...Changes Made By (Name) | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Purpose The purpose of this business continuity plan is to prepare TnA and TnA in the event of extended service outages caused by factors beyond our control (e.g., natural disasters, man-made events), and to restore services to the widest extent possible in a minimum time frame. All TnA sites are expected to implement preventive measures whenever possible to minimize network failure and to recover as rapidly as possible when a failure occurs. The plan identifies vulnerabilities and recommends necessary measures to prevent extended service outages. It is a plan that encompasses all TnA system sites and operations facilities. Scope The scope of this plan is limited to . This is a business continuity plan, not a daily problem resolution procedures document. Plan Objectives 0 Serves as a guide for the TnA recovery teams. 1 References and points to the location of any data that resides outside this document. 2 Provides procedures and resources needed to assist in recovery. 3 Identifies vendors and customers that must be notified in the event of a disaster. 4 Assists in avoiding confusion experienced during a crisis by documenting, testing and reviewing recovery procedures. 5 Identifies alternate sources for supplies, resources and locations. 6 Documents storage, safeguarding and...
Words: 5176 - Pages: 21
...for more detailed coverage. • Compliance stipulations : The introduction often contains any general compliance stipulations that apply to the RFP process, including vendor selection and performance of the proposal contents. W hile government-related RFPs usually contain statements of compliance with equal opportunity and disability regulations, any other mandatory compliance requirements will be included here. • Communications: This section defines the primary point of contact with the client and the preferred communication mechanism. • Initial process: The introduction normally contains brief instructions that inform prospective respondents how to get started in the RFP response process and lists any upcoming meetings or events. Schedule of events: The Schedule...
Words: 707 - Pages: 3
...CIS511 – Enterprise Resource Planning – Mid-Term * Question 1 Needs Grading | | | List 2 advantages of using a vanilla ERP system.Answer | | | | | Selected Answer: | 1. Total integration and standardization 2. Re-engineering of business processes | Correct Answer: | 1. Less expensive2. More likely to come in under or on budget.3. Easier to implement.4. Uses industry best practices. | | | Response Feedback: | [None Given] | | | | | * Question 2 Needs Grading | | | List 5 tangible benefits with an ERP.Answer | | | | | Selected Answer: | Tangible benefits: 3. Inventory reduction 4. Personnel reduction 5. Productivity improvement 6. Order management improvement 7. Financial close cycle reduction | Correct Answer: | 1. Inventory reduction.2. Personnel reduction.3. Productivity improvement.4. Order management improvement.5. Financial close cycle reduction.6. IT cost reduction.7. Procurement cost reduction.8. Cash management improvement.9. Revenue/profit increase.10. Transportation/logistics cost reduction.11. Maintenance reduction.12. On-line delivery improvement. | | | Response Feedback: | [None Given] | | | | | * Question 3 Needs Grading | | | List 5 intangible benefits with an ERP.Answer | | | | | Selected Answer: | Intangible benefits: 8. Information/ visibility 9. New/ improved processes 10. Customer responsiveness 11. Integration 12...
Words: 849 - Pages: 4
...Incident Response Plan Example This document discusses the steps taken during an incident response plan. To create the plan, the steps in the following example should be replaced with contact information and specific courses of action for your organization. 1)The person who discovers the incident will call the grounds dispatch office. List possible sources of those who may discover the incident. The known sources should be provided with a contact procedure and contact list. Sources requiring contact information may be: a)Helpdesk b)Intrusion detection monitoring personnel c)A system administrator d)A firewall administrator e)A business partner f)A manager g)The security department or a security person. h)An outside source. List all sources and check off whether they have contact information and procedures. Usually each source would contact one 24/7 reachable entity such as a grounds security office. Those in the IT department may have different contact procedures than those outside the IT department. 2)If the person discovering the incident is a member of the IT department or affected department, they will proceed to step 5. 3)If the person discovering the incident is not a member of the IT department or affected department, they will call the 24/7 reachable grounds security department at xxx-xxx. 4)The grounds security office will refer to the IT emergency contact list or effected department contact list and call the designated numbers in order on the...
Words: 1230 - Pages: 5
...organization that assists artists with the production and presentation of new work. It changes in response to the needs of artists and informs and engages the public about their work. The organization was founded in 1981 by artists Martin Weinstein and Teresa Liszka in the General Hardware building. Weinstein and Liszka aimed to create a space where artists could exhibit unconventional work and exchange ideas with their peers. Now, Art in General fulfills its mission in a variety of ways, including the organization and presentation of exhibitions, hosting a national and international artist residency program, and through regular public programs and membership events. Beginning in 2005, its exhibition program has focused on the commissioning of new work from artists. Art in General resides in a six story building. It has two main gallery spaces, one on the sixth floor, and another in a street-level storefront known as the Project Space. The exhibition program focuses primarily on presenting artists’ work created through the New Commissions and Artist Residency Programs. When the commissioned artworks and projects are event-based, ephemeral or non-objects, special formats or programming are designed for the public to experience the work. The New Commissions Program, now the central focus of Art in General, has flourished since its launch in 2005. The program was created in response to New York City artists’ need of support during the initiation and early stages of their projects...
Words: 2137 - Pages: 9
...Can the impact of one specific risk event, such as a technical risk event, create additional risks, which may or may not be technical risks? Can risk events be interrelated? The technical risks categorized in Exhibit I related with scientific research requirements and state-of-the-art advancements are a potential risk to other areas of the firm’s processes. If those risks are not adopted, Luxor’s manufactured products will not meet the marketing requirements. All risks that accompany the improvements, whether they may be “linked” to technological or developmental “breakthroughs” can determine Luxor’s outcome. 2. Does the list provided by marketing demonstrate the likelihood of a risk event or the impact of a risk event? The list prepared and provided by marketing demonstrates the potential impact Luxor will bear if they misplace their competitive edge; thus concluding a serious threat to Luxor’s growth and even survival, by way of, being required to provide outside vendors with proprietary information. 3. How does one assign probabilities to the marketing list? The marketing list of separate entities presented to management is simply a scenario analysis. In order words, no qualitative analysis was applied, the list stems from one potential risk, such as the fear of no longer being the leading technology-driven company. 4. The seven items in the list provided by engineering are all ways of mitigating certain risk events. If the company follows these suggestions...
Words: 842 - Pages: 4
...ATP’s Emergency Management Plan, administered by the Communication Coordinator. For the purposes of this plan, a crisis is defined as a significant event that prompts significant, often sustained, news coverage and public scrutiny and has the potential to damage the institution’s reputation, image or financial stability. A crisis could be precipitated by an emergency or a controversy. An emergency is a fire, hurricane, crime or other event that presents a threat and typically...
Words: 1394 - Pages: 6
...Lab 8 BCP 2/24/2015 Document internal key personnel and backups. These are people who fill positions without which your business absolutely cannot function make the list as large as necessary but as small as possible. Consider which job functions are critically necessary, every day. Think about who fills those positions when the primary job-holder is on vacation. Make a list of all those individuals with all contact information including business phone, home phone, cell phone, personal email, and any other possible way of contacting them in an emergency situation where normal communications might be unavailable. If you have critical vendors or contractors, build a special contact list that includes a description of the company and any other absolutely critical information about them including key personnel contact information. Personal computers often contain critical information so make sure they are all on backups. Identify critical documents. Articles of incorporation and other legal papers, utility bills, banking information, building lease papers, tax returns, you need to have everything available that would be necessary to start your business over again. A business impact analysis (BIA) predicts the consequences of disruption of a business function and process and gathers information needed to develop recovery strategies. Potential loss scenarios should be identified during a risk assessment. Identifying and evaluating the impact of disasters on business provides the...
Words: 806 - Pages: 4
...Team Project: Game Plan X Portal Project B Ziad Alsuhaibani, Rayan Arab, Mohammad Farsi, Lucerito Marte-Calonge, Joseph Ruiz MBA 617 Professor Roman Wong, PhD, CPA Summer 2011 To access their webpage a user must open their Internet explorer or similar webpage browser and type GamePlanX.com. This will take them to the GamePlanX Homepage, see appendix A for the comprehensive schema for the website. Once signed in, a user has the capability to use the webpage to its full potential. For example, by clicking the Home button, a user will be re-routed from any part of the webpage to the homepage (appendix 1.1). Any of the website features can be accessed from the homepage, and this is the first page a user will view once they log in. Under the Homepage, a user has the option to access different parts of the webpage; these are the Mentoring section, Career, Wellness, Expert Blogs, Forums, E-Concierge and Multimedia (appendix 1.2 thru 1.8). Under the MyGPX section (appendix b) of the webpage, a user has many options. For example, under the Edit Profile section (appendix 2.1 and 2.2), a user can edit their personal information, which includes their name, address, privacy settings, email settings, password and photos. A user may also write and send messages. Appendix 3.1 and 3.2 illustrates what the users may view in the My Apps section. Here the user may install and then interact with their applications. Expert users have the authority to add or remove apps. In addition, Expert...
Words: 6563 - Pages: 27
...| AUDIT INVESTIGATION | | Individual assignmentLecturer: Ms. NABILAH BINTI AZAHARIDONE by: KELVIN FAUSTIN SANGAWEHand in Date: 27th APRIL 2016 | | | | Table of Contents Qn1. (a) Substantive procedures 2 TRADE PAYABLES AND ACCRUALS 2 RECEIVABLES 2 Reorganisation 3 SOURCES OF INFORMATION 3 The previous year Cherry Blossom’s audit file 3 The Cherry Blossom’s Management 3 Permanent Cherry Blossom’s Audit file 3 Cherry Blossom’s Website 3 Cherry Blossom’s Competitors financial statements 4 Audit risks and Auditors responses 4 The factors the finance director should consider before establishing an internal audit department. 6 WEAKNESSES IN THE SALES AND COLLECTION DEPARTMENT 7 The effects of the above weaknesses 8 Recommendations 8 REFFERENCES 10 Qn1. (a) Substantive procedures TRADE PAYABLES AND ACCRUALS * The comparison of Sakura’s trade payables and list of the accruals should be done against the prior year and investigate the significance differences. * Check the after date payment and then compare if they relate to the current year so as to follow through the purchase ledger or accrual listing to ensure that they were all paid in the correct period as stated. * Discuss with management the process they have undertaken to quantify the understatement of trade payables due to the cut-off error that happened that the purchase ledger earlier than its period and consider the materiality of the error. * Calculate...
Words: 2452 - Pages: 10
...Goals Use Cases and Event Decomposition Use Cases and CRUD Use Cases in the RMO Business Case User Case Diagrams Systems Analysis and Design in a Changing World, 6th Edition 2 Learning Objectives Explain why identifying use cases is the key to defining functional requirements Describe the two techniques for identifying use cases i.e. user goal technique and event decomposition technique to identify use cases Apply the CRUD technique to validate and refine the list of use cases Describe the notation and purpose for the use case diagram Draw use case diagrams by actor and by subsystem Overview Chapter 2 provided an overview of systems analysis activities, functional and non-functional requirements, modelling, and information gathering techniques This Chapter focuses on identifying and modelling the key aspect of functional requirements – Use Cases In the RMO Tradeshow System from Chapter 1, some use cases are Look up supplier, Enter/update product information, Enter/Update contact information This chapter’s opening case Waiters on Call, examples of use cases are Record an order, Record delivery, Update an order, Sign in driver, Reconcile driver receipts, Produce end of day deposit slip, and Produce weekly sales reports Systems Analysis and Design in a Changing World, 6th Edition 4 Systems Analysis and Design in a Changing World, 6th Edition 3 1 7/25/2014 Use Cases Use Case — An activity that the system performs, usually in response to a request by...
Words: 1939 - Pages: 8
...Initiation Document: We are a Project Management company, with twenty employees and four owners and managers at the same time: Denisa Nicoara, Camilla Coriani, Horatiu Ilea and Nicola Longo. 1.1. The statement of client need: The Apple team has asked us, the Orchid Project Management company to assign a team that is going to plan the launch of their new IPhone 5S. When Apple launches a new product, everything needs to be planned to the last detail and no one can know about what is going to happen during the launch, but everybody has to be talking about the launch long time before it takes place. The launch has to take place in San Francisco's Yerba Buena Center for the Arts and the invitations for the event have to have on the envelope only the date of the event and inside only the location, the hour and the designated seat. Our goal is to invite one thousand people to the launch of the new IPhone 5S. The mission of the project is to launch the new IPhone in the whole world at the same time as in the US through a live broadcast; therefore the...
Words: 3273 - Pages: 14
...completing homework to earn a reward from a parent or teacher, or employees finishing projects to receive praise or promotions. In these examples, the promise or possibility of rewards causes an increase in behavior, but operant conditioning can also be used to decrease a behavior. The removal of an undesirable outcome or the use of punishment can be used to decrease or prevent undesirable behaviors. For example, a child may be told they will lose recess privileges if they talk out of turn in class. This potential for punishment may lead to a decrease in disruptive behaviors. Components of Operant Conditioning Some key concepts in operant conditioning: Reinforcement is any event that strengthens or increases the behavior it follows. There are two kinds of reinforcers: 1. Positive reinforcers are favorable events or outcomes that are presented...
Words: 5287 - Pages: 22
...BCHHS utilizes a communications service, called Nixle, to allow us to send important emergency information directly to employee cell phones. This policy outlines the use of Nixle to communicate with BCHHS employees in the event of an emergency or threat to safety. Nixle alerts will be sent in the form of an email, text message, and over the web. The service is secure, reliable, and easy to use. Information entered into Nixle is confidential and will not be sold to a third party. Nixle has been notified that the BCHHS employee phone list is confidential information and must not be shared with any outside vendors. Nixle alerts will be used to: • Alert field based staff of violent or deadly events occurring out in the community that may pose a risk to...
Words: 799 - Pages: 4
............................................................................................................................ 5 Risk Management Processes......................................................................................................................... 6 Known Risks - Unknown Risks ....................................................................................................................... 8 Risk Category............................................................................................................................................... 10 SWOT Analysis............................................................................................................................................. 12 Risk Response Planning Strategies.............................................................................................................. 14 Contingency Plan & Fallback Plan ............................................................................................................... 16 Residual Risk ............................................................................................................................................... 17 Secondary Risk ............................................................................................................................................ 18 Risk Reserve ......................................................................................................................................
Words: 4199 - Pages: 17