This paper concentrates on the primary theme of You`ve been hired by a growing organization to perform systems consulting work. in which you have to explain and evaluate its intricate aspects in detail. In addition to this, this paper has been reviewed and purchased by most of the students hence; it has been rated 4.8 points on the scale of 5 points. Besides, the price of this paper starts from £ 79. For more details and full access to the paper, please refer to the site.
Disaster recovery/contingency plan
1. Security, Privacy, and Other AIS Issues
You`ve been hired by a growing organization to perform systems consulting work. The CEO has concerns about systems security and the impact of privacy considerations on the organization`s AIS. She is also interested in learning more about new and emerging AIS technologies that the organization should consider. You have been asked to provide a report on these areas. Your report will be used as a basis for planning and developing improvements to the AIS.
Prepare a paper to deliver your findings to the CEO. In your paper, include the following:
a. A disaster recovery/contingency plan that includes the following:
b. Identification and analysis of procedures to detect vulnerabilities and security threats (i.e., controls)
c. Identification and analysis of risks and risk mitigation measures, including plans for
i. Systems and data recovery
ii. Off-site data storage
iii. Business continuity
c. An analysis of the impacts of privacy considerations on AIS (i.e., HIPAA)
Use at least two academically peer-reviewed sources and/or your text author to support your work or your text authors. Be sure to properly cite any references used in your summary. Format the summary according to APA style.
peer-reviewed sources :
HIPPA engagement help. (2003, April). Practical Accountant, 36(4), 10.
Justices: FERPA does not give student right to sue. (2002, Summer). News Media & the Law, 26(3), 34.
Abu-Musa, A. A. (2002, September). Computer crimes: How can you protect your computerized accounting information system? Journal of American Academy of Business, 2(1), 91.
Abu-Musa, A. A. (2002, September). Security of computerized accounting information systems: A theoretical framework. Journal of American Academy of Business, 2(1), 150.
Blackwell, R. (2002, June 17). With N.D. vote, privacy debate returns to fore. American Banker, 167(115), 1.
Bradbury, D. (2003, October 28). How to stay on the right side of the law. Computer Weekly, 48.
Crane , B. (2003, June 30). Small business and the new HIPPA privacy and security requirements -- what every Utah CEO needs to know. Enterprise/Salt Lake City, 33(1), 3.
Greenblatt, R. E. & Bakker, J. J. (2004, Spring). HIPAA privacy compliance: It``s time to take it seriously. Benefits Law Journal, 17(1), 102.
McCarthy, E. (2004, May). The best-laid plans. Journal of Accountancy, 197(5), 46.
Millman, G. J. (2004, July/August). Keeping data under lock & key. Retrieved on July 16, 2004 from Smartpros.com at http://www.smartpros.com/x44287.xml.
Naumann, J. W. (2004, May). Tap Into XBRL``s power the easy way. Journal of Accountancy, 197(5), 32.
Odell, P. (2003, February). HIPPA changes require close study, DMA exec says. Direct, 15(2), 9.
Parker, R. G. (2003, May). How to profit by safeguarding privacy. Journal of Accountancy, 195(5), 47.
Phelan, S. & Hayes, M. (2003, April). Before the deluge -- and after. Journal of Accountancy, 195(4), 57.
Richards, J. & Tower, G. (2004, March). Progress on XBRL from an Australian perspective. Australian Accounting Review, 14(1), 81.
Stewart, D. L. (2001, June 29). To protect and to serve. Intelligent Enterprise, 4(10), 42.