Business Case For Investment

Read Complete Research Material



Business case for investment

Business case for investment

Introduction

Information systems deal with the development, use and management of the infrastructure of information technology in an organization. In the post-industrial, information age, the focus of companies has shifted from product orientation to the orientation towards knowledge, in this sense competes market today in terms of process and innovation instead of the product. The emphasis has shifted from the quality and quantity of production to the production process itself and services that accompany this process. The greatest asset of a company today is their information, represented in its staff, experience, and knowledge, innovations (patents, copyrights, and trade secrets). For this paper we have business case for Calico Computer Consulting Company. To compete Computer Consulting must have a secure information infrastructure, in whose heart lays the infrastructure of information technology.

Business strategies for implementation

There are many ways in which Calico Computer Consulting can recover from disasters relating to ecommerce and ensure business continuity. A security policy must first have the support and commitment of all senior management, and it must be communicated to all employees as one of their responsibilities in any type of contractual relationship between employer and employees. This policy is to classify the different types of information, depending on the nature of each, the basic guidelines for the management and treatment in areas such as storage, backup and access. It should also establish fixed dates for formal review by management and the IT department.

It is appropriate that a senior manager at management level takes responsibility to ensure that safety requirements are allocated to the relevant business areas. If no one in the organization is there who know and understand all the issues related to security, you can go to foreign aid. In any case, each business area has to have a security officer responsible for matters directly related to their core business, from IT security to physical security. Also, make sure you also know the safety rules outside the business that has access to partial information of the company, such as suppliers or partners.

Computer Consulting Company must create and maintain an updated inventory of assets including software and business information resources. It also has to assess each asset and classify information according to their importance and sensitivity to the business, as defined in security policy. With replication and redundancy, a company installs a mirror image data center, either at a separate location ...
Related Ads