Explain how one of the identified risks stems from an aspect of the company’s global marketplace activities (e.g., manufacturing uncertainties, problems with suppliers, political instability, currency fluctuations).
$5.99
Kindly add to CART and download the FULL sample Essay for this paper at $5 Only.
- Create a risk register (suggested length of 3–5 pages) that identifies eight risks currently facing the company.
- Explain how one of the identified risks stems from an aspect of the company’s global marketplace activities (e.g., manufacturing uncertainties, problems with suppliers, political instability, currency fluctuations).
- Describe the source(s) of each risk.
- Explain how each risk stems from the described source(s) (suggested length of 1–2 sentences for each source).
- Identify the risk level for each risk (i.e., high, medium, or low).
- Justify each identified risk level in terms of the following:
- • severity of the impact
- • likelihood of occurrence
- • controllability
- Justify each identified risk level in terms of the following:
- Discuss an appropriate risk response for each risk from part A (suggested length of 1 paragraph per risk) to reduce the possible damage to the company.
- Create a business contingency plan (BCP) (suggested length of 6–10 pages), such as that included in a policy manual, that the company would follow if faced with a major business disruption by doing the following:
- Discuss what strategic pre-incident changes the company could follow to ensure the well-being of the company.
- Discuss the ethical use and protection of sensitive data by doing the following:
- Discuss what constitutes sensitive data.
- Explain how data will be physically protected during normal business operations.
- Explain how data will by physically protected in the event of a disruption.
- Explain how the company will ensure data is used ethically.
- Discuss the ethical use and protection of customer records by doing the following:
- Discuss what constitutes customer records for your chosen company.
- Discuss the systems or security measures that would be put in place to protect customer records during normal business operations.
- Discuss the systems or security measures that would be put in place to protect customer records in the event of a disruption.
- Explain how the company will ensure customer records are used ethically.
- Discuss the communication plan to be used during and following a disruption.
- Identify the stakeholders who would need to be contacted in the event of a disruption.
- Describe the specific actions that will need to take place to communicate with each stakeholder.
- Identify the stakeholders who would need to be contacted in the event of a disruption.
- Discuss how normal operations will be restored after a disruption has occurred (post-incident).
- Create an implementation plan (suggested length of 1–2 pages) for the BCP from part C by doing the following:
- Discuss how the BCP will be implemented into the company.
- Discuss how the BCP will be communicated to the organization.
- Discuss how the BCP will be monitored or tested before the incident to ensure the plan would be effective in the event of a disruption.
- Discuss how the BCP will be adjusted over time.
- Discuss how changes to the plan will be communicated to the company.
- Discuss how changes to the plan will be communicated to the company.
- If you use sources, include all in-text citations and references in APA format.
Please follow the Rubric