preview

Tft2 Task3 Essay

Better Essays

TFT2 Task 2
Thomas Garner
Student ID: 336227

Information Security Modification Recommendations Service Level Agreement Between Finman Account Management, LLC, Datanal Inc., and Minertek, Inc.

After careful review of the current Service Level Agreement(SLA) “A Service Level Agreement for Provvision of Specified IT Services Between Finman Account Management, LLC, Datanal, Inc., and Minertek, Inc.” we have determined that standard Information Technology security measures have not been addressed fully. Following are the recommended changes highlighted in the specific sections that need to be addressed. These changes are being recommended to protect Finman’s data and intellectual property. Established standards such as Best …show more content…

Datanal will establish an Access Control List (ACL) and create Group Policies (GP) to establish authentication and authorization to specific network resources for users. Establishment of a Third Party Verification (TPV) process will provide confidentiality and integrity to meet current industry standards. Secure backup solutions that are compliant with industry standards will be established to insure the integrity of data. Datanal will insure compliance with International Trade Agreements, Federal patient laws, copyright laws and fair trade agreements for Information Security (IS).

TFT2 Task 2
Thomas Garner
Student ID: 336227

Section 4 Statement of Intent Modifications:
As recognized by leading research and consulting firms with knowledgeable, skilled management, advanced state-of-the-art IT affords extraordinary opportunities for greater efficiencies, cost reduction, higher productivity, customer satisfaction, and profitability. Sophisticated IT applications realize their full potential with highly specialized technical knowledge and management skills readily available only in smaller firms focused primarily or exclusively on such applications. Through State of the art IT Security Management (ITSM) processes such as threat management, auditing, encryption and customer education will be used to prevent misuse and/or abuse of Finman’s IT resources or services.

1. Justify how your recommendations will limit use, sharing,

Get Access