Baderman Island Resorts Provisional Access Cmgt430

Submitted by: Submitted by

Views: 250

Words: 1697

Pages: 7

Category: Science and Technology

Date Submitted: 08/10/2013 06:58 PM

Report This Essay

Provisional data access

For Baderman Island Resorts

CMGT/430

Baderman Island Resorts will have to assign provisions for the use of the data that is held within its requisite databases. This data will be viewed and manipulated at some point for the operations of the company. Baderman will have to decide on the dispersing of data and who would have the authority to use said data. To decide on who has the authority to delegate information to secure or non-secure entities, the company will have to create an access list in that the major and minor representatives have the requisite access. The list will comprise of the managers and associates who need the use of the databases, any members of the upper management, such as the Boardman Management Group, the CEO, the board of directors and CFO. The list would be the responsibility of the CIO to keep updated and each member on the list will need to have its access periodically updated to keep security in compliance with the company’s protocols and procedures.

Baderman Island has an Internet presence that Baderman Island (and Boardman Marketing by proxy) will interact with potential customers and current customers by offering information through the use of different tabs. Each tab opens up another window that introduces different information about Baderman Island and its different amenities. The website allows potential customers to view what Baderman Island can offer the customer, a place for the customer to add insight and comments for Baderman Island to receive input and feedback, and for the employees to have an intranet in which important information like the organizational chart, or specific information about store dimensions and floor layouts.

Website access

Because of Baderman Island employing the web for business, there needs to be protocols active to protect Badermans assets. To protect data from corruption or other malicious events, the security protocols will need to protect the data from internal...