Jit2 Risk Management Task 1 Essay

1943 words - 8 pages

a business continuity plan
Total facility lost due to a hurricane.

XYZ Bakery Supply is a global company with a full range of innovative products and application expertise in the bakery, and patisserie sectors. Products and services are available in more than 100 countries around the world, and in many cases actually produced there by our subsidiaries. Clients are artisans, industry, retailers and food service. XZY Bakery Supply aim to be "reliable partners in innovation" wherever we are in the world, and so help our customers deliver nutritious, tasty food for the communities they live in
Business Contingency plan as be simply defined as identification and protection of critical ...view middle of the document...

* CFO will have list of all bank account information, Vendor information and Payroll information. CFO will responsible for “paying the bills” such as paying vendor and direct deposit of employees.
B2: Ethical use and protection of sensitive data
It is imperative that our company protects our sensitive data which includes our bread formulas, Employee/Payroll , vendor information, customer information and accounting information and to always use them ethically. The objective to use our sensitive data ethically and reasonably, there are three components for the mythology. First, How are we going to protect the data to make sure it is being used appropriately users. Second, what is our backup procedure? Lastly, after a major business disruption, how do you recover our sensitive data?
First, the company uses an Enterprise resource planning (ERP) system to centralize the information and have a permission level based access. ERP system is a business management suite that uses a common database system that share data across the various departments (Hossein.B., 2004). ERP system will allow access to the sensitive data information by departmental needs. Also, the company will have confidentiality and ethic training for all employees and will be asked to sign a confidentiality agreement before starting employment. The user interface (UI) can be anything from think client, think client like Telnet or secure web browser based. The company will go with secure web Brower to access data.
The proactively backup your data is to backbone of protection your company’s data. Your data is only good as your last successful backup. The company will back up their ERP system just like any other system, either to a tape drive or some kind of hard disk system such in a RAID 5 or RAID 6 system using incremental backups. Moreover, the core database will backup daily to ERP system vendor. This will give redundant backup of the core database, remote backup of core database, and if local system becomes unavailable the ERP system vendor can host the database which will give access to our database via secure web browser connection via HTTPS.
After a major business interruption and the data because unavailable for any length of time, the ERP system vendor can host the database and give limited access to the database such as employee payroll, supplier information, Customer information and company accounting information via secure web browser connection until he local system can come back online and the changed information can be appended to the local system.
B3: Ethical use and protection of customer data
The company’s customers are bakery artisans, industry, retailers and food service providers who purchase baking ingredients and supplies from the company. The customer data includes: Company, Address, phone number, Fax number, Email Address, Balance, past order invoices, Current Invoice, and Payment info, just to name a handful and protection of the customer data and...

Other assignments on Jit2 Risk Management Task 1

Risk Management Essay

888 words - 4 pages “Risk Management on a Satellite Development Project” Case Study #3 Tammie Y. Harris Professor Dr. Mary Hair Collins Managing Human Resource Projects- HRM517004VA016-1128-001 December 5, 2012 1.) Suggest the issues that could have developed had the team not had a risk plan. The prime factor of project team failure is poor overall initial planning. When unrealistic goals are set, creating a chaotic working atmosphere there

Managing Projects Essay

576 words - 3 pages Deliverable 4: Risk Management Table of contents 1. Introduction 2. Scheme Used for Risk Management. 3. Risk Management Strategies 3.1. Risk Register 3.2. Risk Treatment 4.Risk management incorporated as activities in project 5. Others 1. Introduction. It should not surprise to anyone that the concept of risk and its identification, management and control risk will be one of the major forces the project stakeholders. We

Mgmt

4499 words - 18 pages management task will include: 1. Review. 2. Analyse and plan. 3. Monitor. Your primary risk management focus is directed to the ongoing operations of the Toowoomba cafe. The strategic and investment risks of this project are being managed by the board. To this end, you are to consider any risks that could impact on human resources management, financial operations, WHS, our supply chain and the local governance and overall compliance

Understanding Nist 800‐37  Fisma Requirements 

2451 words - 10 pages  guidance.1   Other security‐related publications, including interagency and internal reports (NISTIRs), and  ITL Bulletins, provide technical and other information about NIST's activities. These publications  are mandatory only when so specified by OMB.  • •   3        II. NIST Risk Management Framework for FISMA  NIST has created a set of standards and guides which create a Risk Management Framework for  agencies to manage

Finance

265 words - 2 pages Uttara University Department of Business Administration Program – MBA Semester –Autumn 2013 Course Title: Investment Analysis and portfolio Mgt. Course Teacher: Md. Azizur Rahman (Assistant Professor of Finance) Lesson Plan for Midterm |CHAPTER| |Investment, The Importance of Financial Investments, Investment Management Process, Measures of | |1

Risk Management

421 words - 2 pages manner. In order to support the organization, IT security professionals must be able to help their organizations’ management understand and manage these uncertainties. Managing uncertainties is not an easy task. Limited resources and an ever-changing landscape of threats and vulnerabilities make completely mitigating all risks impossible. Therefore, IT security professionals must have a toolset to assist them in sharing a commonly understood

Dlis Risk Managment Analysis Outline

532 words - 3 pages Jesse Robinson 01/05/2014 Week 2 Project 1 part 1 Purpose: This risk management plan was called into development by the DLIS or the Defense Logistics Information Agency, a sub organization of the Defense Logistics Agency. Senior management at the DLIS has determined that the previous risk management plan for the organization is out of date and that a new risk management plan must be developed. Due to the importance of risk management

Project Risk Managment Plan Template

1648 words - 7 pages update the Table of Contents, right-click and select “Update field” and choose the option- “Update entire table” 4. Before submission of the first draft of this document, delete this “Notes to the Author” page and all instructions to the author, which appear throughout the document as blue italicized text enclosed in square brackets.] TABLE OF CONTENTS 1 INTRODUCTION 1 1.1 Purpose Of The Risk Management Plan 1 2 risk management Procedure

Budget

1830 words - 8 pages reduce the time to sift through customers' data by a fraction of the present time. Part 1: List and discuss the major risk-management functions from a project-management perspective for the data-mining software project. (15 points) Part 2: Describe a risk event, the consequences, and the risk-response plan for the data-mining software project. (15 points) 6.(TCO F) Analyze and compare the costs of the two projects in terms of performance

Week 1

1698 words - 7 pages | Jade Xiong | Project Scope Statement | Week 3 | Jade Xiong | WBS and Network Diagram | Week 4 | Jade Xiong | Risk Management Plan | Week 5 | Jade xiong | Resource Management Plan | Week 6 | Jade Xiong | Communications Plan | Week 7 | Jade Xiong | Final Project | Week 8 | Jade Xiong | b. Task assignments: How will tasks be assigned? Every team member should have an active role in creating the tasks for each major

Enterprise Risk Management

959 words - 4 pages Enterprise Risk Management Lori Abbott Law 531 September 24, 2012 Charles Burr Enterprise Risk Management Enterprise risk management (ERM) is the latest name for a risk management approach to business risks. Forerunners of this term include corporate risk management, business risk management, strategic risk management, integrated risk management, and holistic risk management (D'Arcy, 2001). Implementing the techniques of ERM

Similar Documents

Risk Management Plan Essay

552 words - 3 pages organization. Scenario:In order to help protect the company and ensure it maintains compliance with laws and regulations, senior management at YieldMore has decided to develop a formal risk management plan. As an employee of YieldMore, your team has been given the task of creating a risk management plan for the organization. Tasks:You will initiate a kick off meeting to discuss YieldMore’s risk management plan with your team. 10 points 1.  Review the

Six Images Of Managing Change Essay

417 words - 2 pages . Introductions Main purpose of this report is to develop a secure and centralized system to with minimum flaws with very efficient on cost which will also be very easy to operate. Project Management Overview Statement of work * Task 1 - To identify all the flaws on the current system. * Task 2 - To prepare plan for the improved system. * Task 3 – To implement plans prepared in Task 2. Project Team Sunny Ghimire. Rahul Maharajan

English Essay

619 words - 3 pages Student number: 156854 Name: Zhang Jiahao Chapter 3 1. Search the web for recent review of project management software. Which packages seem to be most popular? What are the relative strengths and weaknesses of each package? What advice would you give to someone intending to buy project management software for his or her PC? Why? 2. Which of the four phases of the project management process do you feel is most challenging? Why

Is3350 Essay

310 words - 2 pages Larry Brown IS3350 Unit 9 Assignment 1 24 May 2914 Risk Mitigantion The most effective risk management practices used by project management in the public and private sectors. The methods described here are appropriate for public- and private-sector project owners’ representatives, including senior managers, program managers, project directors, and project managers. The primary objective of this report is to provide DOE project directors