What is the relationship between business impact analysis, a disaster recovery plan and business continuity management?
In The News
All Questions
- Based on the facts presented in the case, how far had Fetcher-Allen progressed in identifying and mitigating their Y2K bug risks by June, 1998? (Explain your reasoning supported by specific evidence from the case study.)
- How likely is it that Fletcher-Allen would have achieved full-year 2000 compliance by December 31, 1999? (Explain your reasoning.)
- At the end of the case, Sadlemire observes, “This project sometimes plays second fiddle to other projects that I believe are less critical.” What “other projects” do you think he is referring to here? What advice would you give Sadlemire to help him address this issue of conflicting priorities?
Post your answers to the questions as a PDF document to Canvas following the instructions in the syllabus . Your analysis should be single-spaced pages using 11 point Times New Roman font with one-inch margins, and the entire document should be limited to 3 pages (including the diagram for your answer to question Do not prepare a separate cover page, instead put your name, the class section number (e.g. MIS5206.001 or MIS5206.701), and the case name in the top-left corner of the header. Add page numbers in the footer of the document. Your assignment should be saved as a PDF formatted file to Canvas, your PDF file should be named Case3-YourName.pdf
In The News
Wrap Up
Wrap Up
Unit #2 – All Questions
- Consider Ash Rao’s role as Dean of the Saunders College of Business. How important is his laptop to him? What information might he have on that machine?
- Evaluate the steps that Dave Ballard and Nick Francesco took in response to Dean Rao’s email informing them that his laptop had been stolen.
- Assume you are tasked with designing a new policy that highlights information security best practices related specifically to mobile devices at RIT, including laptops, smartphones, and tablets. The new policy should supplement RIT’s Information Security Policy and Acceptable Use Policy (see the case’s Exhibits 4 and 5). What practices would you recommend? How could you make staff aware of the policy and encourage their compliance?
Unit #2 – Question 1
Consider Ash Rao’s role as Dean of the Saunders College of Business. How important is his laptop to him? What information might he have on that machine?
Unit #2 – Question 2
Evaluate the steps that Dave Ballard and Nick Francesco took in response to Dean Rao’s email informing them that his laptop had been stolen.
Unit #2 – Question 3
Assume you are tasked with designing a new policy that highlights information security best practices related specifically to mobile devices at RIT, including laptops, smartphones, and tablets. The new policy should supplement RIT’s Information Security Policy and Acceptable Use Policy (case Exhibits 4 and 5). What practices would you recommend? How could you make staff aware of the policy and encourage their compliance?