resource capacity
January 19, 2015 Jeffrey Sherman Business and Legal Issues, Finance and Accounting, IT, Privacy and Security, Mobile Device Management, Network, Systems and Data Security, Payroll and Personnel Management, Sales, Marketing and Operations, Social Media/Social Networking, Software Acquisition, Implementation and Maintenance, Systems Acquisition, Maintenance and Disposal, Systems and Data Management
Policies can help you manage employees’ and others’ use of company IT resources, and dramatically reduce the potential risk to you and your assets.
acceptable use, Employee computer use, end-user, HR, Human Resources, internet access, IT policies, IT resources, IT risk, IT risk assessment, legal compliance, legal liability, malware, manage IT risks, resource capacity, risk assessment, risk management, unauthorized access
November 4, 2013 Jeffrey Sherman Corporate Governance, IT, Privacy and Security, Sales, Marketing and Operations
One of the key elements needed to ensure accountability is reporting the right statistics and metrics. Each user department is responsible for ensuring that its information technology needs are addressed, and the IT department is responsible for providing overall cost-effectiveness, quality and coordination. The IT department can play its role by ensuring that IT metrics are captured and disseminated. User departments and the IT department must both be involved; neither may be permitted to abdicate its responsibilities.
benefits delivery, COBIT 5, compliance, data capacity, estimating resource requirements, future functional requirements, governance framework, implementation, Information Technology PolicyPro, IT accountability, IT compliance, IT controls, IT department, IT governance, IT infrastructure, IT measurement, IT planning, IT priorities, IT strategy, ITPP, managing relationships, metrics, needs evaluations, network capacity, planning cycle, planning process, priorities, processing requirements, processor memory, resource capacity, resource optimization, resource usage, risk optimization, statistics, systems requirements, technical support, upgrading IT infrastructure, user support
September 3, 2013 Jeffrey Sherman Corporate Governance, IT, Privacy and Security
The two definitive studies by COSO identify monitoring as a critical component of internal control and risk management. Monitoring refers to both ongoing monitoring processes to ensure that a system functions as it is supposed to (including management and review aspects), as well as ad hoc special studies and audits to review the system…
acquisition, applications, audits, continuous improvement, COSO, customer focus, divestiture, effectiveness reviews, Enterprise Risk Management – Integrated Framework, external customers, Human Resources, ICIF, implementation plans, information technology, internal control, Internal Control: Integrated Framework, internal customers, International Organization for Standardization, ISO, IT assets, IT governance, IT resources, leadership, metrics, monitoring, monitoring processes, over-utilization of resources, QMS, quality management system, Quality management systems Fundamentals and vocabulary, Quality management systems guidelines for performance improvements, resource capacity, risk management, service-level agreements, under-utilization of resources