Discuss what constitutes sensitive data

Assignment Help Management Information Sys
Reference no: EM132182667

Create a risk register (suggested length of 3-5 pages) that identifies eight risks currently facing the company.

Explain how one of the identified risks stems from an aspect of the company's global marketplace activities (e.g., manufacturing uncertainties, problems with suppliers, political instability, currency fluctuations).

Describe the source(s) of each risk.

Explain how each risk stems from the described source(s) (suggested length of 1-2 sentences for each source).

Identify the risk level for each risk (i.e., high, medium, or low).

Justify each identified risk level in terms of the following:

• severity of the impact

• likelihood of occurrence

• controllability

Discuss an appropriate risk response for each risk from part A (suggested length of 1 paragraph per risk) to reduce the possible damage to the company.

Create a business contingency plan (BCP) (suggested length of 6-10 pages), such as that included in a policy manual, that the company would follow if faced with a major business disruption by doing the following:

Discuss what strategic pre-incident changes the company could follow to ensure the well-being of the company.

Discuss the ethical use and protection of sensitive data by doing the following:

Discuss what constitutes sensitive data.

Explain how data will be physically protected during normal business operations.

Explain how data will by physically protected in the event of a disruption.

Explain how the company will ensure data is used ethically.

Discuss the ethical use and protection of customer records by doing the following:

Discuss what constitutes customer records for your chosen company.

Discuss the systems or security measures that would be put in place to protect customer records during normal business operations.

Discuss the systems or security measures that would be put in place to protect customer records in the event of a disruption.

Explain how the company will ensure customer records are used ethically.

Discuss the communication plan to be used during and following a disruption.

Identify the stakeholders who would need to be contacted in the event of a disruption.

Describe the specific actions that will need to take place to communicate with each stakeholder.

Discuss how normal operations will be restored after a disruption has occurred (post-incident).

Create an implementation plan (suggested length of 1-2 pages) for the BCP from part C by doing the following:

Discuss how the BCP will be implemented into the company.

Discuss how the BCP will be communicated to the organization.

Discuss how the BCP will be monitored or tested before the incident to ensure the plan would be effective in the event of a disruption.

Discuss how the BCP will be adjusted over time.

Discuss how changes to the plan will be communicated to the company.

If you use sources, include all in-text citations and references in APA format.

Reference no: EM132182667

Questions Cloud

Most expensive healthcare system in the world : The US has the most expensive healthcare system in the world: why is it not the best?
Evidence suggest war is becoming less common and less deadly : Select one reason and explain the logic linking it to declining incidence of war, deadliness of war, or both. Be sure to refer to specific facts to support
Explain how admissions officers practice affirmative action : One issue that continues to be debated in our political system is Affirmative Action A) Explain HOW admissions officers practice affirmative action,
Summarize what you learned in sentences : Summarize what you learned in 5+ sentences, and in 5+ more sentences, tell me why this problem occurred, what can be done, and how you would fix the problem.
Discuss what constitutes sensitive data : Discuss an appropriate risk response for each risk from part A (suggested length of 1 paragraph per risk) to reduce the possible damage to the company.
What types of injury of public health concern : What types of injury of public health concern are associated with exposure to each of the different forms of radiation? How does the risk of each injury vary.
Rawls second theory of justice : What are "the system of natural liberty," "liberal equality," and "natural aristocracy" in Rawls second theory of justice and why does he reject each of them?
What are some of the network security testing tools used : What are some of the Network Security Testing Tools used on networks. Describe them, provide a link to the tool.
Explain american political culture : What did French writer Alexis De Tocqueville observe about the United State and how does his observations help explain American Political Culture?

Reviews

Write a Review

Management Information Sys Questions & Answers

  What is advantage of buying a solution from another company

What is an advantage of buying a solution from another company? IT personnel who understand both the technical IT infrastructure and management of the business fill which role?

  Challenges he will face in managing the merger with nokia

Do some reading about Nadella and the challenges he will face in managing the merger with Nokia. Also, review the background materials on organizational change and pay close attention to models such as the Lewin three-step model, Kotter's eight s..

  Different sources can be usefully aggregated

What are the different ways in which data from different sources can be usefully aggregated?

  Describing a workplace application architecture

Write a 1,050- to 1,400-word paper that analyzes the work-related project specified last week, describing a workplace application architecture and process design

  Discuss the positive and negative effects

Discuss the positive and negative effects that a significant increase of customers would have on each department over a one-year time period

  Compare and contrast the selected frameworks

Select 3 frameworks, and discuss how they are used to represent an integration of system components. Compare and contrast the 3 selected frameworks.

  Does the article provide an adequate literature review

Does it discuss current research on the problem and help to situate the author's own research through a clear analysis/presentation of the literature (think about how it connects to the problem statement)? Is the research question clear and/or pur..

  How a move to the cloud will affect your email security plan

Explain the role that anti-malware software will play in securing e-mail. What software would you use? Why?

  Does the otr time appear to be stable why or why not

Does the OTR time appear to be stable? Why or why not? If you were to use a control chart to evaluate stability, which chart would you use? Why? What can you learn about the distribution of the installation process?

  Explain the role of business process reengineering

Explain the role of business process reengineering (BPR) in enhancing competitiveness?

  What strategic advantage does kaiser gain from ehr system

Is Kaiser's experience typical of leading-edge companies? If so, how? Researchers associated with Kaiser Permanente have used the patient record database to make numerous worthwhile discoveries in the areas of preventing whooping cough, determinin..

  How would use address this troublesome trend

These viruses combined have caused damages into the billions of US Dollars. How can one protect against virus outbreaks in an organization? What are the common causes of this problems? How would use address this troublesome trend?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd