Free Essay

Jit2 Task 1 Instructions

In: Business and Management

Submitted By Sekindo
Words 923
Pages 4
SUBDOMAINS:
325.3 ­ SOLVING PROBLEMS & MAKING DECISIONS
326.3 ­ EVALUATING ECONOMICS OF MANAGEMENT DECISIONS
326.4 ­ MANAGING ENTERPRISE RISK & CONTINUITY
329.5 ­ USING INFORMATION SYSTEMS FOR COMPETITIVE ADVANTAGE

Competencies:
325.3.4: Problem Solving ­ The graduate applies the problem solving process to solve organizational and team problems, and develops strategies to avoid decision­making pitfalls.
326.3.1: Decision Analysis ­ The graduate analyzes risks and values and uses a variety of decision analysis tools and decision theory to evaluate alternatives during decision­making processes. 326.4.1: Enterprise Continuity ­ The graduate analyzes enterprise continuity plans and the continuity planning process to ensure the inclusion of essential elements, processes, and stakeholder roles.
326.4.2: Continuity and the Global Marketplace ­ The graduate applies international standards to company operations and assesses and recommends strategies for maintaining organizational stability and continuity in the global marketplace.
326.4.3: Contingency Planning ­ The graduate develops and analyzes organizational contingency plans for responding to sudden and rapid environmental changes.
326.4.4 Risk Evaluation and Mitigation ­ The graduate evaluates internal and external risks and recommends risk mitigation strategies and techniques to an organization.
326.4.5: Organizational Risk Management Programs ­ The graduate develops and assesses enterprise risk management programs for organizations and incorporates industry best practices in risk management processes and programs.
326.4.6: Risk Optimization ­ The graduate uses risk control and risk optimization analytics and strategies to maximize returns relative to risk for organizations.
329.5.3: Ethics and Information Technology Security ­ The graduate makes ethical decisions for the use of information technology and creates processes to maintain the security of data in information technology systems.

Introduction:
As a newly hired consultant, you have been tasked with the duties of creating and presenting a risk management/business contingency plan for your first client. The legal department and the IT department have both expressed concerns regarding the ethical use and protection of sensitive data, customer records, and other information systems content. In the interest of creating confidence and job satisfaction in this new position, your new employer has decided to let you select your first client.
For this task, you may select your client from your actual place of employment, a local small business, or a well­known public company. The client must operate internationally in at least some aspects of its business.
Note: Any information that would be considered confidential, proprietary, or personal in nature should not be included. Do not include the actual names of people, suppliers, the company, or other identifiable information. Fictional names should be used. Also, company­specific data, including financial information, should not be included, but may be addressed in a general fashion if appropriate.
Task:
Note: Your submission may be in a variety of formats (e.g., report, multimedia presentation,

video presentation).
Parts A, B, and C should all be submitted to TaskStream at the same time, but as three individual documents. A. Create a risk register with eight risks currently facing the business to include the following.
1. Explain how one of the identified risks emanates from an aspect of the company’s global marketplace activities (e.g., manufacturing uncertainties, problems with suppliers, political instability, currency fluctuations).
2. Discuss the source(s) of each risk.
3. Evaluate the risk level for each risk in terms of severity of the impact, likelihood of occurrence, and controllability.
4. Develop an appropriate risk response for each risk to reduce the possible damage to the company. Note: This section should be included as a separate, detailed discussion to accompany the risk register.

B. Create a business contingency plan (BCP) that the company would follow if faced with a major business disruption (e.g., hurricane, tornado, terrorist attack, loss of a data center, the sudden loss of a call center in a foreign country, the collapse of a financial market or other catastrophic event) in which you include the following:
1. Analyze strategic pre­incident changes the company would follow to ensure the well­being of the enterprise.
2. Analyze the ethical use and protection of sensitive data.
3. Analyze the ethical use and protection of customer records.
4. Discuss the communication plan to be used during and following the disruption.
5. Discuss restoring operations after the disruption has occurred (post­incident).

C. Create an implementation plan in which you recommend ways of implementing, monitoring, and adjusting the BCP.

Note: Remember that the client insists on maintaining the security of data in information technology and that the potential for ongoing issues is based on global marketplace concerns.

D. When you use sources, include all in­text citations and references in APA format.
Note: When bulleted points are present in the task prompt, the level of detail or support called for in the rubric refers to those bulleted points.
Note: For definitions of terms commonly used in the rubric, see the Rubric Terms web link included in the Evaluation Procedures section.
Note: When using sources to support ideas and elements in a paper or project, the submission
MUST include APA formatted in­text citations with a corresponding reference list for any direct quotes or paraphrasing. It is not necessary to list sources that were consulted if they have not been quoted or paraphrased in the text of the paper or project.
Note: No more than a combined total of 30% of a submission can be directly quoted or closely paraphrased from sources, even if cited correctly. For tips on using APA style, please refer to the
APA Handout web link included in the General Instructions section.

Similar Documents

Premium Essay

Risk Mgmt

...Task 1 (C) – JIT2 Risk Management C. Recommendations Create an implementation plan in which you recommend ways of implementing, monitoring and adjusting the BCP. For the task of creating a Business Continuity Plan (BCP), I will follow a logical and systematic formula for implementation, monitoring and reviewing the plan for United Health Group. The goal is to minimize the impact of any disruption by containing it within a predictable and predetermined period of time. To do this, I recommend that this plan be developed and implemented with as many preventative controls, contingency resources, and procedures designed to allow the organization to quicky bounce back from any long-term business interruption. With this document I’ll present a workable DR plan that focuses not only on safeguarding critical data but also on the restoration of all normal business functions. The process for developing a sound Disaster Recovery plan will involve many layers of detail from the obvious to the not so obvious. Since disasters are by their nature unpredictable, this DR plan must be thorough enough to provide a certain amount of relief to know that if one does occur, the affects on the business will not be catastrophic. Disaster Recovery Topics: 1. Secure executive-level leadership commitment Senior leadership buy-in and support is critical to the long-term success of any enterprise level initiative. Disaster Recovery and Business Continuity Plans are no different. Further...

Words: 2044 - Pages: 9