Categories Pricing Corporate
Professional eBook

Virtual Workplace Support Tools Book 3

Effective Tools to Manage Virtual Operations

59
Language:  English
Description of a set of critical tools (e.g., virtual model, technology strategy, checklists, etc.) to support you in establishing, managing and improving your virtual company.
Professional Plus subscription free for the first 30 days, then $8.99/mo
Access this book on our eReader, no adverts inside the book
Description
Content

Description of a set of several critical tools (e.g., virtual business model (operations, security, data protection), technology strategy, policies, plans, checklists, etc.) to support you in establishing, defining, managing and improving your virtual company more effectively.

About the Author

John Kyriazoglou obtained a B.A. (Honours) from the University of Toronto, Canada, also earning a Scholastic award for Academic Excellence in Computer Science. John has worked in Canada, England, Switzerland, Luxembourg, Greece, Saudi Arabia and other countries for over 49 years, as a Senior IT manager, Managing Director, IT auditor and consultant, in a variety of clients and projects, in both the private and the public sectors. He has published several books and articles in professional publications, has served in numerous scientific committees and is a member of several professional and cultural associations.

He is currently the Editor-in-Chief for the Internal Controls Magazine (U.S.A.) and consulting on Data Privacy and Security Issues (GDPR, e-Privacy, etc.) to a large number of private and public clients.

  • Overview and Contents
  1. ST 1. Virtual Business Models
  2. ST 2. Data Quality Policy
  3. ST 3. Data Protection Technology Strategy
  4. ST 4. Digital Transformation Implementation Methodology
  5. ST 5. IT to Business Alignment Questionnaire
  6. ST 6. Data Encryption Policy
  7. ST 7. Virtual Risks and Actions Plan
  8. ST 8. Virtual Team Performance Checklist
  9. ST 9. Virtual Business Reassessment Plan
  10. ST 10. Mobile Devices Security Controls Checklist
  11. ST 11. Virtual Auditing Process
  12. ST 12. Integrated Communications Implementation Methodology
  13. ST 13. Email Management Policy
  14. ST 14. Segregation of Duties Plan
  15. ST 15. Log Management Procedure
  • Bibliography
About the Author

John Kyriazoglou