Uncategorized

IT 644 UMT Unit 4 Recovery and Business Continuity Policies Paper Attached is my progress up to this point ready unit 4 and a worked example for reference

IT 644 UMT Unit 4 Recovery and Business Continuity Policies Paper Attached is my progress up to this point ready unit 4 and a worked example for reference only.
Assignment

Computer systems and the data they use are highly valuable resources for a business. Although insurance may cover the loss of these assets, recovery of the systems and data may have a long-term or even fatal effect on the business. To avoid a nonrecoverable situation, an organization must have a plan in place for disaster recovery and a solid plan to ensure the business can continue to operate in the event of a disaster. These plans are contained in the Disaster Recovery and Business Continuity Policies section of the IT Governance Policies and Procedures Manual.

Week 4: Disaster Recovery and Business Continuity Policies

For this assignment, you will complete the Disaster Recovery and Business Continuity Policies section of your manual for your selected organization. The Disaster Recovery and Business Continuity Policies section should address how your organization will analyze the risks of disaster and how it will protect its valuable IT assets. The policies will also define how the organization will recover from a disaster, should one occur.

The project deliverables are as follows:

Disaster Recovery and Business Continuity Policies
Identify the primary disaster risks that could damage or destroy IT assets, including computer systems, software, and data.
Develop a set of policies that will ensure the safety of the IT assets in the event of the identified disaster risks occurring.
Establish procedures that will allow the business to continue operation in the event of any of the identified disaster risks.
Perform a risk analysis to justify the cost of protection and disaster recovery measures versus potential financial damage to the business. IT Governance Policies and
Procedures Manual
DECEMBER 04, 2019
POLICY DEVELOPMENT FOR IT SUPPORT
Information Technology Governance Policies and Procedure Manual
1
Table of Contents
Project Outline ……………………………………………………………………………………………………………….. 2
Governance Framework …………………………………………………………………………………………………… 6
Selected IT Governance Framework ………………………………………………………………………………. 6
COBIT 5 Significant Points ………………………………………………………………………………………….. 6
Describe Why the Selected Framework ………………………………………………………………………….. 8
Business and IT Goals …………………………………………………………………………………………………….. 9
Benefits of Aligning Business Strategy with IT ……………………………………………………………….. 9
Business and IT Alignment: Strategy……………………………………………………………………………. 12
Primary Business Goals for Pointer Perfect Technology Inc. …………………………………………… 12
IT Goals in Support of the Business Goals ……………………………………………………………………. 14
Conflicts between the Business and IT Goals ………………………………………………………………… 15
IT Mission Statement …………………………………………………………………………………………………….. 17
Information Technology Support Policies ………………………………………………………………………… 20
Incident Management …………………………………………………………………………………………………. 21
Support Prioritization …………………………………………………………………………………………………. 23
Escalation Process ……………………………………………………………………………………………………… 24
Additional Policies for Building Robust IT Support Policy …………………………………………….. 26
Disaster Recovery and Business Continuity Policies …………………………………………………………. 28
Training Plan………………………………………………………………………………………………………………… 29
Continuous Improvement Plan ……………………………………………………………………………………….. 30
References ……………………………………………………………………………………………………………………. 31
Information Technology Governance Policies and Procedure Manual
2
Project Outline
In this venture, the focus will be to break down the IT Governance Structure and
Framework ideas with the point of finishing an IT Governance Policies and Procedures Manual
for an association. The enterprise will be created on Pointer Perfect Technology Inc. Pointer
Perfect Technology Inc. is an American-based organization headquartered in Great Falls,
Montana. It was propelled in 1995 from a garage situated in Great Falls, and from that point
forward it has become perhaps the greatest player in the tech business in the United States and
different pieces of the world. It is a tech business association that manages a tremendous of range
yields including gadgets, equipment, programming, servers, media transmission, fiber optic, the
internet, visual communication, nerd squad and numerous other mechanical upgrades. It likewise
offers web benefits in the United States, for example, distributed computing and leasing of
registering and information stockpiling assets (Pointer Perfect Technology Inc., 2019).
Pointer Perfect Technology Inc. has a few different ways of promoting their items to their
customers. It is for the most part an online tech business association with a large number of
individuals all around getting to the organization’s items through their official site
PointerPerfect.com, and the clients can place service orders which are sent to them as packages.
This is made simple by the utilization of Pointer Perfect Technology Inc. workplaces and server
farms that are dissipated in excess of 30 nations in North America, Central America, South
America, Europe, Asia and Africa. The workplaces and server farms go about as assortment
focuses for clients who purchase service items by means of the Pointer Perfect Technology Inc.
site. On the other hand, the items can be sent to the customers through the mail station, physical
juxtaposition as well as remotely. Pointer Perfect Technology Inc. has one of the biggest
workforce’s of more than 250,000 full-time partners working in those workplaces and server
farms with more than 45,000 representatives working in the organization’s home office in Great
Information Technology Governance Policies and Procedure Manual
3
Falls. The organization additionally arrives at their customers through partners in different
nations who go about as agents or a connection between Pointer Perfect Technology Inc. what’s
more, its customers.
The explanation behind picking Pointer Perfect Technology Inc. is on the grounds that it
is a huge data innovation association that works in numerous areas all-inclusive. Additionally,
being an online authority, Pointer Perfect Technology Inc. handles a lot of information that
makes it ideal for this enterprise. There are numerous classifications of information that are
overseen by Pointer Perfect Technology Inc. organization. The sorts of information originate
from different sources and procedures inside the organization’s chains of activity. A portion of
the significant classifications of information took care of by Pointer Perfect Technology Inc.
incorporate information investigation. Pointer Perfect Technology Inc. organization has an
enormous client base coming about because of the large number of clients who visit the
organization’s site to view and buy items from the organization. To finish a buy, a client is
required to make a record where they are approached to give individual data, for example,
complete names, contacts, neighborhoods, and Visa subtleties among others. Therefore, a lot of
touchy client information is gathered by Pointer Perfect Technology Inc.
Likewise, in its day by day activities, Pointer Perfect Technology Inc. produces a lot of
information that should be put away for future references, examination and basic leadership. The
information got from everyday tasks are significant, and Pointer Perfect Technology Inc.
necessities to oversee them adequately. There are additionally customers who lease information
stockpiling assets from Pointer Perfect Technology Inc., and they anticipate that their
information should be sheltered from any unapproved get to. At long last, as observed above,
Pointer Perfect Technology Inc. has an enormous workforce that works in the organization.
Information Technology Governance Policies and Procedure Manual
4
These workers’ information contain delicate data that desires appropriate administration by
Pointer Perfect Technology Inc. Plainly, Pointer Perfect Technology Inc. manages an enormous
measure of touchy information in their everyday activities.
In this manner, it is basic for Pointer Perfect Technology Inc. to have effective
instruments of taking care of the information it manages to guarantee that petulant information
are secured against unapproved access and control and furthermore guarantee that the
organization’s substance is made accessible to the perfect individuals at whatever point they are
required. To accomplish this, Pointer Perfect Technology Inc. requirements to embrace powerful
and proficient Enterprise Content Management System to deal with the capacity altering and
recovery of the organization’s significant substance. It additionally requires Data Governance
Policies and Procedures Manual that will diagram how the organization’s helpful information are
to be taken care of to guarantee that the nature of information is kept up and the data is made
accessible and got to by the approved people as it were.
Information Technology Governance refers to collective tools, process, techniques, and
methodologies which allow organizations or companies to align their business strategies,
objectives and goals with information technology services infrastructure in order for them to
improve their operation and maximize profit (Suri, 2008). Further, information technology uses
manages and optimizes information technology in a manner that it supports, complement and
enables organizations and accompanies to attain their goals and objectives. Also, Information
technology is always considered a broad topic that is found in the IT departments in most
companies and organizations that help to deliver business value to the organization.
Besides, information technology has a set of rules, regulations, and policies which define
and ensure the effective, efficiencies, controlled, and valuable operations of the information
Information Technology Governance Policies and Procedure Manual
5
technology adhered to and how they are associated with the business development well outlined.
Significantly, by following and implementing an information technology governance framework
such as the COBIT, companies, and organizations can easily comply with the regulatory
requirements and reduce the information technology business challenges while achieving
measurable business benefits.
The study seeks to address the issue of internal Information technology challenges at
Pointer Perfect Technology Inc. Which involves the Pointer Perfect Technology Inc. internal
process, ineffective information technology system, and the lack of essential governance which
are required to work synergistically with the company customers, by developing a
comprehensive information technology policies and procedure manure for the company.
Notably, the company has been servicing customers for the last twelve years, and currently, it
has experienced rapid growth in both its customers and the consulting services. The main
company goal is helping businesses in their organizational planning and development. Its
primary services are like the creation of organizational charts linked to Human resources and
organizational managers to plan and track staff’s skills and planning.
Hence most of the company data and information are very sensitive and need tight
security. Additionally, most of its works require proper documentation and organization of the
project task for its customers or client. According to a report from the company, it has been a
challenge for them to manage project data with confidence. For instance, the company recently
leaked very confidence client’s data to an external web, which lead to its publication to a certain
forum. Which affected the company negatively? Therefore, I considered developing a
comprehensive information technology governance policies and procedures manual for the
company which will help improve the business strategy alignment and responsiveness.
Information Technology Governance Policies and Procedure Manual
6
Governance Framework
Selected IT Governance Framework
Upon reviewing numerous information technology frameworks, I settle for CORIT 5
since CORBIT 5 has a lot of benefits, and it is very suitable for small-bossiness enterprises such
as the Pointer Perfect Technology Inc., which is still growing. Significantly, CORBIT is very
effective in empowering organizations and companies by providing scalability, enabling business
growth and Information technology continuity. Additionally, CORBIT has a great role in
planning, organizing information tec2.hnology and organizational business process, and
continual enhancement towards optimizing Information technology governance and the most
important management. Considerably, the future compatibility with the latest variety of the
CORBIT through the current mapping guidance permits for flexibility within the scheduled
Information technology governance strategy.
COBIT 5 Significant Points
CORBIT 5 has the following benefits to Pointer Perfect Technology Inc. for the information and
technology:

Keeping excellence information to aid in business company decisions making

Attaining strategic objectives and achieving business profits through the real and
innovative application of information technology

Realizing operational merit through dependable, efficient use of information technology

Maintaining Information technology associated risk at a tolerable level

Adjusting the cost of information technology services and technology

Reduce defiance with appropriate laws and government policies
Information Technology Governance Policies and Procedure Manual
7
The main point of concentration of the CORBIT 5 for the company identified framework
is the ability of the company to obtain the best price at affordable cost from the present
information technology resources that keep a balance between achieving value and optimizing
tolerable risks levels (Van Grembergen, Haes, & Moons, 2005). Additionally, Pointer Perfect
Technology Inc. Believes in realizing business value from information technology services
happens when the IT deploys suitable quality at the correct period within the affordable costs.
The primary process for small business compressing within the framework imitative CORBIT 5
but tailored to Pointer Perfect Technology Inc. company and the information technology strategy
development on the best practices comprising of the following (Josi, 2012):

Guarantee Continuity: information protection, security, and critical continuity

Planning and Organizing: Configuring management and strategically planning

Optimize: Constant enhancement
Figure 1. Process domains adapted from COBIT 5 (Josi, 2012)
I understand that the critical issue for the Pointer Perfect Technology Inc. company
business encompasses security and data. Information protection, hence the lower layer of the
above diagram, outline the protection of information technology resources and information or
Information Technology Governance Policies and Procedure Manual
8
data content within an organization and similarly keeping functional, availability, dependable,
and sound data integrity. While on the other hand, the planning, enactment, and other important
administrative tasks have also been covered in the diagram.
Describe Why the Selected Framework
CORBIT 5 framework with tailoring provides enough information technology
governance and management in backing large growing company’s business such as Pointer
Perfect Technology Inc. since it fits well into the present company layout and process.
Additionally, the information technology administrators and the team can easily deploy CORBIT
5 on its own without requiring any especially help. And also, the fragmented process does not
really need a specific order to achieve expected outcomes. Notably, the frame is made up of
significant built-in life cycles and assessment, aiding the enactment process over essential logical
instructions. Other significant factors I considered for choosing CORBIT 5 includes it is
affordable, built-in easement, usability, scalability, and its flexible design nature suitable for
small business with growing possibility (Symons, 2005). Lastly, it supports regulatory
compliance measures for auditing, transparency, and privacy.
Information Technology Governance Policies and Procedure Manual
9
Business and IT Goals
Information technology and systems have become the most significant component of
capital investment globally, since they have revolutionized firms and major industries.
Information technology plays vital role in transforming business. And the visible outcomes of
this include the increased uses of phones, booming e-commerce, the massive shift toward online
news and information, advertisement, security, and the accounting laws that address matters
raised by the exponential development of modern information technology. Additionally, the
internet has also significantly reduced the cost of business operations on an international scale.
With proper information technology well aligned with the business strategy, companies and
organizations are able to realize massive profits.
Though priorities may vary from industry to industry, overall, business aims are all the
same in all the sectors, apart from some slight exceptions (Grembergen, Haes, & Moons, 2005).
The separate list comprise of the business goals and IT goals. They also show that there is a very
great point of consensus between business and information technology objectives.
Business Goals
I.
II.
III.
IV.
V.
VI.
Increase client orientation and service.
Information Technology Goals
I.
Alignment the information technology
strategy to the company business strategy
Guarantee compliance with external
II.
Keep the security of confidential
policies, laws, and regulations
information
Create service continuity and
III.
Make sure that information technology
availability
services are dependable and well secured
Manage (information technologyIV.
Deliver service and service levels in line
related) business risks
with company business activities
Offer competitive products and
V.
Ensure information technology obeys
services
laws and regulations
Improve and maintain business process VI.
Transform commercial activities such as
functionality
company business functional and regulate
requirements into real and efficient
automated results
Table 1: Business & Information Technology Goals
Information Technology Governance Policies and Procedure Manual
10
Benefits of Aligning Business Strategy with IT
Increase Company Productivity
Technology enables businesses to quicken production processes. Companies and
organizations can easily carry out analyses of how their employees are spending their time
and introduce new processes to make the organization systems more efficient (Reynolds &
Yetton, 2015). Such as installation of task management tools which allows the organization
management to remain on top of everyday duties, so that they do not miss anything.
Additionally, email management processes enable the organization to stay on top of their
mail inbox and allows them to answer every email message on time.
Improve Flexibility
Communication between company or organization co-workers has been transformed
over the past years, with various information technology progressions. Hence making the
company’s ability to work in other places possible, including remote areas. Since company
employees can easily link with other staff at different places at different time s. Another
benefit is improving the company’s or organization’s tractability to deal with issues quickly
and professionally. This enhances teamwork throughout the whole company or
organizational business.
Better Customer Service
A company business cannot survive without consumers, so using technology to
improve their dealings with customers, the company realize huge profits. Moreover,
Communicative websites, online chat support services, and 24/7 customer service via social
media can set a company on top of its competitors and increases its profits.
Information Technology Governance Policies and Procedure Manual
11
Enhance Company Marketing
Companies that market their products and services accurately gain a lot of benefits in
the long run. Information Technology has generated software that enables company
businesses to frame a suitable advertising plan that can be restructured and shared with
employe…
Purchase answer to see full
attachment

Leave a Reply

Your email address will not be published. Required fields are marked *