Interoffice Memorandum

Topics: Computer security, Secunia, Employment Pages: 2 (502 words) Published: March 11, 2012
INTEROFFICE MEMORANDUM
TO:CEO
FROM:CIO
SUBJECT:IT ORGANIZATION STRUCTURE
DATE:10/30/2010

This memo includes the high level organization design for the upcoming IT staff. MAJOR HEADING
Due to the upcoming changes in the company to impose a new department for IT staff. I have depicted the high level structure of this department, and why I believe this structure is important and will benefit the company. With the tight budget restraints to employ six IT employees, including myself; I have broken up the IT department into teams that have good growth potential for the future of the company. CIO – The CIO will oversee all IT operations for the company and will report directly to the CEO. •Network Team – The network team will be in charge of all communications related to inter-office and external communication for the company. This includes but is not limited to Demarc, Switches, Firewalls, Proxies, Voice, Remote Access, and all cabling of phone and data for the office. •Platform Team – This team will be in charge of development of applications and server / desktop hardware for the company. This includes but is not limited to applications, server and desktop hardware, maintaining licensing and support contracts, as well as researching new software that can aid the company in success. •Database Team – This team will be in charge of the integrity of the data that is stored internally for the company and if the demand rises external access to data to customers. They will be in charge of maintaining these databases, data retention, backup and archival procedures. •Security Team – This team holds a very important role, although all the teams are important this team ensures that the other teams designs and implementations to the network, platforms, as well as the applications are not imposing security vulnerabilities in the companies infrastructure. They also are in charge of but are not limited to the following Security vulnerability prevention, OS, IOS, and...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Memorandum of Understanding Format Essay
  • Interoffice Memorandum Essay
  • Essay on interoffice memorandum
  • Legal Writing Interoffice Memorandum Essay
  • Interoffice Memorandum Essay
  • Essay on Interoffice Memorandum
  • Memorandum Essay
  • memorandum Essay

Become a StudyMode Member

Sign Up - It's Free