SlideShare a Scribd company logo
www.yourlegalconsultants.com
info@yourlegalconsultants.com
Data protection: Governance IT
Key Questions
GOBERNANCE IT: KEY QUESTIONS Free information
1. COMPUTER SYSTEMS
2. PROCESSES AND USERS
3.SERVICE PROVIDERS
4. COMPUTING PROCECEDURES CHECK IN
5. PRODUCTIVITY
6. COMPUTING AND COMMUNICATION SYSTEMS PLAN
7. INTERNAL AUDITS
8. SECURE ENVIRONMENT
DOCUMENTS FOR GOVERNANCE IT Payment required
9. PROCEDURE DOCUMENTS
www.yourlegalconsultants.com
info@yourlegalconsultants.com
GOVERNANCE IT
Free information
www.yourlegalconsultants.com
info@yourlegalconsultants.com
1. COMPUTER SYSTEMS
1. Do you believe that your company's computer system caters to its needs?
In addition to providing the necessary functionality, a computer system must transmit a sensation of service efficiency, and
should never be an obstacle to the creativity of its users.
2. Do your computer systems require ongoing attention?
The organisation's computing must be looked after as one of the pillars on which the business is founded.
3. Do your computer systems require urgent repairs?
Emergencies are only acceptable when they entail the take-up of new business needs. Anything else is a lack of foresight.
4. Do you believe that the amount of faults with the Computing Systems is excessive?
If your systems are affected by an excessive level of faults, then a rethink on the investment in this regard is needed, either on
grounds of depreciation or design.
5. Do you believe that your company's computing systems adapt to computing trends?
Information systems must provide stability, functionality and scalability. Scalability is what will enable investment to be
modulated in accordance with increased needs.
www.yourlegalconsultants.com
info@yourlegalconsultants.com
2. PROCESSES AND USERS
1. Are users happy with the service provided?
If the systems are unable to generate well-being and functionality for end users, it is because they are badly designed, because
the reason for their existence is precisely that.
2. Are work procedures excessively monotonous and routine?
A user environment that is unfriendly and unintuitive leads to users becoming easily tired, which in turn causes a level of
listlessness that few organisations could allow.
3. Do users complain about the computing processes?
Receiving generalised complaints concerning the obligations generated by this or by that process implies, as well as a poor
design, that most users are predisposed towards an improvement.
4. Are there training manuals and plans covering the use of systems?
It is not possible to set up systems and procedures without the mandatory training of users that are to receive them. Neither
should these be designed without consultation with users.
5. Do users habitually complain about the systems?
If your users are complaining about the systems it is because the organisation still has time to adopt measures in this regard.
www.yourlegalconsultants.com
info@yourlegalconsultants.com
3. SERVICE PROVIDERS
1. Do you believe that your IT service provides sufficient assistance?
The organisation’s IT service must have the means required to comply with its obligations, as well as an appropriate
methodology for handling incidents and changes.
2. Are users happy with the response times to incidents?
Almost invariably, a delayed response to incidents is almost always due to methodological failures or a lack of resources.
3. Are users happy with the way in which incidents are resolved?
Lack of an appropriate methodology to resolve incidents leads to a feeling of instability for recipients of the service.
www.yourlegalconsultants.com
info@yourlegalconsultants.com
4. COMPUTER PROCEDURES CHECK IN
1. Are the computing procedures checked?
Setting up checks on the organisation’s key computing procedures represents a further step in stabilisation of systems
environments, generating a feeling of security that is proportional to the standards employed.
2. Do you believe these checks are sufficient?
The sensation of insufficient control is generally perceived through lack of security guarantees, which are usually due to
downtime, the integrity or inviolability of data.
3. Does your organisation have a development environment that is separate from the production one?
The preparation of new systems must always be carried out separately from the production systems, reproducing a working
environment that is as faithful as possible, to avoid service being affected.
4. Do solutions to technological problems take forever?
The first sign that systems are reaching the level of obsolescence is the failure of the standard channels in resolving incidents,
generating delays that lead to more staff time spent and, therefore, directly affecting the system’s profitability.
www.yourlegalconsultants.com
info@yourlegalconsultants.com
5. PRODUCTIVITY
1. Do you believe your employees’ productivity is too low?
Aside from personalised character considerations, in those environments that depend on technological tools, the
inappropriateness of these tools invariably leads to a fall in productivity.
2. Is productivity lower with regard to the rest of the market?
Occasionally, the inappropriateness or the obsolescence of systems put organisations at a disadvantage with regard to their
rivals. This makes it necessary to carry out palliative or costly investments, depending on the diagnosis.
3. Is there a high rate of work-related stress?
The difficult situation that companies occasionally experience causes high levels of resistance to change, making their
application more complex and, therefore, excessively affecting the mood of individuals.
4. Do you believe your organisation is losing credibility?
A company starts to lose credibility at the time when the growing difficulties to perform their tasks are perceived by the
market. Any change which, on being designed and applied, does not consider the objective adaptation of computing systems
will contribute to this trend.
www.yourlegalconsultants.com
info@yourlegalconsultants.com
6. COMPUTING AND COMMUNICATIONS SYSTEM PLAN
1. Do you perceive structural and functional disorganisation?
The ladder of responsibilities for the information systems reproduces the scaling of needs for the rest of the organisation. A poor design in this
regard will lead to a lack of coordination and poor service.
2. Do you perceive a risk of Operational, Technology and Information insecurity?
You need to have the elements required to control the information systems in an orderly manner and with the direct support of company
management.
3. Are the deadlines for periodic results being met?
Instability and lack of proper work methodology lead to recurrent problems. You must also ask yourself whether what is requested is, simply,
possible.
4. If there are Computing and Communications Systems Plan?
Organisations need to have a systems plan adapted to each year, which provides the maximum forecast with regard to investment, and with
priorities marked in accordance with the importance of the assets used.
5. Is the planning being properly complied with?
Non-compliance with planning is either down to an excessively changing environment or to an insufficient forecast.
www.yourlegalconsultants.com
info@yourlegalconsultants.com
7. INTERNAL AUDITS I
1. Do you believe that information technology helps you to take operating decisions at your organisation?
If this is not the case, either you do not need it or proper use is being made of the same.
2. Do you carry out internal audits of communications and system?
The only way to be aware of the ‘state-of-the-art’ at an organisation's headquarters is by carrying out internal or external
audits of its systems. These audits should be carried out considering the service life and with full tracking of each business
process, applying proven and critical methodologies to the systems under analysis.
2. Are they used to repair faults?
The main objective of a systems audit lies in its capacity to detect the needs and faults of the system and to propose the best
possible solution taking the audit as a whole.
3. Is there a certain lack of coordination in decision-taking?
Decisions that are not coordinated with other affected departments lead to an exponential increase of the effects of the faults
generated, as it will not be applicable overall.
4. Do the information systems cause significant budgetary deviations?
Lack of a clear method to analyse needs leads to budgetary instability and forces the minimum investment, making it
impossible to carry out a stringent needs-analysis.
www.yourlegalconsultants.com
info@yourlegalconsultants.com
7. INTERNAL AUDITS II
5. Do you believe the costs of your systems are excessive?
When costs are excessive, the reason usually lies in the increase of maintenance actions and maintenance costs through
obsolescence or over-depreciation, or because the investment has been oversized.
6. Is there a Contingency Plan?
The contingency plan provides continuity to the key business processes in the event of a catastrophe. Whether or not one is
required depends on the nature of the products and services provided to customers.
7. Do users complain that decisions from Management with regard to Information Technologies are ineffective?
The answer to this question is a further question: Do you have the means necessary and the appropriate methodology to
produce the appropriate decisions?
8. Do the Information Technologies represent a part of the organisation's daily life?
Nowadays, virtually all organisations are more technical from an information technology point of view. If the organisation
perceives Information Technologies as a further work tool and uses them reasonably, this represents an indicator of the level to
which systems are adapted, the level
www.yourlegalconsultants.com
info@yourlegalconsultants.com
7. INTERNAL AUDITS III
9. Do you believe the costs of your systems are excessive?
When costs are excessive, the reason usually lies in the increase of maintenance actions and maintenance costs through
obsolescence or over-depreciation, or because the investment has been oversized.
10. Is there a Contingency Plan?
The contingency plan provides continuity to the key business processes in the event of a catastrophe. Whether or not one is
required depends on the nature of the products and services provided to customers.
11. Do users complain that decisions from Management with regard to Information Technologies are ineffective?
The answer to this question is a further question: Do you have the means necessary and the appropriate methodology to
produce the appropriate decisions?
12. Do the Information Technologies represent a part of the organisation's daily life?
Nowadays, virtually all organisations are more technical from an information technology point of view. If the organisation
perceives Information Technologies as a further work tool and uses them reasonably, this represents an indicator of the level to
which systems are adapted, the level to which users are trained and the level to which management is involved in IT
management.
www.yourlegalconsultants.com
info@yourlegalconsultants.com
8.SECURE ENVIRONMENT
1. Do you know what it would cost if your business systems stopped running?
You must remember that the downtime of systems has an impact not only on revenue from the time it occurs; you must also
seriously consider the consequences of system reliability with regard to future customers. A high production environment must
have an appropriate contingency and business continuity plan.
2. How long could your organisation survive without communications?
If you've got this far, the answer is “0”. Communications require the appropriate level of redundancy, if possible, with a range
of suppliers and service technologies.
3. Do you have a secure environment for your hub systems?
The conservation of central service systems is essential for business continuity. The availability of central systems and
communication systems in a secure environment (Data Processing Centre or DPC) is essential. There are therefore solutions
adapted to the needs of all levels.
www.yourlegalconsultants.com
info@yourlegalconsultants.com
GOVERNANCE IT DOCUMENTS
Payment required
www.yourlegalconsultants.com
info@yourlegalconsultants.com
9. GOBERNANCE IT DOCUMENTS
Key points in implementing governance IT
www.yourlegalconsultants.com
info@yourlegalconsultants.com
Procedure documents
Thank you for your interest
governanceIT@yourlegalconsultants.com
For personal queries, please contact:
www.yourlegalconsultants.com
info@yourlegalconsultants.com

More Related Content

What's hot

How to switch from reactive maintenance to preventive maintenance complete ...
How to switch from reactive maintenance to preventive maintenance   complete ...How to switch from reactive maintenance to preventive maintenance   complete ...
How to switch from reactive maintenance to preventive maintenance complete ...
BryanLimble
 
Third party datasecurity assurance questionnaire
Third party datasecurity assurance questionnaireThird party datasecurity assurance questionnaire
Third party datasecurity assurance questionnaire
Priyanka Aash
 
A Study of Automated Decision Making Systems
A Study of Automated Decision Making SystemsA Study of Automated Decision Making Systems
A Study of Automated Decision Making Systems
inventy
 
Mtw03008 usen
Mtw03008 usenMtw03008 usen
Mtw03008 usenrjstevens
 
Itrisksisaudit1
Itrisksisaudit1Itrisksisaudit1
Itrisksisaudit1
PrabhatSingh316896
 
Commandalot Ugm Pmac 2010 Act
Commandalot Ugm Pmac 2010 ActCommandalot Ugm Pmac 2010 Act
Commandalot Ugm Pmac 2010 Act
Adam Tallinger
 
Module 4 disaster recovery student slides ver 1.0
Module 4 disaster recovery   student slides ver 1.0Module 4 disaster recovery   student slides ver 1.0
Module 4 disaster recovery student slides ver 1.0
Aladdin Dandis
 
SDLC Control
SDLC ControlSDLC Control
SDLC Control
benji00
 
Fm computer roomcleaningguide
Fm computer roomcleaningguideFm computer roomcleaningguide
Fm computer roomcleaningguide
server computer room cleaning
 
Network operations center best practices (3)
Network operations center best practices (3)Network operations center best practices (3)
Network operations center best practices (3)Gabby Nizri
 
Active Directory Change Auditing in the Enterprise
Active Directory Change Auditing in the EnterpriseActive Directory Change Auditing in the Enterprise
Active Directory Change Auditing in the Enterprise
Netwrix Corporation
 
Patch Management
Patch ManagementPatch Management
Patch Management
Radhakrishna Shamanna
 
Presentation maintenence management
Presentation maintenence managementPresentation maintenence management
Presentation maintenence management
Vaisakh S Babu
 
System1 details
System1 detailsSystem1 details
System1 details
SATHYA BN
 
Business continuity-plan-template
Business continuity-plan-templateBusiness continuity-plan-template
Business continuity-plan-template
Mohamed Owaish
 
Beyond Predictive and Preventive Maintenance
Beyond Predictive and Preventive MaintenanceBeyond Predictive and Preventive Maintenance
Beyond Predictive and Preventive Maintenance
Harshad Shah
 
Rethinking compliance
Rethinking complianceRethinking compliance
Rethinking compliance
S. Hanau
 
Towards preventing software from becoming legacy a road map
Towards preventing software from becoming legacy a road mapTowards preventing software from becoming legacy a road map
Towards preventing software from becoming legacy a road mapIAEME Publication
 

What's hot (20)

How to switch from reactive maintenance to preventive maintenance complete ...
How to switch from reactive maintenance to preventive maintenance   complete ...How to switch from reactive maintenance to preventive maintenance   complete ...
How to switch from reactive maintenance to preventive maintenance complete ...
 
Third party datasecurity assurance questionnaire
Third party datasecurity assurance questionnaireThird party datasecurity assurance questionnaire
Third party datasecurity assurance questionnaire
 
A Study of Automated Decision Making Systems
A Study of Automated Decision Making SystemsA Study of Automated Decision Making Systems
A Study of Automated Decision Making Systems
 
Mtw03008 usen
Mtw03008 usenMtw03008 usen
Mtw03008 usen
 
Itrisksisaudit1
Itrisksisaudit1Itrisksisaudit1
Itrisksisaudit1
 
Commandalot Ugm Pmac 2010 Act
Commandalot Ugm Pmac 2010 ActCommandalot Ugm Pmac 2010 Act
Commandalot Ugm Pmac 2010 Act
 
Module 4 disaster recovery student slides ver 1.0
Module 4 disaster recovery   student slides ver 1.0Module 4 disaster recovery   student slides ver 1.0
Module 4 disaster recovery student slides ver 1.0
 
SDLC Control
SDLC ControlSDLC Control
SDLC Control
 
Fm computer roomcleaningguide
Fm computer roomcleaningguideFm computer roomcleaningguide
Fm computer roomcleaningguide
 
Network operations center best practices (3)
Network operations center best practices (3)Network operations center best practices (3)
Network operations center best practices (3)
 
Active Directory Change Auditing in the Enterprise
Active Directory Change Auditing in the EnterpriseActive Directory Change Auditing in the Enterprise
Active Directory Change Auditing in the Enterprise
 
Patch Management
Patch ManagementPatch Management
Patch Management
 
Presentation maintenence management
Presentation maintenence managementPresentation maintenence management
Presentation maintenence management
 
System1 details
System1 detailsSystem1 details
System1 details
 
Business continuity-plan-template
Business continuity-plan-templateBusiness continuity-plan-template
Business continuity-plan-template
 
Beyond Predictive and Preventive Maintenance
Beyond Predictive and Preventive MaintenanceBeyond Predictive and Preventive Maintenance
Beyond Predictive and Preventive Maintenance
 
Dit yvol5iss10
Dit yvol5iss10Dit yvol5iss10
Dit yvol5iss10
 
KFwk5paper
KFwk5paperKFwk5paper
KFwk5paper
 
Rethinking compliance
Rethinking complianceRethinking compliance
Rethinking compliance
 
Towards preventing software from becoming legacy a road map
Towards preventing software from becoming legacy a road mapTowards preventing software from becoming legacy a road map
Towards preventing software from becoming legacy a road map
 

Viewers also liked

تخيل نفسك قلم رصاص دروس في الحياة
تخيل نفسك قلم رصاص   دروس في الحياةتخيل نفسك قلم رصاص   دروس في الحياة
تخيل نفسك قلم رصاص دروس في الحياةamr hassaan
 
Index data protection
Index data protectionIndex data protection
Index data protection
Cristina Villavicencio
 
Technology Transfer. Universities: General Concepts Part III
Technology Transfer. Universities: General Concepts Part IIITechnology Transfer. Universities: General Concepts Part III
Technology Transfer. Universities: General Concepts Part III
Cristina Villavicencio
 
Projekt analizy programów TVN Style (Aleksandra Powierska)
Projekt analizy programów TVN Style (Aleksandra Powierska)Projekt analizy programów TVN Style (Aleksandra Powierska)
Projekt analizy programów TVN Style (Aleksandra Powierska)
nytuan
 
Commercial for CE Courses
Commercial for CE CoursesCommercial for CE Courses
Commercial for CE Courses
GLemelin
 
Europe-Latin America Cooperation in ICT Research: State of the Art, Opportuni...
Europe-Latin America Cooperation in ICT Research: State of the Art, Opportuni...Europe-Latin America Cooperation in ICT Research: State of the Art, Opportuni...
Europe-Latin America Cooperation in ICT Research: State of the Art, Opportuni...Fabio Nascimbeni
 
How to trim your design and keep it healthy
How to trim your design and keep it healthyHow to trim your design and keep it healthy
How to trim your design and keep it healthy
Janne Flusund
 
Future Of Media
Future Of MediaFuture Of Media
Future Of Media
Stroom
 
Leveraging Social Media as Business Tool
Leveraging Social Media as Business ToolLeveraging Social Media as Business Tool
Leveraging Social Media as Business Tool
Robin Low
 
Optify best practices: landing pages
Optify best practices: landing pagesOptify best practices: landing pages
Optify best practices: landing pages
Optify
 
Social Media Introduction (Feb 2010)
Social Media Introduction (Feb 2010)Social Media Introduction (Feb 2010)
Social Media Introduction (Feb 2010)
Robin Low
 
Early Dutch Books Online - teaser
Early Dutch Books Online - teaserEarly Dutch Books Online - teaser
Early Dutch Books Online - teaserOlaf Janssen
 
Victoria, Eli, Mica
Victoria, Eli, MicaVictoria, Eli, Mica
Victoria, Eli, Micaguesta08c073
 
GRAMMAR:Idioms1
GRAMMAR:Idioms1GRAMMAR:Idioms1
GRAMMAR:Idioms1Natalia
 
Medicover Raport O Zdrowiu 2008
Medicover Raport O Zdrowiu 2008Medicover Raport O Zdrowiu 2008
Medicover Raport O Zdrowiu 2008
Next
 

Viewers also liked (20)

تخيل نفسك قلم رصاص دروس في الحياة
تخيل نفسك قلم رصاص   دروس في الحياةتخيل نفسك قلم رصاص   دروس في الحياة
تخيل نفسك قلم رصاص دروس في الحياة
 
Index data protection
Index data protectionIndex data protection
Index data protection
 
Technology Transfer. Universities: General Concepts Part III
Technology Transfer. Universities: General Concepts Part IIITechnology Transfer. Universities: General Concepts Part III
Technology Transfer. Universities: General Concepts Part III
 
Atva05
Atva05Atva05
Atva05
 
Projekt analizy programów TVN Style (Aleksandra Powierska)
Projekt analizy programów TVN Style (Aleksandra Powierska)Projekt analizy programów TVN Style (Aleksandra Powierska)
Projekt analizy programów TVN Style (Aleksandra Powierska)
 
Commercial for CE Courses
Commercial for CE CoursesCommercial for CE Courses
Commercial for CE Courses
 
Europe-Latin America Cooperation in ICT Research: State of the Art, Opportuni...
Europe-Latin America Cooperation in ICT Research: State of the Art, Opportuni...Europe-Latin America Cooperation in ICT Research: State of the Art, Opportuni...
Europe-Latin America Cooperation in ICT Research: State of the Art, Opportuni...
 
How to trim your design and keep it healthy
How to trim your design and keep it healthyHow to trim your design and keep it healthy
How to trim your design and keep it healthy
 
Future Of Media
Future Of MediaFuture Of Media
Future Of Media
 
My Blog
My BlogMy Blog
My Blog
 
Leveraging Social Media as Business Tool
Leveraging Social Media as Business ToolLeveraging Social Media as Business Tool
Leveraging Social Media as Business Tool
 
Poligonos
PoligonosPoligonos
Poligonos
 
Optify best practices: landing pages
Optify best practices: landing pagesOptify best practices: landing pages
Optify best practices: landing pages
 
Social Media Introduction (Feb 2010)
Social Media Introduction (Feb 2010)Social Media Introduction (Feb 2010)
Social Media Introduction (Feb 2010)
 
Pp
PpPp
Pp
 
Ict4
Ict4Ict4
Ict4
 
Early Dutch Books Online - teaser
Early Dutch Books Online - teaserEarly Dutch Books Online - teaser
Early Dutch Books Online - teaser
 
Victoria, Eli, Mica
Victoria, Eli, MicaVictoria, Eli, Mica
Victoria, Eli, Mica
 
GRAMMAR:Idioms1
GRAMMAR:Idioms1GRAMMAR:Idioms1
GRAMMAR:Idioms1
 
Medicover Raport O Zdrowiu 2008
Medicover Raport O Zdrowiu 2008Medicover Raport O Zdrowiu 2008
Medicover Raport O Zdrowiu 2008
 

Similar to Data Protection Governance IT

Building cbis, mis, csvtu
Building cbis, mis, csvtuBuilding cbis, mis, csvtu
Building cbis, mis, csvtu
Narender Chintada
 
Building Information System
Building Information SystemBuilding Information System
Building Information System
Rabia Jabeen
 
ERP and related technology
ERP and related technology ERP and related technology
ERP and related technology
Usman Tariq
 
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...Global_Technology_Services - Technical_Support_Services_White_Paper_External_...
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...
Jim Mason
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
Accenture Operations
 
10 Steps To Successful Enterprise Software Selection
10 Steps To Successful Enterprise Software Selection10 Steps To Successful Enterprise Software Selection
10 Steps To Successful Enterprise Software Selection
PhilKeet
 
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUEQUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
eAuditor Audits & Inspections
 
ThinkDox implementation whitepaper for ECM
ThinkDox implementation whitepaper for ECMThinkDox implementation whitepaper for ECM
ThinkDox implementation whitepaper for ECM
Christopher Wynder
 
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
INTERNAL Assign no   207( JAIPUR NATIONAL UNI)INTERNAL Assign no   207( JAIPUR NATIONAL UNI)
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
Partha_bappa
 
Predictive Maintenance Solution for Industries - Cyient
Predictive Maintenance Solution for Industries - CyientPredictive Maintenance Solution for Industries - Cyient
Predictive Maintenance Solution for Industries - Cyient
Percy-Mitchell
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management Workshop
Stacy Willis
 
Information systems strategy formulation
Information systems strategy formulationInformation systems strategy formulation
Information systems strategy formulation
Assignment Studio
 
IRJET - Leave Management System for AIKTC
IRJET - Leave Management System for AIKTCIRJET - Leave Management System for AIKTC
IRJET - Leave Management System for AIKTC
IRJET Journal
 
1. Top of FormResource Project Systems Acquisition Plan Gradi.docx
1. Top of FormResource Project Systems Acquisition Plan Gradi.docx1. Top of FormResource Project Systems Acquisition Plan Gradi.docx
1. Top of FormResource Project Systems Acquisition Plan Gradi.docx
ambersalomon88660
 
8 steps to Successful Accounts System Selection - Xledger Whitepaper
8 steps to Successful Accounts System Selection - Xledger Whitepaper8 steps to Successful Accounts System Selection - Xledger Whitepaper
8 steps to Successful Accounts System Selection - Xledger Whitepaper
Xledger UK
 
Information Systems(UNIT 3)
Information Systems(UNIT 3)Information Systems(UNIT 3)
Information Systems(UNIT 3)
SURBHI SAROHA
 
Transformation of legacy landscape in the insurance world
Transformation of legacy landscape in the insurance worldTransformation of legacy landscape in the insurance world
Transformation of legacy landscape in the insurance world
NIIT Technologies
 

Similar to Data Protection Governance IT (20)

Building cbis, mis, csvtu
Building cbis, mis, csvtuBuilding cbis, mis, csvtu
Building cbis, mis, csvtu
 
Building Information System
Building Information SystemBuilding Information System
Building Information System
 
ERP and related technology
ERP and related technology ERP and related technology
ERP and related technology
 
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...Global_Technology_Services - Technical_Support_Services_White_Paper_External_...
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...
 
MTW03011USEN.PDF
MTW03011USEN.PDFMTW03011USEN.PDF
MTW03011USEN.PDF
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
 
10 Steps To Successful Enterprise Software Selection
10 Steps To Successful Enterprise Software Selection10 Steps To Successful Enterprise Software Selection
10 Steps To Successful Enterprise Software Selection
 
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUEQUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
 
ThinkDox implementation whitepaper for ECM
ThinkDox implementation whitepaper for ECMThinkDox implementation whitepaper for ECM
ThinkDox implementation whitepaper for ECM
 
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
INTERNAL Assign no   207( JAIPUR NATIONAL UNI)INTERNAL Assign no   207( JAIPUR NATIONAL UNI)
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
 
Predictive Maintenance Solution for Industries - Cyient
Predictive Maintenance Solution for Industries - CyientPredictive Maintenance Solution for Industries - Cyient
Predictive Maintenance Solution for Industries - Cyient
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management Workshop
 
IT
ITIT
IT
 
Information systems strategy formulation
Information systems strategy formulationInformation systems strategy formulation
Information systems strategy formulation
 
Unit Iii
Unit IiiUnit Iii
Unit Iii
 
IRJET - Leave Management System for AIKTC
IRJET - Leave Management System for AIKTCIRJET - Leave Management System for AIKTC
IRJET - Leave Management System for AIKTC
 
1. Top of FormResource Project Systems Acquisition Plan Gradi.docx
1. Top of FormResource Project Systems Acquisition Plan Gradi.docx1. Top of FormResource Project Systems Acquisition Plan Gradi.docx
1. Top of FormResource Project Systems Acquisition Plan Gradi.docx
 
8 steps to Successful Accounts System Selection - Xledger Whitepaper
8 steps to Successful Accounts System Selection - Xledger Whitepaper8 steps to Successful Accounts System Selection - Xledger Whitepaper
8 steps to Successful Accounts System Selection - Xledger Whitepaper
 
Information Systems(UNIT 3)
Information Systems(UNIT 3)Information Systems(UNIT 3)
Information Systems(UNIT 3)
 
Transformation of legacy landscape in the insurance world
Transformation of legacy landscape in the insurance worldTransformation of legacy landscape in the insurance world
Transformation of legacy landscape in the insurance world
 

More from Cristina Villavicencio

El desarrollo personalizado del aprendizaje: La analítica del talento y la ét...
El desarrollo personalizado del aprendizaje: La analítica del talento y la ét...El desarrollo personalizado del aprendizaje: La analítica del talento y la ét...
El desarrollo personalizado del aprendizaje: La analítica del talento y la ét...
Cristina Villavicencio
 
Resumen ejecutivo Train Us
Resumen ejecutivo Train Us Resumen ejecutivo Train Us
Resumen ejecutivo Train Us
Cristina Villavicencio
 
Presentacion Train Us Empresa
Presentacion Train Us EmpresaPresentacion Train Us Empresa
Presentacion Train Us Empresa
Cristina Villavicencio
 
La gestion del talento en la sociedad digitalizada
La gestion del talento en la sociedad digitalizadaLa gestion del talento en la sociedad digitalizada
La gestion del talento en la sociedad digitalizada
Cristina Villavicencio
 
Auditoría cuestiones clave
Auditoría cuestiones claveAuditoría cuestiones clave
Auditoría cuestiones clave
Cristina Villavicencio
 
Contratos anexos
Contratos anexosContratos anexos
Contratos anexos
Cristina Villavicencio
 
Política interna de empresa
Política interna de empresaPolítica interna de empresa
Política interna de empresa
Cristina Villavicencio
 
Certificado de implementación
Certificado de implementaciónCertificado de implementación
Certificado de implementación
Cristina Villavicencio
 
Documento de seguridad
Documento de seguridadDocumento de seguridad
Documento de seguridad
Cristina Villavicencio
 
Digital Content Creations
Digital Content CreationsDigital Content Creations
Digital Content Creations
Cristina Villavicencio
 
Transferencia de Tecnología Parte II
Transferencia de Tecnología Parte IITransferencia de Tecnología Parte II
Transferencia de Tecnología Parte II
Cristina Villavicencio
 
Transferencia de Tecnología Parte I
Transferencia de Tecnología Parte ITransferencia de Tecnología Parte I
Transferencia de Tecnología Parte I
Cristina Villavicencio
 
Orientación Practica Creación de Contenidos Digitales
Orientación Practica Creación de Contenidos Digitales Orientación Practica Creación de Contenidos Digitales
Orientación Practica Creación de Contenidos Digitales
Cristina Villavicencio
 
Creación de Contenidos digitales
Creación de Contenidos digitalesCreación de Contenidos digitales
Creación de Contenidos digitales
Cristina Villavicencio
 
Indice del Documento: Cómo Trabajar con Proveedores de Tecnologia
Indice del Documento: Cómo Trabajar con Proveedores de TecnologiaIndice del Documento: Cómo Trabajar con Proveedores de Tecnologia
Indice del Documento: Cómo Trabajar con Proveedores de Tecnologia
Cristina Villavicencio
 
Curso transferencia tecnologia. plug and play
Curso transferencia tecnologia. plug and playCurso transferencia tecnologia. plug and play
Curso transferencia tecnologia. plug and play
Cristina Villavicencio
 
Curso Transferencia Tecnologia. Introducción
Curso Transferencia Tecnologia. IntroducciónCurso Transferencia Tecnologia. Introducción
Curso Transferencia Tecnologia. Introducción
Cristina Villavicencio
 
Indice documentos protección de datos
Indice documentos protección de datosIndice documentos protección de datos
Indice documentos protección de datosCristina Villavicencio
 
Factura Electrónica
Factura ElectrónicaFactura Electrónica
Factura Electrónica
Cristina Villavicencio
 

More from Cristina Villavicencio (20)

El desarrollo personalizado del aprendizaje: La analítica del talento y la ét...
El desarrollo personalizado del aprendizaje: La analítica del talento y la ét...El desarrollo personalizado del aprendizaje: La analítica del talento y la ét...
El desarrollo personalizado del aprendizaje: La analítica del talento y la ét...
 
Resumen ejecutivo Train Us
Resumen ejecutivo Train Us Resumen ejecutivo Train Us
Resumen ejecutivo Train Us
 
Presentacion Train Us Empresa
Presentacion Train Us EmpresaPresentacion Train Us Empresa
Presentacion Train Us Empresa
 
La gestion del talento en la sociedad digitalizada
La gestion del talento en la sociedad digitalizadaLa gestion del talento en la sociedad digitalizada
La gestion del talento en la sociedad digitalizada
 
Auditoría cuestiones clave
Auditoría cuestiones claveAuditoría cuestiones clave
Auditoría cuestiones clave
 
Contratos anexos
Contratos anexosContratos anexos
Contratos anexos
 
Política interna de empresa
Política interna de empresaPolítica interna de empresa
Política interna de empresa
 
Certificado de implementación
Certificado de implementaciónCertificado de implementación
Certificado de implementación
 
Documento de seguridad
Documento de seguridadDocumento de seguridad
Documento de seguridad
 
Digital Content Creations
Digital Content CreationsDigital Content Creations
Digital Content Creations
 
Transferencia de Tecnología Parte II
Transferencia de Tecnología Parte IITransferencia de Tecnología Parte II
Transferencia de Tecnología Parte II
 
Transferencia de Tecnología Parte I
Transferencia de Tecnología Parte ITransferencia de Tecnología Parte I
Transferencia de Tecnología Parte I
 
Orientación Practica Creación de Contenidos Digitales
Orientación Practica Creación de Contenidos Digitales Orientación Practica Creación de Contenidos Digitales
Orientación Practica Creación de Contenidos Digitales
 
Creación de Contenidos digitales
Creación de Contenidos digitalesCreación de Contenidos digitales
Creación de Contenidos digitales
 
Indice factura electrónica
Indice factura electrónicaIndice factura electrónica
Indice factura electrónica
 
Indice del Documento: Cómo Trabajar con Proveedores de Tecnologia
Indice del Documento: Cómo Trabajar con Proveedores de TecnologiaIndice del Documento: Cómo Trabajar con Proveedores de Tecnologia
Indice del Documento: Cómo Trabajar con Proveedores de Tecnologia
 
Curso transferencia tecnologia. plug and play
Curso transferencia tecnologia. plug and playCurso transferencia tecnologia. plug and play
Curso transferencia tecnologia. plug and play
 
Curso Transferencia Tecnologia. Introducción
Curso Transferencia Tecnologia. IntroducciónCurso Transferencia Tecnologia. Introducción
Curso Transferencia Tecnologia. Introducción
 
Indice documentos protección de datos
Indice documentos protección de datosIndice documentos protección de datos
Indice documentos protección de datos
 
Factura Electrónica
Factura ElectrónicaFactura Electrónica
Factura Electrónica
 

Data Protection Governance IT

  • 2. GOBERNANCE IT: KEY QUESTIONS Free information 1. COMPUTER SYSTEMS 2. PROCESSES AND USERS 3.SERVICE PROVIDERS 4. COMPUTING PROCECEDURES CHECK IN 5. PRODUCTIVITY 6. COMPUTING AND COMMUNICATION SYSTEMS PLAN 7. INTERNAL AUDITS 8. SECURE ENVIRONMENT DOCUMENTS FOR GOVERNANCE IT Payment required 9. PROCEDURE DOCUMENTS www.yourlegalconsultants.com info@yourlegalconsultants.com
  • 4. 1. COMPUTER SYSTEMS 1. Do you believe that your company's computer system caters to its needs? In addition to providing the necessary functionality, a computer system must transmit a sensation of service efficiency, and should never be an obstacle to the creativity of its users. 2. Do your computer systems require ongoing attention? The organisation's computing must be looked after as one of the pillars on which the business is founded. 3. Do your computer systems require urgent repairs? Emergencies are only acceptable when they entail the take-up of new business needs. Anything else is a lack of foresight. 4. Do you believe that the amount of faults with the Computing Systems is excessive? If your systems are affected by an excessive level of faults, then a rethink on the investment in this regard is needed, either on grounds of depreciation or design. 5. Do you believe that your company's computing systems adapt to computing trends? Information systems must provide stability, functionality and scalability. Scalability is what will enable investment to be modulated in accordance with increased needs. www.yourlegalconsultants.com info@yourlegalconsultants.com
  • 5. 2. PROCESSES AND USERS 1. Are users happy with the service provided? If the systems are unable to generate well-being and functionality for end users, it is because they are badly designed, because the reason for their existence is precisely that. 2. Are work procedures excessively monotonous and routine? A user environment that is unfriendly and unintuitive leads to users becoming easily tired, which in turn causes a level of listlessness that few organisations could allow. 3. Do users complain about the computing processes? Receiving generalised complaints concerning the obligations generated by this or by that process implies, as well as a poor design, that most users are predisposed towards an improvement. 4. Are there training manuals and plans covering the use of systems? It is not possible to set up systems and procedures without the mandatory training of users that are to receive them. Neither should these be designed without consultation with users. 5. Do users habitually complain about the systems? If your users are complaining about the systems it is because the organisation still has time to adopt measures in this regard. www.yourlegalconsultants.com info@yourlegalconsultants.com
  • 6. 3. SERVICE PROVIDERS 1. Do you believe that your IT service provides sufficient assistance? The organisation’s IT service must have the means required to comply with its obligations, as well as an appropriate methodology for handling incidents and changes. 2. Are users happy with the response times to incidents? Almost invariably, a delayed response to incidents is almost always due to methodological failures or a lack of resources. 3. Are users happy with the way in which incidents are resolved? Lack of an appropriate methodology to resolve incidents leads to a feeling of instability for recipients of the service. www.yourlegalconsultants.com info@yourlegalconsultants.com
  • 7. 4. COMPUTER PROCEDURES CHECK IN 1. Are the computing procedures checked? Setting up checks on the organisation’s key computing procedures represents a further step in stabilisation of systems environments, generating a feeling of security that is proportional to the standards employed. 2. Do you believe these checks are sufficient? The sensation of insufficient control is generally perceived through lack of security guarantees, which are usually due to downtime, the integrity or inviolability of data. 3. Does your organisation have a development environment that is separate from the production one? The preparation of new systems must always be carried out separately from the production systems, reproducing a working environment that is as faithful as possible, to avoid service being affected. 4. Do solutions to technological problems take forever? The first sign that systems are reaching the level of obsolescence is the failure of the standard channels in resolving incidents, generating delays that lead to more staff time spent and, therefore, directly affecting the system’s profitability. www.yourlegalconsultants.com info@yourlegalconsultants.com
  • 8. 5. PRODUCTIVITY 1. Do you believe your employees’ productivity is too low? Aside from personalised character considerations, in those environments that depend on technological tools, the inappropriateness of these tools invariably leads to a fall in productivity. 2. Is productivity lower with regard to the rest of the market? Occasionally, the inappropriateness or the obsolescence of systems put organisations at a disadvantage with regard to their rivals. This makes it necessary to carry out palliative or costly investments, depending on the diagnosis. 3. Is there a high rate of work-related stress? The difficult situation that companies occasionally experience causes high levels of resistance to change, making their application more complex and, therefore, excessively affecting the mood of individuals. 4. Do you believe your organisation is losing credibility? A company starts to lose credibility at the time when the growing difficulties to perform their tasks are perceived by the market. Any change which, on being designed and applied, does not consider the objective adaptation of computing systems will contribute to this trend. www.yourlegalconsultants.com info@yourlegalconsultants.com
  • 9. 6. COMPUTING AND COMMUNICATIONS SYSTEM PLAN 1. Do you perceive structural and functional disorganisation? The ladder of responsibilities for the information systems reproduces the scaling of needs for the rest of the organisation. A poor design in this regard will lead to a lack of coordination and poor service. 2. Do you perceive a risk of Operational, Technology and Information insecurity? You need to have the elements required to control the information systems in an orderly manner and with the direct support of company management. 3. Are the deadlines for periodic results being met? Instability and lack of proper work methodology lead to recurrent problems. You must also ask yourself whether what is requested is, simply, possible. 4. If there are Computing and Communications Systems Plan? Organisations need to have a systems plan adapted to each year, which provides the maximum forecast with regard to investment, and with priorities marked in accordance with the importance of the assets used. 5. Is the planning being properly complied with? Non-compliance with planning is either down to an excessively changing environment or to an insufficient forecast. www.yourlegalconsultants.com info@yourlegalconsultants.com
  • 10. 7. INTERNAL AUDITS I 1. Do you believe that information technology helps you to take operating decisions at your organisation? If this is not the case, either you do not need it or proper use is being made of the same. 2. Do you carry out internal audits of communications and system? The only way to be aware of the ‘state-of-the-art’ at an organisation's headquarters is by carrying out internal or external audits of its systems. These audits should be carried out considering the service life and with full tracking of each business process, applying proven and critical methodologies to the systems under analysis. 2. Are they used to repair faults? The main objective of a systems audit lies in its capacity to detect the needs and faults of the system and to propose the best possible solution taking the audit as a whole. 3. Is there a certain lack of coordination in decision-taking? Decisions that are not coordinated with other affected departments lead to an exponential increase of the effects of the faults generated, as it will not be applicable overall. 4. Do the information systems cause significant budgetary deviations? Lack of a clear method to analyse needs leads to budgetary instability and forces the minimum investment, making it impossible to carry out a stringent needs-analysis. www.yourlegalconsultants.com info@yourlegalconsultants.com
  • 11. 7. INTERNAL AUDITS II 5. Do you believe the costs of your systems are excessive? When costs are excessive, the reason usually lies in the increase of maintenance actions and maintenance costs through obsolescence or over-depreciation, or because the investment has been oversized. 6. Is there a Contingency Plan? The contingency plan provides continuity to the key business processes in the event of a catastrophe. Whether or not one is required depends on the nature of the products and services provided to customers. 7. Do users complain that decisions from Management with regard to Information Technologies are ineffective? The answer to this question is a further question: Do you have the means necessary and the appropriate methodology to produce the appropriate decisions? 8. Do the Information Technologies represent a part of the organisation's daily life? Nowadays, virtually all organisations are more technical from an information technology point of view. If the organisation perceives Information Technologies as a further work tool and uses them reasonably, this represents an indicator of the level to which systems are adapted, the level www.yourlegalconsultants.com info@yourlegalconsultants.com
  • 12. 7. INTERNAL AUDITS III 9. Do you believe the costs of your systems are excessive? When costs are excessive, the reason usually lies in the increase of maintenance actions and maintenance costs through obsolescence or over-depreciation, or because the investment has been oversized. 10. Is there a Contingency Plan? The contingency plan provides continuity to the key business processes in the event of a catastrophe. Whether or not one is required depends on the nature of the products and services provided to customers. 11. Do users complain that decisions from Management with regard to Information Technologies are ineffective? The answer to this question is a further question: Do you have the means necessary and the appropriate methodology to produce the appropriate decisions? 12. Do the Information Technologies represent a part of the organisation's daily life? Nowadays, virtually all organisations are more technical from an information technology point of view. If the organisation perceives Information Technologies as a further work tool and uses them reasonably, this represents an indicator of the level to which systems are adapted, the level to which users are trained and the level to which management is involved in IT management. www.yourlegalconsultants.com info@yourlegalconsultants.com
  • 13. 8.SECURE ENVIRONMENT 1. Do you know what it would cost if your business systems stopped running? You must remember that the downtime of systems has an impact not only on revenue from the time it occurs; you must also seriously consider the consequences of system reliability with regard to future customers. A high production environment must have an appropriate contingency and business continuity plan. 2. How long could your organisation survive without communications? If you've got this far, the answer is “0”. Communications require the appropriate level of redundancy, if possible, with a range of suppliers and service technologies. 3. Do you have a secure environment for your hub systems? The conservation of central service systems is essential for business continuity. The availability of central systems and communication systems in a secure environment (Data Processing Centre or DPC) is essential. There are therefore solutions adapted to the needs of all levels. www.yourlegalconsultants.com info@yourlegalconsultants.com
  • 14. GOVERNANCE IT DOCUMENTS Payment required www.yourlegalconsultants.com info@yourlegalconsultants.com
  • 15. 9. GOBERNANCE IT DOCUMENTS Key points in implementing governance IT www.yourlegalconsultants.com info@yourlegalconsultants.com Procedure documents
  • 16. Thank you for your interest governanceIT@yourlegalconsultants.com For personal queries, please contact: www.yourlegalconsultants.com info@yourlegalconsultants.com