Disaster Recovery Planning

1056 Words3 Pages

End User Computing - Policy And Procedure

CONTENTS:

1. Introduction.............................................................................................................3

2. Scope .......................................................................................................................3

3. How EUC Successful …...........................................................................................5

Policy……………….......................................................................................................6

Procedure……………..................................................................................................6

END-USER COMPUTING

1. Introduction

End-user computing (EUC) may involve a single user on a microcomputer, networks of users downloading data for further processing on workstations, or user-developed mainframe, mini and microcomputer applications using fourth generation or latest languages.

End-user computing represents a way of doing business. Users understand the decisions they need to make, the decision-making process, and the information needed to support the decision. The user wants flexible, easy-to-use tools with standardized interfaces to corporate data for developing and maintaining end-user applications.

Technology alone cannot account for the growth in end-user computing. Rather, the demand for end-user computing stems from:

- An unparalleled systems development backlog and a decreasing ability on the part of Management or Information Systems (IS) departments to meet the ever-increasing user needs on a timely and cost-effective basis

- Better-educated and more demanding users who realize that maximizing computing benefits is integral to ach...

... middle of paper ...

...easonable cost keeping in view the latest trends of the Information Systems development

• Applications should contain adequate controls and checks

• The impact of an application on other applications, users, and data should be addressed

• Applications should be properly documented and can be maintained by someone other than the developer

• Adequate levels of security should be built into applications to maintain the integrity of corporate data resources

• Applications should create reliable data and precise reports

PROCEDURE

For detail procedures of End-User Computing refer to:

- Change Management of Information Systems

- General Information Technology & Systems’ Security

- Technology & Systems’ Security Implementation Guide

- Data Backup and Storage

- Internet & Email User Guide

- Antivirus Policy and Procedure

- Job Description of IT Personnel

Open Document