Red Tape

Fri
25
Sep

Managing Information Security in Modern Commercial Environments

Contributed by Steve Purser

The arrival of affordable and reliable network technology in the nineteen-nineties, followed by the move towards global connectivity and the success of the Internet as a medium for carrying out business, have drastically changed the way in which the modern enterprise operates. The positive aspects of this network revolution are difficult to overstate. Large international concerns have been able to make major efficiency gains, streamlining their operations and greatly reducing cost, whilst small and medium sized companies have benefited from the possibility of widening their markets to an international clientele. Last but not least, consumers have benefited from the ability to compare prices from disparate sources rapidly and to make purchases from their own home.

This document is in PDF format. To view it click here.

Mon
21
Sep

Business Contingency Planning and Post September 11th, 2001

Contributed by Brett Pladna

After September 11th, 2001 companies had to rethink their disaster planning. The companies that were in the World Trade Center found it difficult to bring in their disaster recovery teams because their IT functions were disabled. What needs to be fully understood is that no one in the United States had planned for a disaster of this magnitude. Most network providers were affected by the event and most claim that their readiness helped prevent a technical Catastrophe. However, since then there has been heightened readiness.

This document is in PDF format. To view it click here.

Mon
21
Sep

Business Continuity Management for Information Technology

Contributed by Ghazali A. Wasti

A subject that covers disaster recovery, crises management, risk management controls and Technology recovery. An issue, which explore the approach of Business Continuity in case of a Disaster, with minimum resources, and maximum output.

This document is in PDF format. To view it click here.

Wed
16
Sep

Safeguarding Healthcare Information

Contributed by Jamal Ibrahim

Protection of healthcare information is a fundamental practice for all healthcare professionals. Previously, when paper charts were widely used, the concern was to protect patient information from theft or displacement. Recently, the goal has changed since health care professionals shifted to the use of digital information to serve and store information.

This document is in PDF format. To view it click here.

Fri
11
Sep

Best Practices: Indian Information Act (Amendment) 2008/2011

Contributed by Rohit Kr. Sharma

The Information Technology (Amendment) Bill, 2008 (Bill No.96-F of 2008) was passed by the both houses of parliament on December, 2008 and received the accent of the president on 5th February, 2009 and became operational as the Information Technology(Amendment) Act, 2008 (ITAA, 2008) notified with effect from 27/10/2009 and is now become operational. Many significant changes have been introduced in the IT Amendment Act, 2008. Post this there were two more amendments were issues in 2011, a) The Intermediary responsibility and b) Cyber Café Guidelines as Amendments in ITAA (amendments) 2011.

This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Red Tape