Remove Activation Remove Document Remove Outsourcing
article thumbnail

Preparing for Safe Electrical Disaster Recovery During Hurricane Season Using NFPA 70B

National Fire Protection Association

Securing the facility to limit damage 3. Mobilization of recovery personnel 4. Developing a safety plan 5. Temporary and emergency power generation 6. Initial damage assessment 7. Documentation 8. Equipment 9. Reenergization of the facility 10. System commissioning 11.

article thumbnail

Third-Party Risk Management 101

Fusion Risk Management

In the classic sense, across industries, third-party risk management is the consideration and control over outsourcing a function that typically is done within the organization to an external party for the purpose of delivery of a product or service to the consumer or a service provided to the company. breach, management departures, etc.).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Policy Management 101

Fusion Risk Management

The scrutiny is going to get even more stringent in a post-COVID world since so many institutions had to rely on aggressive outsourcing. The policy should be actively reviewed by the board and reflected in meeting minutes – not just in a rubber-stamp exercise. Your third-party risk policy is every bit as important as any other policy.

article thumbnail

The lowdown on network management services

Online Computers

Fault management technicians are tasked with detecting problems, isolating faults, determining causes of issues, troubleshooting and resolving problems, and documenting the processes used in responding to tech issues. This area is about monitoring and documenting network device configurations. Network configuration management.

article thumbnail

Prevent A Security Breach When An Employee Quits

LAN Infotech

If your employees consent to surveillance, you should track all their digital activities. A sound surveillance system should: Record employee activities. Help with reporting any suspicious activity. Take note of valuable information in your organization when developing a confidentiality document. Install Tracking System.

article thumbnail

COVID-19 and your response

KingsBridge BCP

5 – Is procedural documentation up to date? If someone is placed in an unfamiliar position, ensure they have the documentation they need to get the job done. . If manager A is not available, be sure it’s documented who will take over. Can we outsource should we need? We still face outages and shortages.

BCP 52
article thumbnail

Why is so hard to engage an IT Organization???

Stratogrid Advisory

The conclusion was that to be successful and effective, Business Continuity Planning must be an organization-wide activity. So why is it so darn hard to engage an Information Technology (IT) organization (internal or external) in any business continuity planning activities? It’s happening everywhere! IT must be engaged (early)!

BCM 52