Disaster recoverycontingency plan1 security privacy and

Assignment Help Management Information Sys
Reference no: EM13358335

Disaster recovery/contingency plan

1. Security, Privacy, and Other AIS Issues
You've been hired by a growing organization to perform systems consulting work. The CEO has concerns about systems security and the impact of privacy considerations on the organization's AIS. She is also interested in learning more about new and emerging AIS technologies that the organization should consider. You have been asked to provide a report on these areas. Your report will be used as a basis for planning and developing improvements to the AIS.

Prepare a paper to deliver your findings to the CEO. In your paper, include the following:

a. A disaster recovery/contingency plan that includes the following:
b. Identification and analysis of procedures to detect vulnerabilities and security threats (i.e., controls)
c. Identification and analysis of risks and risk mitigation measures, including plans for
i. Systems and data recovery
ii. Off-site data storage
iii. Business continuity
c. An analysis of the impacts of privacy considerations on AIS (i.e., HIPAA)

Use at least two academically peer-reviewed sources and/or your text author to support your work or your text authors. Be sure to properly cite any references used in your summary. Format the summary according to APA style.

peer-reviewed sources :

HIPPA engagement help. (2003, April). Practical Accountant, 36(4), 10.

Justices: FERPA does not give student right to sue. (2002, Summer). News Media & the Law, 26(3), 34.

Abu-Musa, A. A. (2002, September). Computer crimes: How can you protect your computerized accounting information system? Journal of American Academy of Business, 2(1), 91.

Abu-Musa, A. A. (2002, September). Security of computerized accounting information systems: A theoretical framework. Journal of American Academy of Business, 2(1), 150.

Blackwell, R. (2002, June 17). With N.D. vote, privacy debate returns to fore. American Banker, 167(115), 1.

Bradbury, D. (2003, October 28). How to stay on the right side of the law. Computer Weekly, 48.

Crane , B. (2003, June 30). Small business and the new HIPPA privacy and security requirements -- what every Utah CEO needs to know. Enterprise/Salt Lake City, 33(1), 3.

Greenblatt, R. E. & Bakker, J. J. (2004, Spring). HIPAA privacy compliance: It''s time to take it seriously. Benefits Law Journal, 17(1), 102.

McCarthy, E. (2004, May). The best-laid plans. Journal of Accountancy, 197(5), 46.

Millman, G. J. (2004, July/August). Keeping data under lock & key. Retrieved on July 16, 2004 from Smartpros.com at https://www.smartpros.com/x44287.xml.

Naumann, J. W. (2004, May). Tap Into XBRL''s power the easy way. Journal of Accountancy, 197(5), 32.

Odell, P. (2003, February). HIPPA changes require close study, DMA exec says. Direct, 15(2), 9.

Parker, R. G. (2003, May). How to profit by safeguarding privacy. Journal of Accountancy, 195(5), 47.

Phelan, S. & Hayes, M. (2003, April). Before the deluge -- and after. Journal of Accountancy, 195(4), 57.

Richards, J. & Tower, G. (2004, March). Progress on XBRL from an Australian perspective. Australian Accounting Review, 14(1), 81.

Stewart, D. L. (2001, June 29). To protect and to serve. Intelligent Enterprise, 4(10), 42.

Reference no: EM13358335

Questions Cloud

Computer forensics - analysing hostile codein this week you : computer forensics - analysing hostile codein this week you need to analyze software. in your forensics practice you
Trends shaping the global market for us companieswhat major : trends shaping the global market for u.s. companieswhat major trends technology and economics do you feel are shaping
Important information about information securityi am : important information about information securityi am currently working in the accounting department and i was asked to
Performanc survey wgraphic display of results1 using a : performanc survey wgraphic display of results1. using a microsoft word document create a short survey based on a topic
Disaster recoverycontingency plan1 security privacy and : disaster recoverycontingency plan1. security privacy and other ais issuesyouve been hired by a growing organization to
Web services and types of data storage infrastructuresthis : web services and types of data storage infrastructuresthis solution provides the learner with an understanding of the
Information systems cannot solve every business challenge : information systems cannot solve every business challenge. can you please give me 2-3 business issues and provide an
Collaboration software and the asp modelthis solution : collaboration software and the asp modelthis solution addresses two specific questions for the learner. first this
Collaboration software and the asp modelthis solution : collaboration software and the asp modelthis solution addresses two specific questions for the learner. first this

Reviews

Write a Review

Management Information Sys Questions & Answers

  Conduct a work process improvement analysis

Conduct a work process improvement analysis and make recommendations for improvement in various areas of the supply chain. Use effective communication techniques.

  How will use a relational database to store data

Multidimensional Analysis and Data Versus Information - How will use a relational database to store data, be specific.

  Write an is plan for njit purpose of the plan and their

write an is plan for njit purpose of the plan and their current it infrastructurewrite an is plan for one of the

  Is operational planswhy might companies today develop is

is operational planswhy might companies today develop is operational plans that cover only one year?discusses the

  Question about too much informationtechnology can give us

question about too much informationtechnology can give us answers as fast as we can type. it can also vastly increase

  Advantages and disadvantages of erp package

Advantages and disadvantages of ERP package and What are the advantages and disadvantages of ERP package or specific manufacturing production planning utilities?

  How to prevent the hack attack

Preventing Computer Hacking - Describe the detailing of such an incident. What should the target company have done to prevent the "Hack Attack"?

  Data or voice transmission

Which one is Costly and how- Data or Voice Transmission - Based on today's technologies, is data and voice the same thing? Support your answer from your studies and give an example.

  Find the costs and savings of a videoconferencing system

Costs and savings of a videoconferencing system - I need assistance in developing a spreadsheet to analyze the costs and savings over a three year period.-

  Explain the role of the metrics measurement system

Write a paper in which you define and evaluate the roles of the metrics measurement system that you need to support an innovative organization.

  How to respond information system security treats

Responding to Information System Security Treats - How should organizations respond to information system security threats?

  Management of information systems and itinformation systems

management of information systems and itinformation systems are typically thought of as being the responsibility and

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd