Information Technology Management

Information Technology Management
Data management is one of the most significant aspects of the
information technology sector. This enables an organization to improve
efficiency, reduce redundancy, and improve on data security. Data
security is paramount as it protects customers from lapses in security,
which may prove costly. An effective data management software or system
has to have unique security features and must be able to adapt to the
changing needs of the information technology sector. Information
technology is very diverse and a good system is one that can accommodate
these changes without compromising on quality and security.
Recommend changes (i.e., modifications, insertions, or deletions) to the
attached Service Level Agreement to better protect Finman data and
intellectual property.
The Service Level Agreement can be improved by ensuring that those
working in the project have a highly synchronized work schedule. The
implementation of the project will require the combined efforts of
Datanal and Minertek employees. The two firms have separate and clear
areas of specialization. Thus, for the effective implementation of the
system, the process has to be highly synchronized and the employees will
be required to work closely, preferably in the same environment. This
will facilitate real- time exchange of ideas so as to come up with an
efficient data management system (Cazemier, Overbeek & Peters, 2000).
The non- exclusivity clause also states that Finman is free to terminate
the contract with the two companies or add other contractors to the
project. This can be made exclusive for effectiveness. Exclusivity gives
security of purpose and gives the two companies the freedom and security
to give their very best.
Finman ought to also recommend that its information technology
consultant be integrated into the Datanal- Minertek team. The SLA
provides for frequent updates on the progress of the system. However,
having an in- house employee working closely with the team will ensure
that all the needs of Finman are well covered. This can also result in a
more efficient system as the in- house specialist can recommend minor
changes that make the system unique to the company’s needs. This will
result in a system that is unique and caters to Finman’s needs
efficiently. Additionally, Finman ought to acquire full rights to the
system once it is complete to minimize chances of interference of
duplicate, which may compromise the security of the system (Schwalbe,
2000).
Justify how your recommendations will limit use, sharing, retention, and
destruction of Finman’s corporate data by Datanal and Minertek.
Acquisistion of full rights will mean that the system cannot be
duplicated and especially sold to other clients. This protects the
security of Finman’s data because rivals cannot use the system to
compromise Finman’s operations. Datanal and Minertek will also be
unable to access Finman’s data without permission and this increases
the integrity of the data (Mohan, 2005). The inclusion of personnel from
Finman also ensures that any data that is classified, but is availed to
the technicians as they develop the system, is destroyed as soon as the
technicians have finished using it. Thus, there is controlled use of
data so as to protect Finman’s customers from unintended exposure.
Making the contract exclusive adds security because it limits the number
of people who access shared information. It also means that the software
provided can be patented for security purposes.
Moreover, as the system is being developed, the personnel from both
Datanal and Minetek will ensure that data shared by Finman does not have
to pass through too many channels. This is because Finman may have to
share its data with the two firms occasionally and is the personnel work
separately there data may pass through too many channels. This may end
up compromising the data. It may also be difficult to ensure that the
data is destroyed after each step (Schwalbe, 2000). However, if the
technicians work together, any data shared will pass through fewer
channels and this makes the process of destruction easy and efficient.
Justify how your recommendations will assure that Finman’s property,
patents, copyrights, and other proprietary rights are protected.
The most significant recommendation is having a person from Finman work
closely with the team from Datanal and Minertek. This ensures that as
the system is being developed, there is close monitoring of the process.
It also ensures that Finman’s patents and property are protected as
the information- sharing process is closely monitored. A present
personnel from Finman ensures that any data and information that is
privileged is not used unnecessarily. This is because if there is the
need to share any classified information or patented information, the
process of using it follows proper guidelines. The contract ought to be
made exclusive so as to protect the patent rights of Finman. Exclusivity
limits the number of people who are eligible for patented and
confidential information sharing.
There is also the need to have Datanal and Minertek personnel work
closely. This will ensure that Finman’s property rights are availed to
the most significant people only. This also enhances accountability as
access to patented information is privileged and thus, there is close
monitoring. The personnel can also use the data out and destroy it with
passing it through too many channels. This is because patented
information is highly classified and passing it through too many
channels exposes it to unintended access (Mohan, 2005). However, working
closely facilitates an organized system of information sharing and
handling, thus protecting the property rights of Finman.
There is also the need to synchronize the whole system. This ensures
that information flow is efficient and fast. This protects Finman’s
property rights and patent because the process of sharing information is
smooth. A synchronized system means that the process of sharing any
information passes through protected channels, which upholds the
information’s integrity. This can also facilitate close monitoring as
all channels of communication are clear. Synchronization also ensures
that the systems are organized in such a way that people with no
permission to access the system are kept at bay. This means that
Finman’s property rights and patents are upheld.
References
Cazemier, J, A. Overbeek, P, L & Peters, L, M. (2000). Security
Management. New York: The Stationery Office.
Mohan, R. R. (2005). Information technology management. Jaipur, India:
ABD Publishers.
Schwalbe, K. (2000). Information technology project management.
Cambridge, Ma: Course Technology.
INFORMATION TECHNOLOGY MANAGEMENT PAGE * MERGEFORMAT 6
INFORMATION TECHNOLOGY MANAGEMENT PAGE *
MERGEFORMAT 1