Preview

Mutandum Corporation Case

Powerful Essays
Open Document
Open Document
963 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Mutandum Corporation Case
Computer Retirement
Computer Retirement

Steve L. Campbell
MIS515.Tucson
August 10, 2012
Steve L. Campbell
MIS515.Tucson
August 10, 2012

Introduction.
There are numerous reasons to retire our computer technology. Some systems become obsolete due to current technological advances. Some are replaced because they become infected with viruses or otherwise no longer function properly. And others simply just don’t meet the requirements of our business. In order to retire these systems in an efficient, safe and economical manner, we must take into consideration numerous factors that would otherwise but our business at risk. The following policy includes the implementation of recommendations that will keep sensitive information secure while ensuring that we remain in compliance with federal regulations all the while keeping to our business model centering on efficiency.

Tracking.
In order to be efficient throughout the retirement process, it’s imperative that we maintain a detailed tracking system. This will not only allow us to recover more of the costs through the redemption of the equipment’s residual value, but more importantly, it will ensure that all data which is stored on the systems remains secure prior to, and during the process.
Under the current policy, Mutandum is only tracking equipment that has a value in excess of $3000. Additionally, this equipment is being tracked by placing them into the inventory of the acquiring division. This presents issues at various levels. For information security purposes, tracking must include all computer equipment, and must be done so on a centralized database.
While Mutandum’s current method of tracking computers (attaching assigned, unique tracking numbers directly to the equipment) is effective, it must be applied to all systems, regardless of the asset’s value at the time of purchase. The system itself is not what these unique tracking numbers are protecting, but rather the sensitive data stored on

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    The following document outlines Richman Investments security measures for IT infrastructure. There are many components that make up the Richman Investments network, and so there should be a multi-layered security solution to protect it. The server room has been located in the central part of the building, and will be physically protected by electronic door locks with keypad combination access. There are a limited number of personnel who will have access to this room in order to decrease the potential for tampering. Each of these personnel will have their own access code, and a digital log will be kept of all access.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    IS3550 Final Project

    • 4998 Words
    • 19 Pages

    The purpose of this paper is to develop an information security policy that defines the requirements to make our organization's computer network compliant with National Institute of Standards and Technology (NIST) Security Standards. NIST regulations and instructions were reviewed in order to develop the requirements that are stated in this policy. The source documents used can be found in the references section.…

    • 4998 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Continuing Case

    • 5993 Words
    • 24 Pages

    Lately Conner and Martin have been working with “radio frequency identification” (RFID) technology. They have developed a detailed system designed to track inventory items using RFID tags embedded invisibly in products. This technology has numerous inventory applications in multiple industries. One of the most basic applications is tracking manufacturing components; if tagged components "go walking" (if employees attempt to take them), companies can easily track and find them. Conner and Martin have sold their system to several high-tech companies in the area. These companies have a number of government contracts that require extensive security systems to protect sensitive data from infiltration by terrorists and others. To date, CMC’s cash flow from sales and services has adequately funded its operations.…

    • 5993 Words
    • 24 Pages
    Good Essays
  • Satisfactory Essays

    Sales data in my company determines allowable labor usage, and labor cost percentage which allows us to calculate employee productivity. At one time, sales figures and data were kept track of manually and they were stored at the main office. At this time my company has updated its CIS by installing two large IBM server banks that allows these figures and data to be tracked by software on a business computer. Now this data is stored at the store level and we can access the figures and data at any time just by accessing one of our many business computers. To aid in ordering and inventory, we have also upgraded to hand held computers. These computers, called Telzons, are wireless hand held computers that allow us to check prices, inventory on hand and order products just by scanning the UPC label of an item. This also used to be done manually, since upgrading, these computers have not only saved time and money, but also have far more accurate pricing and inventory…

    • 1005 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    AOPG-CEN 16 September 2009 MEMORANDUM FOR All Personnel, 8th POB (A) SUBJECT: 8th POB (A) Information Management and Automated Data Processing SOP TABLE OF CONTENTS ARTICLE PAGE References 1 Purpose 1 Scope of Information Management (IM) 1 Responsibilities 2 Procurement of IM Equipment 4 Monthly ADP Architecture Update 5 ADPE System Accreditation 5 Software Use and Accountability 6 Maintenance 7 ADPE Software and Hardware Standards 7 Life Cycle Replacement 9 Computer Viruses 10 ASOCNET Administration Information 11 Summary 12 ANNEX A - Procedures for Requesting and Purchasing A-1 ADP and Audio Visual Equipment Enclosure 1, ANNEX A: ADPE Procurement Request A-1-1 ANNEX B - Password Procedures for Classified and B-1 Unclassified ASOCNet Accounts ANNEX C - Quarterly…

    • 2469 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Tata Motors Case

    • 4354 Words
    • 18 Pages

    Tata Motors is an automotive company to take notice of. Representing the evolving Indian population and growing economy of one of the world’s key emerging markets, it is a market leader for commercial vehicles and third for passenger vehicles in the Indian market. It shocked the world by introducing the $2000 Nano in 2009 and also by growing its portfolio by purchasing Jaguar Land Rover, a company that at first glance embodies values and skills very different to its own. At the same time, Tata Motors has also made some very smart global moves through its purposeful joint ventures and subsidiaries and through its product adaptions to the local markets. However, Tata Motors needs to fully understand its domestic market, as well as the global automotive industry, in order to create a strategy that will ensure its future total success.…

    • 4354 Words
    • 18 Pages
    Powerful Essays
  • Satisfactory Essays

    Business units have the ability to request a personal safe. A personal safe could be used to store internal and/or external department passwords. There is a benefit of using these personal safes. First, the technology is sanctioned by Medtronic. Second, the safes can be recoverable by Global IT. Last, it provides a central management system and an easy way for the IAM team to handle and configure these safes.…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Nist 800-125

    • 15467 Words
    • 62 Pages

    The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Special Publication 800-series reports on ITL’s research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations.…

    • 15467 Words
    • 62 Pages
    Powerful Essays
  • Good Essays

    Raytheon Company has created new software that improves the logistics system of the company by providing constant tracking data of all products in the inventory, which has saved the company nearly $9M. MTrak is a web-based system that includes the Microsoft .Net technology, which is used to capture bar-code scans and combines it with information from the mainframe computer to provide tracking of all inventories anywhere within the company.A lot of stuff got lost, company had to have multiple people sitting by the phones to take the calls asking where the parts were. The creation of MTrak brings Raytheon online with its competitors in the industry. While the system does not create a competitive advantage to Raytheon, it does negate the disadvantage of a bad supply control system. The creation of MTrak contributes to the entire value chain by tracking the products from the beginning of the chain at Inbound Logistics, through Operations, Outbound Logistics, Marketing and Sales, through to the end of the chain at Service.…

    • 586 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Electronic Surveillance

    • 306 Words
    • 2 Pages

    The surveillance equipment for computer monitoring is a software program installed on a hard drive of the computer and monitored remotely on another computer to record a computer’s use. Such software monitors in real time and records communication via instant messengers, e-mails and Internet, as…

    • 306 Words
    • 2 Pages
    Good Essays
  • Good Essays

    5.2.3.4. The US Commercial Electronic Security Market Future Outlook and Projections, 2013-2017 5.2.4. The US Large Industrial Electronic Security Market Introduction The US Large Industrial Electronic Security Market Size, 2006-2012 The US Large Industrial Electronic Security Market Trends and Developments…

    • 3655 Words
    • 15 Pages
    Good Essays
  • Powerful Essays

    The advancements that have taken place in the information technology empire over the years have greatly impacted the integrity, reliability, and trust that people place in the technology world. With developments such as the wireless world innovation and the tremendous advancements within the digital storage field, the notion of a…

    • 2759 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    The NIST 800 Series is an arrangement of reports that depict United States government PC security approaches, systems and rules. NIST (National Institute of Standards and Technology) is a unit of the Commerce Department. The reports are accessible for nothing out of pocket, and can be valuable to organizations and instructive establishments, and to government offices. NIST is in charge of creating principles and rules, including least necessities, for giving satisfactory data security to all organization operations and resources, yet such benchmarks and rules might not have any significant bearing to national security frameworks. NIST 800 Series productions developed accordingly of thorough research into workable and savvy techniques for…

    • 715 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The electronic security market in India has made significant progress in the recent years, fuelled by rising residential, commercial and industrial construction, increased activity by foreign and domestic companies and rapid expansion of distribution channels. The overall India electronic security market is dominated by the imported products and nearly 60% of the security and surveillance equipments being imported by the companies from countries such as the US and the UK. The imports in the Indian market have been on an up rise in the recent years while domestic manufacturers share has been declining.…

    • 591 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Domain 5 of CISA Exam

    • 2217 Words
    • 7 Pages

    Domain 5 of the CISA exam covers protection of information assets and includes eight areas of competence. This part of the CISA exam is weighted 30 percent of the overall score, which is the most of any domain. This emphasizes the importance of information asset protection to CISA and to organizations. This research considers each of those eight aspects.…

    • 2217 Words
    • 7 Pages
    Powerful Essays