner go out to lunch. in a quiet restaurant where no one can hear your conversation

  Discuss the encryption in organizations

discuss the Encryption in Organizations. Detail the key points that you would use to justify the importance of using encryption during the overall security.

  What type of organizational culture inhibit whistle blowing

If you have worked for an organization that had internal auditors, IGs, or inspectors, were they effective? Were they welcome? What, in your experience, was done well and what was done poorly with such internal auditors and inspectors?

  Describe the security features within the application

HIM 220 : Determine the necessary requirements of applications to ensure they adhere to applicable regulations. Explain each requirement.

  Describe at least one attribute of functions

Services Operations is the book that contains the functions defined in ITIL. Name the four functions.

  Discussion of how business use of it has evolved during the

discussion of how business use of it has evolved during the past 50 years.discuss how business use of it has evolved

  Describe the steps of the operation and maintenance phase

Describe Steps of the operation and maintenance phase. Based on your analysis of each phase of the ERP system project described in this case study.

  Which estimate would you use

How many different estimating techniques were discussed in the case?If you were the project manager, which estimate would you use?

  How did you locate the required information about viruses

Create a Word document that contains steps to properly safeguard a computer from viruses, ways to prevent viruses.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd