Preview

Mutandum Corporation Case

Powerful Essays
Open Document
Open Document
963 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Mutandum Corporation Case
Computer Retirement
Computer Retirement

Steve L. Campbell
MIS515.Tucson
August 10, 2012
Steve L. Campbell
MIS515.Tucson
August 10, 2012

Introduction.
There are numerous reasons to retire our computer technology. Some systems become obsolete due to current technological advances. Some are replaced because they become infected with viruses or otherwise no longer function properly. And others simply just don’t meet the requirements of our business. In order to retire these systems in an efficient, safe and economical manner, we must take into consideration numerous factors that would otherwise but our business at risk. The following policy includes the implementation of recommendations that will keep sensitive information secure while ensuring that we remain in compliance with federal regulations all the while keeping to our business model centering on efficiency.

Tracking.
In order to be efficient throughout the retirement process, it’s imperative that we maintain a detailed tracking system. This will not only allow us to recover more of the costs through the redemption of the equipment’s residual value, but more importantly, it will ensure that all data which is stored on the systems remains secure prior to, and during the process.
Under the current policy, Mutandum is only tracking equipment that has a value in excess of $3000. Additionally, this equipment is being tracked by placing them into the inventory of the acquiring division. This presents issues at various levels. For information security purposes, tracking must include all computer equipment, and must be done so on a centralized database.
While Mutandum’s current method of tracking computers (attaching assigned, unique tracking numbers directly to the equipment) is effective, it must be applied to all systems, regardless of the asset’s value at the time of purchase. The system itself is not what these unique tracking numbers are protecting, but rather the sensitive data stored on

You May Also Find These Documents Helpful

  • Good Essays

    In November 2008, Danle Corporation,a public company engaging in the design, development, manufacture, and assembly of motors,was sued because of safety issue of parts it manufactured. Danle made no disclosure of the lawsuit in Form 10-K since it determined that the risk of potential loss was remote and no amount of potential damages could be reasonably estimated. In October 2009, Danle was served a second complaint for the same reason. Danle’s external counsel believed that Danle could potentially be liable for a percentage of recovery. Management made no disclosure in Form 10-k for this fiscal year since they did not believe that it was probable a loss would occur and could not reasonably estimate an exact amount of the loss. For the first and second quarters of 2010, Danle disclosed related information about the loss in the notes to its financial statements in Form 10-Q. At the end of 2010, it disclosed updated related information of the loss in its notes to consolidated financial statements in Form 10-K.…

    • 824 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    This disaster plan was put together to try and protect valuable information should it be attacked by hackers or threatened by a natural disaster. As this company grows, so will the value of the network and the information it retains. We want to ensure to the customer and the employee that this information is safe and not vulnerable to an attack. This plan was devised to help protect against failures such as the complexity of the system, accidental failure or a breech by hostile intent.…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    IS3230 Final Project

    • 687 Words
    • 2 Pages

    Integrated Distributors Incorporated is facing a lot of challenges. The IT infrastructure has a lot of outdated hardware and software in multiple locations. This greatly increases security risks and exposes confidentiality, integrity, and availability. Some network compromises have ensued due to the outdated hardware and software. Sensitive and strategic information has been leaked to the public and it is time we put an end to this.…

    • 687 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Continuing Case

    • 5993 Words
    • 24 Pages

    Lately Conner and Martin have been working with “radio frequency identification” (RFID) technology. They have developed a detailed system designed to track inventory items using RFID tags embedded invisibly in products. This technology has numerous inventory applications in multiple industries. One of the most basic applications is tracking manufacturing components; if tagged components "go walking" (if employees attempt to take them), companies can easily track and find them. Conner and Martin have sold their system to several high-tech companies in the area. These companies have a number of government contracts that require extensive security systems to protect sensitive data from infiltration by terrorists and others. To date, CMC’s cash flow from sales and services has adequately funded its operations.…

    • 5993 Words
    • 24 Pages
    Good Essays
  • Satisfactory Essays

    With business always changing and data always needing to be protected, it has become an issue to determine the level of security for confidentiality and integrity purposes while allowing it all to be properly available for use. To put Global in front of the competition with its customers it implements its Global Connect-Link for collaboration. Through the use of its security division, CIS, Global prioritizes its data according to the risk of activity of usage against the potential business reward. It conducts constant supervision and monitoring to maintain confidentiality, integrity and availability. Global also has its own Continuity Manager software to manage large amounts of external users while maintaining the necessary centralized security from unauthorized access. Another level of security Global offers is its DLP or data loss prevention product. This keeps all data whether structured or unstructured when in motion or at rest from being compromised and deleted. Lastly in regards to Global’s controls and the documentation of the effectiveness of these controls, CompScan, an audit program is in place to collect and analyze all the data.…

    • 560 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Tata Motors Case

    • 4354 Words
    • 18 Pages

    Tata Motors is an automotive company to take notice of. Representing the evolving Indian population and growing economy of one of the world’s key emerging markets, it is a market leader for commercial vehicles and third for passenger vehicles in the Indian market. It shocked the world by introducing the $2000 Nano in 2009 and also by growing its portfolio by purchasing Jaguar Land Rover, a company that at first glance embodies values and skills very different to its own. At the same time, Tata Motors has also made some very smart global moves through its purposeful joint ventures and subsidiaries and through its product adaptions to the local markets. However, Tata Motors needs to fully understand its domestic market, as well as the global automotive industry, in order to create a strategy that will ensure its future total success.…

    • 4354 Words
    • 18 Pages
    Powerful Essays
  • Powerful Essays

    Nist 800-125

    • 15467 Words
    • 62 Pages

    The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Special Publication 800-series reports on ITL’s research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations.…

    • 15467 Words
    • 62 Pages
    Powerful Essays
  • Satisfactory Essays

    Business units have the ability to request a personal safe. A personal safe could be used to store internal and/or external department passwords. There is a benefit of using these personal safes. First, the technology is sanctioned by Medtronic. Second, the safes can be recoverable by Global IT. Last, it provides a central management system and an easy way for the IAM team to handle and configure these safes.…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Electronic Surveillance

    • 306 Words
    • 2 Pages

    The surveillance equipment for computer monitoring is a software program installed on a hard drive of the computer and monitored remotely on another computer to record a computer’s use. Such software monitors in real time and records communication via instant messengers, e-mails and Internet, as…

    • 306 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Raytheon Company has created new software that improves the logistics system of the company by providing constant tracking data of all products in the inventory, which has saved the company nearly $9M. MTrak is a web-based system that includes the Microsoft .Net technology, which is used to capture bar-code scans and combines it with information from the mainframe computer to provide tracking of all inventories anywhere within the company.A lot of stuff got lost, company had to have multiple people sitting by the phones to take the calls asking where the parts were. The creation of MTrak brings Raytheon online with its competitors in the industry. While the system does not create a competitive advantage to Raytheon, it does negate the disadvantage of a bad supply control system. The creation of MTrak contributes to the entire value chain by tracking the products from the beginning of the chain at Inbound Logistics, through Operations, Outbound Logistics, Marketing and Sales, through to the end of the chain at Service.…

    • 586 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Domain 5 of CISA Exam

    • 2217 Words
    • 7 Pages

    Domain 5 of the CISA exam covers protection of information assets and includes eight areas of competence. This part of the CISA exam is weighted 30 percent of the overall score, which is the most of any domain. This emphasizes the importance of information asset protection to CISA and to organizations. This research considers each of those eight aspects.…

    • 2217 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    The NIST 800 Series is an arrangement of reports that depict United States government PC security approaches, systems and rules. NIST (National Institute of Standards and Technology) is a unit of the Commerce Department. The reports are accessible for nothing out of pocket, and can be valuable to organizations and instructive establishments, and to government offices. NIST is in charge of creating principles and rules, including least necessities, for giving satisfactory data security to all organization operations and resources, yet such benchmarks and rules might not have any significant bearing to national security frameworks. NIST 800 Series productions developed accordingly of thorough research into workable and savvy techniques for…

    • 715 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Incresasing Usage of Integrated Systems Development of Solution-Specific Security systems Increased Focus on Transport Security 5.2.4.3. The US Large Industrial Electronic Security Market Future Outlook and Projections, 2013-2017 6. The US Residential Electronic Security Market Introduction…

    • 3655 Words
    • 15 Pages
    Good Essays
  • Satisfactory Essays

    The electronic security market in India has made significant progress in the recent years, fuelled by rising residential, commercial and industrial construction, increased activity by foreign and domestic companies and rapid expansion of distribution channels. The overall India electronic security market is dominated by the imported products and nearly 60% of the security and surveillance equipments being imported by the companies from countries such as the US and the UK. The imports in the Indian market have been on an up rise in the recent years while domestic manufacturers share has been declining.…

    • 591 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    The advancements that have taken place in the information technology empire over the years have greatly impacted the integrity, reliability, and trust that people place in the technology world. With developments such as the wireless world innovation and the tremendous advancements within the digital storage field, the notion of a…

    • 2759 Words
    • 12 Pages
    Powerful Essays