Submitted by: Submitted by Seance12
Views: 250
Words: 1697
Pages: 7
Category: Science and Technology
Date Submitted: 08/10/2013 06:58 PM
Provisional data access
For Baderman Island Resorts
CMGT/430
Baderman Island Resorts will have to assign provisions for the use of the data that is held within its requisite databases. This data will be viewed and manipulated at some point for the operations of the company. Baderman will have to decide on the dispersing of data and who would have the authority to use said data. To decide on who has the authority to delegate information to secure or non-secure entities, the company will have to create an access list in that the major and minor representatives have the requisite access. The list will comprise of the managers and associates who need the use of the databases, any members of the upper management, such as the Boardman Management Group, the CEO, the board of directors and CFO. The list would be the responsibility of the CIO to keep updated and each member on the list will need to have its access periodically updated to keep security in compliance with the company’s protocols and procedures.
Baderman Island has an Internet presence that Baderman Island (and Boardman Marketing by proxy) will interact with potential customers and current customers by offering information through the use of different tabs. Each tab opens up another window that introduces different information about Baderman Island and its different amenities. The website allows potential customers to view what Baderman Island can offer the customer, a place for the customer to add insight and comments for Baderman Island to receive input and feedback, and for the employees to have an intranet in which important information like the organizational chart, or specific information about store dimensions and floor layouts.
Website access
Because of Baderman Island employing the web for business, there needs to be protocols active to protect Badermans assets. To protect data from corruption or other malicious events, the security protocols will need to protect the data from internal...