Verified Document

Project Management For Computer Upgrade Term Paper

IT Project Management PROJECT CHARTER

Objective of this project is to upgrade the new computer system for the ACME Incorporation. The company has decided to launch the 200 desktop computers to enhance organization efficiencies. The company will also take the advantage of the new system to integrated effective security systems, which will include:

Account lockout policy (SANS CSC 16-9),

Password policy (SANS CSC 16-8), and Screen Lock Policy (SANS CSC 16-6).

Integrated of effective security system will enhance efficiencies of all employees across all departments within the organization. The estimated costs to complete the project are $300,000, which will cover the computer upgrade and integration of the security systems. The time frame to complete the project will be 3 months, and the project team will consist...

The standard required for the project is that the new system should be able to enhance efficiency of all ACME departments. Moreover, the new system should be able to save costs of the company business operations. Moreover, the new project should be able to enhance the IT security against internal and external threats.
However, the project is subjected to the following risks and constraints:

Inflation may increase the cost of materials used to complete the project.

Communication breakdown,

Incomplete design.

Inaccurate cost estimates.

Outsourcing delays

Inaccurate time-frame to complete the project.

Authorized by CME vice IT President John Wall Date: 30 March, 2014

Cite this Document:
Copy Bibliography Citation

Related Documents

Project Management Review the "Lessons Learned" Section
Words: 994 Length: 4 Document Type: Term Paper

Project Management Review the "Lessons Learned" section of the project risk diagram. Describe how the Lessons Learned activity helps you become a stronger project manager, who else it helps in the project team and also describe how it helps PMO. 200 words Documenting the lessons learned is one of the most important aspects of the closure phase of the project. It is important to an individual project manager because they can reflect

Project Management Project Title: Website
Words: 1078 Length: 3 Document Type: Term Paper

(Chaffey et al., 2006) The enhanced version of the website will be designed in such a way that it gets integrated into the existing systems by reading and saving data to those systems. This website will also maintain a log for the management to review the nature and reactions of traffic on the website. In order to attract more traffic, user will be given the opportunity to view results as

Request for Project Management Plan
Words: 1111 Length: 4 Document Type: Research Proposal

Monroenico Hospitality Company Project Purpose and Description The purpose of this project is as follows: The complex interplay of collaborative effort which every major information technology (IT) project requires a precise system of measurement through which to quantify and qualify the occurrence of success or failure, and this process is best performed with a practical system of project metrics. Traditional project metrics such as customer satisfaction rating and return on investment have

Computer Security: Corporate Security Documentation Suitable for
Words: 5280 Length: 19 Document Type: Essay

Computer Security: Corporate Security Documentation Suitable for a Large Corporation Item (I) in-Depth Defense Measures (II) Firewall Design (III) Intrusion Detection System (IV) Operating System Security (V) Database Security (VI) Corporate Contingency of Operation (VII) Corporate Disaster Recovery Plan (VIII) Team Members and Roles of Each (IX) Timeline with Goal Description (X) Data Schema (XI) Graphical Interface Design (XII) Testing Plan (XIII) Support Plan (XIV) Schematics Computer Security: Corporate Security Documentation Suitable for a Large Corporation (I) In-Depth Defense Measures Information Technology (IT) Acceptable Use Policy The intentions of

Project Management Life Cycle
Words: 1734 Length: 5 Document Type: Term Paper

software deployment life cycle after discussing the first of the phases of this important life cycle. Phase IV is seen as a crucial phase wherein is dealt with the actual performance of the newly installed software. Phase V concludes the life cycle and provides impetus for any new deployment plan in future. The Last Two Phases of the Software Deployment Life Cycle Software deployment is a complex endeavor, most fittingly used

Computer Security People, Process and Technology Are
Words: 4780 Length: 15 Document Type: Capstone Project

Computer Security People, process and technology are three things which are involved in information security. Biometrics, passwords and firewalls are some of the technical measures and these are not enough in justifying threats to information. In order to protect information from destruction and to secure systems, a blend of different procedures is required. While deploying information security some factors need to be considered for instance processes like de-registration and registration

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now