Preview

Federal Information System Contingency Planning Essay

Good Essays
Open Document
Open Document
3030 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Federal Information System Contingency Planning Essay
NIST Special Publication 800-34 Rev. 1

Contingency Planning Guide for
Federal Information Systems
Marianne Swanson
Pauline Bowen
Amy Wohl Phillips
Dean Gallup
David Lynes

NIST Special Publication 800-34 Rev. 1

Contingency Planning Guide for
Federal Information Systems
Marianne Swanson
Pauline Bowen
Amy Wohl Phillips
Dean Gallup
David Lynes

May 2010

U.S. Department of Commerce
Gary Locke, Secretary
National Institute of Standards and Technology
Patrick D. Gallagher, Director

Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by
…show more content…
Change “All” to “Low Impact = Yes
Mod. Impact = Yes
High Impact = Yes”
Add Contingency Plan Control-4 (CP-4) to the
Alternate Processing Site Recovery event; Change
Moderate Impact requirement from “Yes” to “N/A”
Add commas around “as part of the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    • Your summary should be written in a concise and clear manner that summarizes your policy for readers.…

    • 470 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario.…

    • 4827 Words
    • 20 Pages
    Powerful Essays
  • Satisfactory Essays

    This paperwork of IT 244 Week 1 Individual Introduction to the Information Security Policy Appendix C comprises:…

    • 396 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Kudler Fine Foods is a specialty grocery store located in the San Diego area. The first location was opened by Kathy Kudler in June 1998. Currently there are three locations in La Jolla, Del Mar, and Encinitas. Kudler Fine Foods has a variety of domestic and imported food and beverage items including produce, meat, seafood, condiments, packaged foods, cheese, dairy products, wine, and a bakery. Our firm has been hired by Kudler Fine Foods in order to assess their accounting and information technology systems. This brief will address their business and accounting information needs, their current hardware and software, the strengths and weaknesses of the current computer system, explore opportunities for upgrades in technology use, evaluate threats regarding the current information technology systems, and recommendations that could improve their ability to conduct business.…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Mullinex, L. S. (2012, January). Confusion over the Telephone Consumer Protection Act. Social science research network, 34(20), 9.…

    • 453 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Security Breach Plan Paper

    • 1576 Words
    • 7 Pages

    Patient privacy and security is one of the most important aspects of the St. Johns Hospital code of conduct, they take pride in the sound policies and procedures set to maintain customer confidentiality. Each employee is held to a high standard of maintaining the highest level of privacy and confidentiality when it comes to patient health information (PHI). This paper will outline the plan that St. John’s hospital has created in case of a security breach or security threat in the facility. The primary cause of a security breach is usually related to the people or business side of and organization (Rhoades, MBA, RHIA, CHPS, CPHIMS, FHIMA, 2009).…

    • 1576 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Discuss the steps involved in developing a Homeland Security Plan and Budget after the Homeland Security Assessment of the organization has been completed.…

    • 605 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Often when governments pass laws and acts, it is to serve better the people within their country or jurisdiction at that moment as well as the foreseeable future. However with the quickly changing technology of today it is not always possible to pass laws that last very long when it aimed at controlling or monitoring certain technology. In the last few decades the United States Government passed two laws aimed at telemarketers. The first Act was passed in 1991 and is called the Telephone Consumer Protection Act (TCPA) and the second is the Do Not Call Implementation Act of 2003.…

    • 674 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Final

    • 2470 Words
    • 10 Pages

    Nici, A. (2012, June 12). Live Chat 7. Retrieved June 17, 2012, from Colorado Technical University Online: http://ctuadobeconnect.careeredonline.com/p12221060/?session=breezzdc9uddrsheofqz2…

    • 2470 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    Emergency Operations Plan

    • 1433 Words
    • 6 Pages

    The second phase in producing an effective emergency plan includes the preparedness of law enforcement agencies. Preparedness includes developing, researching, and testing of risk assessments, emergency personnel, notification systems, resources and supplies, and information dissemination. Preparedness will also help coordinate and develop plans to save lives. The third phase in emergency planning is response; this phase provides the assistance during an emergency to prevent further injuries, property damage, and help to accelerate recovery. The response phase also includes the implementation of emergency operational plans, the issuance of public warnings, field operations, and development of incident action plans, and the command, and control of the incident (EMHSD/MSP, 2009).…

    • 1433 Words
    • 6 Pages
    Better Essays
  • Good Essays

    What were the advances in information technology that resulted in new ethical issues necessitating the creation of each act?…

    • 604 Words
    • 3 Pages
    Good Essays
  • Good Essays

    There are numerous amounts on Acts out there that protect web users; the Children’s Internet Protection Act, also known as CIPA and The Children’s Online Privacy Protection Act also known as COPPA are two Acts that protect what children’s see in the internet or their personal information on the web.…

    • 559 Words
    • 3 Pages
    Good Essays
  • Good Essays

    With the internet changing constantly every day the United States Congress are implementing many legislative acts to address concerns with the usage of different kinds of technology. There are many advances in information technology that resulted in ethical issues such as the creation of the Children’s Internet Protection Act (CIPA) which was put into law in the year of 2000 by Congress. This law addresses any concerns about access to offensive content on the internet in the schools and libraries. Children and teenagers are exposed to the internet daily in schools, public, and at home. The internet can expose children to inappropriate material and predators online. The schools and libraries must enforce an Internet safety policy that contains protection measures, which block or filter the internet access to images that are obscene, child pornography, and what is harmful to minors. The main purpose of the act is to protect children from the dangers that the internet has ("Federal Communications Commission", n.d.).…

    • 277 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The specific agency operating under The Department of Homeland Security I choose to research was the United States Secret Service. The USSS is a federal law enforcement agency that was operated under the US Department of Treasury before it was adopted by the department of Homeland Security. Many people, including myself up until now, just think that the Secret Service is the US Presidents personal guard. They have much more responsibility then that. Other then the President, they also provide security for past Presidents, Vice presidents, visiting heads of state, presidential candidates, and foreign embassies, as well as their families. They are also responsible for financial crimes, including things like counterfeit U.S currency, U.S treasury…

    • 535 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The internet has made is easy for people to access an unlimited amount of information at anytime. Advances in information technology have resulted in new ethical issues that needed to be addressed. Children need to be protected from being taken advantage of in this new digital age. Parents also want to ensure that their children aren’t subjected to material that is considered inappropriate. The federal government has passed laws to prevent the abuse of children on the internet.…

    • 444 Words
    • 2 Pages
    Satisfactory Essays