Podcast
Questions and Answers
What is the primary purpose of Rules in an organization?
What is the primary purpose of Rules in an organization?
- To provide specific steps for completing tasks.
- To establish communication protocols within the organization.
- To regulate how employees make decisions. (correct)
- To dictate consequences for employee actions.
Which of the following best describes protocols in an EIS?
Which of the following best describes protocols in an EIS?
- They are broad principles that guide ethical decisions.
- They outline the consequences for data breaches.
- They are detailed steps on how to handle specific processes. (correct)
- They are rules that pertain only to data access.
Which of the following is an example of a Protocol of an Enterprise Information System
Which of the following is an example of a Protocol of an Enterprise Information System
- A rule that requires all data entries to be reviewed weekly.
- A rule that limits access to sensitive data to management levels only.
- A list of the specific steps to be taken in case of a data breach. (correct)
- A rule that requires system audits to be conducted at the end of each fiscal quarter.
Which of the following is an example of a Rule of an Enterprise Information System?
Which of the following is an example of a Rule of an Enterprise Information System?
What protocols are used to securely transfer sensitive data outside of an organization?
What protocols are used to securely transfer sensitive data outside of an organization?
How do rules and protocols relate to each other within an EIS?
How do rules and protocols relate to each other within an EIS?
Flashcards
Rules in EIS
Rules in EIS
Broad principles that regulate how employees make decisions within a process. They act as the 'what' in organizational behavior.
Protocols in EIS
Protocols in EIS
Specific, detailed steps outlining how entities communicate and interact within a system. They standardize the 'how' of processes.
Data Handling Rule
Data Handling Rule
A rule that specifies how sensitive data is protected, both when it's being moved and when it's stored.
Acceptable Use Rule
Acceptable Use Rule
Signup and view all the flashcards
Data Backup and Recovery Protocol
Data Backup and Recovery Protocol
Signup and view all the flashcards
Code Review Protocol
Code Review Protocol
Signup and view all the flashcards
Software Testing Phases
Software Testing Phases
Signup and view all the flashcards
Incident Response Protocol
Incident Response Protocol
Signup and view all the flashcards
Data Handling & Protection Protocol
Data Handling & Protection Protocol
Signup and view all the flashcards
Communication Protocol
Communication Protocol
Signup and view all the flashcards
Study Notes
Organizational Processes and Standards
- Organizations use processes that repeat, like manufacturing goods, generating sales leads, or onboarding employees.
- Standards (rules and protocols) ensure these processes are done efficiently.
Rules
- Rules are broad guidelines for decision-making during a process.
- They dictate the "what" of organizational behaviour.
- Examples of typical rules in an enterprise information system (EIS):
- Password Policies: Complex passwords, changed regularly, mix of characters, no reuse of previous passwords.
- Access Control: Access restrictions based on job roles—employees only access relevant systems/data.
- Data Handling: Sensitive data encryption in transit and at rest.
- Acceptable Use: Restrictions on personal internet use during work hours, company email for business only, no unauthorized software.
- Incident Reporting: Immediate reporting of suspected data breaches or security incidents to the designated IT department.
Protocols
- Protocols are precise step-by-step instructions on "how" to do things within a process.
- They standardize the execution of processes.
- They dictate how entities interact within the systems.
- Examples of typical protocols in an EIS:
- Data Backup and Recovery: Nightly full backups of critical systems, backups stored on-site and off-site with encryption, quarterly recovery testing.
- Software Development and Deployment: Code reviews, various testing phases (unit tests, integration tests, user acceptance tests), specific deployment steps.
- Incident Response: Steps for detecting, responding to, and minimizing security issues, including automated tools for monitoring.
- Data Handling and Protection: Methods for transferring sensitive data outside the organization (e.g., SFTP or HTTPS), procedures for securely deleting data.
- Communication: Designated tools and methods for internal and external communications, including encrypted email, secure messaging, and crisis communication plan.
Rules and Protocols Relationship
- Rules and protocols work together—rules define the "what", while protocols define the "how".
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on organizational processes and the standards that govern them. This quiz covers key concepts such as rules for decision-making, password policies, access control, and data handling. Gain insights into how organizations can operate efficiently and securely.