SlideShare a Scribd company logo
Office management
 Security Data protection means 
protecting a database from destructive 
forces and the unwanted actions of 
unauthorized users. 
 Security Audit is a systematic, 
measurable, technical assessment of how 
the organization's security policy is 
employed at a specific site.
• Protecting Data? 
• Protecting People 
 Prevent harm to the individuals 
whose data the organizations hold 
and also the other people. 
 Keep information in the right hands. 
 Hold good quality data.
 Huge amounts of data about people can 
be stored on office computers and can be 
easily searched. 
 This data can be lost, stolen or 
transferred to another country easily. 
 Careless or inaccurate processing of data 
can lead to the other people seeing the 
data.
 SONY: 77 million PlayStation Network 
accounts hacked; Sony is said to have lost 
millions while the site was down for a 
month. 
 Card System Solutions: 40 million credit 
card accounts exposed. CSS, one of the top 
payment processors for Visa, MasterCard, 
American Express is ultimately forced into 
acquisition. 
 Monster.com: Confidential information of 
1.3 million job seekers stolen and used in a 
phishing scam.
 Data must be collected and processed fairly. 
 Data must be collected and used only for 
specified and lawful purpose. 
 Data must be adequate, relevant and not 
excessive. 
 Data must be kept accurate and up to date. 
 Data must not be kept longer than necessary. 
 Data must be kept secure against unauthorised 
processing, damage or loss. 
 Data must not be transferred outside the 
organization unless protection is adequate.
 To adequately determine whether or not the client’s goal 
is being achieved, the auditor should perform the 
following before conducting the review: 
 Meet with IT management to determine possible areas 
of concern. 
 Review the current IT organization chart. 
 Review job descriptions of data center employees. 
 Research all operating system, software application and 
data center equipment operating within the data center. 
 Review the company’s IT policies and procedures. 
 Evaluate the company’s IT budget and systems planning 
documentation. 
 Review the data center’s disaster recovery plan.
 Following is a list of objectives the auditor 
should review after planning and preparation: 
 Personnel procedures and responsibilities including 
systems and cross-functional training. 
 Change Management processes in place followed by IT 
and management personnel. 
 Appropriate back up procedures in place to minimize 
downtime and prevent loss of important data. 
 Ensure that the data center has adequate physical security 
controls to prevent unauthorized access to the data center. 
 Adequate environmental controls in place to ensure 
equipment is protected from fire and flooding.
 Firewalls 
 Proxy Servers 
 Encryption 
 Logical Security 
 Access Controls 
Anti Virus Software 
 Auditing Systems such as Log 
Management.
Office management

More Related Content

DOCX
Introduction to office management
PPTX
Office accommodation and work environment
PPT
organising - principles of management
PPTX
Payroll Management System
PPTX
Behavioral management theory
PPTX
Human resource information system
PDF
Administration and office management best practices and technologies
PPTX
Office Management
Introduction to office management
Office accommodation and work environment
organising - principles of management
Payroll Management System
Behavioral management theory
Human resource information system
Administration and office management best practices and technologies
Office Management

What's hot (20)

PPTX
Introduction to office management
PPTX
Introduction to Human Resource Information System (HRIS)
PPTX
Directing and managerial leadership
PPTX
Office management
PPT
Payroll Management System
PPTX
ERP IT Infrastructure Audit
PPT
Human Resource Management
PPTX
Employee Management System
PDF
Organizational climate
PPTX
Payroll process flowchart
PPTX
Office management
PPTX
Office Accomodation
PPTX
Functions of Human Resource Management
DOCX
Office Accommodation
PPTX
Role of mis in hrm
PPTX
Office Administration
PPT
TPS Characteristics
PPTX
Human resource planning
PPTX
RECORDS MANANGEMENT SYSTEM (Electronic Records Management)
PPTX
Principles of records management Mushi
Introduction to office management
Introduction to Human Resource Information System (HRIS)
Directing and managerial leadership
Office management
Payroll Management System
ERP IT Infrastructure Audit
Human Resource Management
Employee Management System
Organizational climate
Payroll process flowchart
Office management
Office Accomodation
Functions of Human Resource Management
Office Accommodation
Role of mis in hrm
Office Administration
TPS Characteristics
Human resource planning
RECORDS MANANGEMENT SYSTEM (Electronic Records Management)
Principles of records management Mushi
Ad

Viewers also liked (20)

PPTX
Murray ian
PPTX
Assertiveness skills-basics
PPTX
Office management administration masterclass_fokas_april 2015_condensed
PPT
Administrative Assistant Presentation
PDF
Business English Email Quiz
PPTX
13 Best Practices of Office Management
PPTX
Work life balance
PDF
Business grammar __practice_(new_edition)
DOC
Writing reports and proposals
PPTX
Formal reports and proposals
PPTX
Useful phrases to begin each section in your emails in English.
PDF
Business Grammar Builder
PPTX
Fun Ways To Deal With Difficult People
PDF
Dealing with difficult people
PDF
Email writing: Apologising Phrases
PPT
Dealing with Difficult People and Situations in the Workplace
PDF
Professionalism in the work place
PPTX
Personality
PPTX
Personality and emotions ppt marks.
Murray ian
Assertiveness skills-basics
Office management administration masterclass_fokas_april 2015_condensed
Administrative Assistant Presentation
Business English Email Quiz
13 Best Practices of Office Management
Work life balance
Business grammar __practice_(new_edition)
Writing reports and proposals
Formal reports and proposals
Useful phrases to begin each section in your emails in English.
Business Grammar Builder
Fun Ways To Deal With Difficult People
Dealing with difficult people
Email writing: Apologising Phrases
Dealing with Difficult People and Situations in the Workplace
Professionalism in the work place
Personality
Personality and emotions ppt marks.
Ad

Similar to Office management (20)

PPTX
MIS.pptx Management of information system
DOCX
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docx
PPTX
Foundation Of Information System
PPTX
Data security
PPT
Information security
PPTX
Computer security
PDF
Cybersecurity risk assessments help organizations identify.pdf
PDF
CCA study group
PPTX
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
PDF
How Data Security Impacts The Tech Industry
PPTX
How Data Security Impacts The Tech Industry.pptx
PPTX
CONTROL AND AUDIT
PPTX
Heartlandpt3
PPTX
Secure Your Career Shift With Computer-Security Training
PPTX
insider threat research
PDF
Unit 5 v2
PDF
Information systems by checkmate...
PPTX
FY bms ch1.pptx INFORMATION TECHNOLOGY IN BUSINESS MANAGEMENT
DOCX
Information 2nd lesson
PPTX
Heartlandpt3
MIS.pptx Management of information system
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docx
Foundation Of Information System
Data security
Information security
Computer security
Cybersecurity risk assessments help organizations identify.pdf
CCA study group
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
How Data Security Impacts The Tech Industry
How Data Security Impacts The Tech Industry.pptx
CONTROL AND AUDIT
Heartlandpt3
Secure Your Career Shift With Computer-Security Training
insider threat research
Unit 5 v2
Information systems by checkmate...
FY bms ch1.pptx INFORMATION TECHNOLOGY IN BUSINESS MANAGEMENT
Information 2nd lesson
Heartlandpt3

More from Aditya Purohit (6)

PPTX
Company law aditya
PPTX
Business research Presentation
PDF
E commerce project report
DOCX
Case study on Business Statistics
DOCX
Case study on Cost Accounting
DOCX
Business research project
Company law aditya
Business research Presentation
E commerce project report
Case study on Business Statistics
Case study on Cost Accounting
Business research project

Recently uploaded (20)

PDF
IFRS Notes in your pocket for study all the time
PPTX
svnfcksanfskjcsnvvjknsnvsdscnsncxasxa saccacxsax
PDF
1911 Gold Corporate Presentation Aug 2025.pdf
PDF
Technical Architecture - Chainsys dataZap
PPTX
Negotiation and Persuasion Skills: A Shrewd Person's Perspective
PPT
Lecture 3344;;,,(,(((((((((((((((((((((((
PDF
Solaris Resources Presentation - Corporate August 2025.pdf
PPTX
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
PDF
Tata consultancy services case study shri Sharda college, basrur
PDF
How to Get Approval for Business Funding
PDF
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
PPTX
Astra-Investor- business Presentation (1).pptx
PDF
How to Get Funding for Your Trucking Business
PDF
ANALYZING THE OPPORTUNITIES OF DIGITAL MARKETING IN BANGLADESH TO PROVIDE AN ...
PPTX
operations management : demand supply ch
PDF
Daniels 2024 Inclusive, Sustainable Development
PPTX
sales presentation، Training Overview.pptx
PDF
Comments on Crystal Cloud and Energy Star.pdf
PDF
Cours de Système d'information about ERP.pdf
PDF
NEW - FEES STRUCTURES (01-july-2024).pdf
IFRS Notes in your pocket for study all the time
svnfcksanfskjcsnvvjknsnvsdscnsncxasxa saccacxsax
1911 Gold Corporate Presentation Aug 2025.pdf
Technical Architecture - Chainsys dataZap
Negotiation and Persuasion Skills: A Shrewd Person's Perspective
Lecture 3344;;,,(,(((((((((((((((((((((((
Solaris Resources Presentation - Corporate August 2025.pdf
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
Tata consultancy services case study shri Sharda college, basrur
How to Get Approval for Business Funding
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
Astra-Investor- business Presentation (1).pptx
How to Get Funding for Your Trucking Business
ANALYZING THE OPPORTUNITIES OF DIGITAL MARKETING IN BANGLADESH TO PROVIDE AN ...
operations management : demand supply ch
Daniels 2024 Inclusive, Sustainable Development
sales presentation، Training Overview.pptx
Comments on Crystal Cloud and Energy Star.pdf
Cours de Système d'information about ERP.pdf
NEW - FEES STRUCTURES (01-july-2024).pdf

Office management

  • 2.  Security Data protection means protecting a database from destructive forces and the unwanted actions of unauthorized users.  Security Audit is a systematic, measurable, technical assessment of how the organization's security policy is employed at a specific site.
  • 3. • Protecting Data? • Protecting People  Prevent harm to the individuals whose data the organizations hold and also the other people.  Keep information in the right hands.  Hold good quality data.
  • 4.  Huge amounts of data about people can be stored on office computers and can be easily searched.  This data can be lost, stolen or transferred to another country easily.  Careless or inaccurate processing of data can lead to the other people seeing the data.
  • 5.  SONY: 77 million PlayStation Network accounts hacked; Sony is said to have lost millions while the site was down for a month.  Card System Solutions: 40 million credit card accounts exposed. CSS, one of the top payment processors for Visa, MasterCard, American Express is ultimately forced into acquisition.  Monster.com: Confidential information of 1.3 million job seekers stolen and used in a phishing scam.
  • 6.  Data must be collected and processed fairly.  Data must be collected and used only for specified and lawful purpose.  Data must be adequate, relevant and not excessive.  Data must be kept accurate and up to date.  Data must not be kept longer than necessary.  Data must be kept secure against unauthorised processing, damage or loss.  Data must not be transferred outside the organization unless protection is adequate.
  • 7.  To adequately determine whether or not the client’s goal is being achieved, the auditor should perform the following before conducting the review:  Meet with IT management to determine possible areas of concern.  Review the current IT organization chart.  Review job descriptions of data center employees.  Research all operating system, software application and data center equipment operating within the data center.  Review the company’s IT policies and procedures.  Evaluate the company’s IT budget and systems planning documentation.  Review the data center’s disaster recovery plan.
  • 8.  Following is a list of objectives the auditor should review after planning and preparation:  Personnel procedures and responsibilities including systems and cross-functional training.  Change Management processes in place followed by IT and management personnel.  Appropriate back up procedures in place to minimize downtime and prevent loss of important data.  Ensure that the data center has adequate physical security controls to prevent unauthorized access to the data center.  Adequate environmental controls in place to ensure equipment is protected from fire and flooding.
  • 9.  Firewalls  Proxy Servers  Encryption  Logical Security  Access Controls Anti Virus Software  Auditing Systems such as Log Management.