IT Organization & Structure – The organization must use governance and best practices to ensure that the right individuals are assigned to the appropriate roles that can support the merged organization. IT can be a resourceful tool that facilitates growth requirements.
IT Security & Privacy – Companies are most vulnerable to data breaches when they exchange personal information during a merger. Most organizations get so wrapped up in completing the deal, that they neglect best practices. Therefore it is necessary to create a framework that guards employee and customer data.
IT Operational Processes – Ensuring that all processes and controls are in place to enable the framework to run seamlessly. The framework should include a support management team, change management and a disaster recovery contingency plan.
The Marriot and Starwood integration teams both worked long and hard to figure out which systems from each organization were the most efficient. Early into the planning process we learned that a lot of Marriott’s tacit knowledge has yet to be transferred into explicit content. They had no real system in place and the ones that they do, are not fully optimized. Marriott is a family run business that grew into an organization; therefore they still have an old fashioned way of doing things. Their billing functions are not electronic, as well as their files, payroll, etc. Starwood on the other hand since infancy has always relied on technology to push the
Marriott is renowned for its elegant and comfortable hotels and resorts. The company caters to a targeted customer base, ranging from the frequent corporate business traveler to the family enjoying their occasional weekend get-away. Marriott has continued its rise in the lodging, contract services, and restaurant industries. The company continuously strives to meet the needs and wants of its customers while strategically maneuvering the rigors of today’s competitive and ever-evolving market of glamorous destinations and convenient services. In order to remain relevant in a highly-competitive environment, Marriott must strike that successful balance of minimizing costs, and gaining and effectively
The human resources department needs to revisit some of their decisions to strength their portion of the structure and better the company for the future. The high turnover rate has caused lack of employee motivation, low morale and with pay levels below their competitors’standards; there is lack of structure in the performance review process within the entire company. These issues can be corrected by creating a coaching, feedback process, and
First, Incident Response (IR) plan “is a detailed set of processes and procedures that anticipate, detect, and mitigate the effects of an unexpected event that might compromise information resources and assets.” (Whitman, 2013, p. 85). Consequently, Incident response planning (IRP) is the planning for an incident, which occurs when an attack affects information systems causing disruptions. On the other hand, Disaster Recovery (DR) plan “entails the preparation for and recovery from a disaster, whether natural or human-made.” (Whitman, 2013, p. 97). For instance, events categorized as disasters include fire, flood, storm or earthquake. Thus, the differences between an Incident Response (IR) plan and a Disaster Recovery (DR)
The purpose of the Emergency Preparedness Plan is to save lives and prevent injuries in case of emergencies such as nuclear attack, fire, natural disaster, civil disorder or other, and provide the necessary best practices to ensure all possible and relevant forms of communicating with our faculty, staff, students, and parents. Mrs. Patricia Harris of the International Studies Elementary Charter School was interviewed about the International Studies Elementary Charter School’s Emergency Management Plan and the role of the school counselor during emergencies. Surprisingly, the school counselor does not play as important of a role than one would have thought. Although, the counselor does serve as one of the Designated School Emergency Team Members, some the tasks that would seem likely the counselor would perform, are performed by other administrators. Tasks such as talking to parents or being there for the students are performed by the principal while the school counselor is delegated to direct traffic. Based on the Emergency Management Plan, it would seem that the school counselor’s role is still not clearly understood. With all the expertise that counselors can bring to a crisis situation, it’s disappointing that counselors are assigned such a miniscule task as delegating traffic. Counselor Harris did discuss the Dougherty County School System’s Crisis Team. That team is
As technology grows and information has become a critical asset companies currently are devoted their resource and money to protect their data as important as their finance and human resource assets.
While all of these technologies have enabled exciting changes and opportunities for businesses, they have also created a unique set of challenges for business managers. Chief among all concerns about technology is the issue of information security. It seems to be almost a weekly occurrence to see a news article about yet another breach of security and loss of sensitive data. Many people will remember high profile data breaches from companies such as T.J Maxx, Boston Market, Sports Authority, and OfficeMax. In the case of T.J. Maxx, a data breach resulted in the loss of more than 45 million credit and debit card numbers. In many of these incidents, the root cause is a lack of adequate security practices within the company. The same technologies that enable managers can also be used against them. Because of this, businesses must take appropriate steps to ensure their data remains secure and their communications remain
Disasters weather man-made, natural, or technological are ineluctable. Community stakeholders, leaders, and citizens are ultimately culpable for ensuring that a sound disaster preparedness and recovery plan is in place should a calamity materialize. Failure to enact such a plan comes with immeasurable consequences. Over the discourse of this paper, the Banqiao Dam disaster will be examined as a case analysis, to render what preparedness and recovery plans were sanctioned, as well as the scope of the response effort.
The Operations Process is an organizational infrastructure created for commanders and their staffs to conduct a mission. It includes the major mission command activities of planning, preparing, executing, and assessing. These activities within the Operations Process do not create a rigid, linear set of tasks. Rather, each of the tasks overlap the others, making a fluid series of responsibilities rather than a step-by-step process. For example, in many situations it may be necessary to begin preparations whilst the planning phase is still underway to ensure the resources are available to
According to Miles et al. (1978, p. 547), an organization is both its purpose and the mechanism constructed to achieve the purpose. It means that the concept of organization is embracing both goals and all the elements that represent unique combination. Miles et al. (1978, p. 553) draws the conclusion that structure and the processes taking place inside the organization are closely aligned; it is hard to speak about one without mentioning the other. It is important to understand the conclusion drawn by Miles et al. (1978). It illustrates how the
Security measures to be input into the firm to boost disaster recovery process include establishing firm registry in bomb proof vaults that will shield the firm’s documents and data from disasters such as terrorist attacks. Such will ensure that the records of the firm are not tampered with and as such the company is able to run business without fundamental data loss (Menken and Blokdjik, 2010).
Marriott International envisions itself to be the world’s lodging leader. Its mission is to provide the best possible lodging services experience to customers who vary in backgrounds, language, tradition, religion and cultures all around the world. Marriot is committed to environmental preservation through using environment-friendly technology and engages in social responsibility and community engagement. We value our shareholder’s so we will only take steps that will ensure our growth. Most importantly, through our “spirit to serve”, we emphasize the importance of Marriott’s people and recognize the value they bring to the organization’s growth and success. It aims to increase revenues by 9% every year, to increase
Disaster Recovery Planning is the critical factor that can prevent headaches or nightmares experienced by an organization in times of disaster. Having a disaster recovery plan marks the difference between organizations that can successfully manage crises with minimal cost, effort and with maximum speed, and those organizations that cannot. By having back-up plans, not only for equipment and network recovery, but also detailed disaster recovery plans that precisely outline what steps each person involved in recovery efforts should undertake, an organization can improve their recovery time and minimize the disrupted time for their normal business functions. Thus it is essential that disaster recovery plans are carefully laid
a significant amount of data security breaches are due to either employee oversight or poor business process. This presents a challenge for businesses as the solution to these problems will be far greater than simply deploying a secure content management system. Business processes will need to be examined, and probably re-engineered; personnel will need to be retrained, and a cultural change may be required within the organization. These alone are significant challenges for a business. A recent example of what is probably unintentional featured an Australian employment agency’s web site publishing “Confidential data including names, email addresses and passwords of clients” from its database on the public web site. An additional
Database security is vital for any and every organization which uses databases. Without proper security, the databases can be breached and the breaches can lead to confidential information being released. This has happened to many organizations whether they are large or small; for example, in the past few years Target and Sony both fell victim to database breaches. To make matters worse both Target and Sony were actually warned about the flaws in their security, but neither took any action to resolve the flaws. Looking into these breaches and how they were handled could lead to designing better databases. Organizations should also look within themselves to assure all employees know good security practices. Simply following regular procedures such as installing antivirus software and firewalls can help create more secure databases. An organization should look at all of their databases to ensure the same top level security is established for all of their databases.
Operational management processes in a firm involves overseeing, formulating and reformulation of the operations of a business. The processes are meant to ensure efficiency in administering resources whilst ensuring there is effective management of client’s specifications and or directions. This is achieved by adding value to the firm’s processes. Such achievements are experienced when a firm embarks in directing its physical and or technical functions towards enhancing its development, production and manufacturing. These should be pre-determined and controlled by market opportunities if a company is to reach its ultimate production levels. Their realisation adds up to ensuring the future of a firm, offering operational