Controlling the Offsite Storage Report (Assessment)

Exclusively available on Available only on IvyPanda®
This academic paper example has been carefully picked, checked and refined by our editorial team.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

Introduction

A large firm with many divisions and operating in different locations was focused on adding controls and reducing the risks associated with the offsite storage of the company’s records.

Statement of the Problem

The firm lacked the effective business intelligence solution to control the offsite storage of the company’s records, and it had no developed strategy in order to reduce possible risks associated with the offsite storage.

Objectives

The stated objectives were to assess the technology options available in the firm for improving the controls and assess the used strategies and approaches to reduce possible risks associated with the offsite storage. Furthermore, the BIS experts’ task was to develop specific requirements for “a consistent approach for records ownership, metadata quality, and records labeling” (“Case Study 3”).

Areas of Considerations

The problem associated with the offsite storage records was in the fact that the company had many offsite storage vendors. Furthermore, different methods of storing and retrieving records were used in the firm. In addition, the “limited controls for adding new users, inconsistent data requirements for records, and lack of clear ownership for records” were identified as the areas for considerations while focusing on the problem to be addressed (“Case Study 3”).

From this perspective, it was important to focus on assessing the available technology options and approaches to reduce offsite storage risks. Furthermore, it was necessary to revise the requirements to storing the data offsite and to provide the effective strategy to add controls and contribute to reducing the offsite records storage risks.

Alternative Courses of Action

It is important to focus on two possible courses of actions appropriate for the resolution of the discussed case. The first course of actions is proposed as the primary because it is developed by the BIS experts. The company was proposed with such solutions to the problem as the use of offsite inventory for vendors according to the firm’s requirements formulated for the offsite storage (“Case Study 3”).

The second solution was based on conducting the assessment of technology options while comparing them with the set requirements. The appropriate technology solution to address the requirements was chosen. Thus, the requirements were defined and set as regular for the company.

The next step was on developing, testing, and presenting the new technology to offsite users of the records’ storage. Finally, a regional rollout approach was developed by experts to address the problem of controlling the work activities and workload.

The alternative course of action reflects the main steps performed by the BIS experts, but it is more focused on the formulation of requirements and on the issue of the data security. Requirements should include compliance, security, accessibility, convenience, consistent work, completeness, accuracy, and validity.

If the company has multiple offsite storage vendors, it is necessary to focus on using one effective back up plan to store and share the necessary information with the help of the most appropriate system (Howson Secrets to Making BI 58).

The first step is to decide on the requirements and standards followed to add controls and the next step is the encryption of the data to guarantee the security and the development of protocols if there are “limited controls for adding new users” (“Case Study 3”). It is also necessary to focus on the data organization and classification to reduce possible risks.

In addition, such stage as reporting on the operations with the offsite records can be discussed as necessary because of informing about any risks or non-allowable operations (Boyer et al. 12). The next step is the guarantee of following the same standards and the guarantee of interoperability of systems to improve the process of storing and retrieving records.

Analysis of Each Alternative Courses of Action

It is stated that the solution proposed by the BIS experts “resulted in consistent user access controls, records labeling, and categorization of contents” (“Case Study 3”). Still, it is necessary to analyze two courses of actions in order to conclude on their effectiveness to add controls and reduce offsite data storage risks.

The first course of action is rather effective to provide the fundament for the further improvement of controls and risk mitigation strategies (Howson Unlock the Value of BI 37). The second course of actions is effective to address the problem at the current stage, while providing reasonable steps associated with the development of the alternative BI strategy.

Conclusion

Thus, data security is one of the most important issues associated with the offsite data storage risks and adding controls strategies. It is important to state that the company can benefit while choosing the alternative course of action because it provides clear steps to perform while adding controls and mitigating risks.

Recommendations

In order to avoid risks associated with the offsite records storage and use effective control strategies, it is necessary to follow some recommendations:

  1. The first step is the implementation of assessment and testing strategies for evaluating the work of stated controls and security standards.
  2. The monitoring of the BI system should be regular.
  3. The next step is the creation of the BI policy followed in the company.
  4. The important step is the development of the control framework for offsite storages based on standards and experts’ support.
  5. The company should address the issue of common standards and interoperability in relation to the process of storing and retrieving records.

Works Cited

Boyer, John, Bill Frank, Brian Green, Tracy Harris, and Kay Van De Vaner. Business Intelligence Strategy: A Practical Guide for Achieving BI Excellence. New York: Mc Press, 2010. Print.

Case Study 3. 2008. Web.

Howson, Cindi. Successful Business Intelligence: Secrets to Making BI a Killer App. New York: McGraw Hill, 2008. Print.

Howson, Cindi. Successful Business Intelligence: Unlock the Value of BI and Big Data. New York: McGraw Hill, 2014. Print.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2019, June 22). Controlling the Offsite Storage. https://ivypanda.com/essays/controlling-the-offsite-storage/

Work Cited

"Controlling the Offsite Storage." IvyPanda, 22 June 2019, ivypanda.com/essays/controlling-the-offsite-storage/.

References

IvyPanda. (2019) 'Controlling the Offsite Storage'. 22 June.

References

IvyPanda. 2019. "Controlling the Offsite Storage." June 22, 2019. https://ivypanda.com/essays/controlling-the-offsite-storage/.

1. IvyPanda. "Controlling the Offsite Storage." June 22, 2019. https://ivypanda.com/essays/controlling-the-offsite-storage/.


Bibliography


IvyPanda. "Controlling the Offsite Storage." June 22, 2019. https://ivypanda.com/essays/controlling-the-offsite-storage/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1