A Guide to Developing a ROM Estimate

Developing a Rough Order of Magnitude (ROM) estimate will involve both subject matter experts and project managers. The “Rough Order of Magnitude” estimate should have at least a (plus or minus) 50% accuracy. The variance may not always be in this range but it should be the target for a useful “ballpark” estimate at a Read more about A Guide to Developing a ROM Estimate[…]

What is Rough Order of Magnitude (ROM)

We never know the final project cost until the project is complete. What we can do however is create an estimate. An estimate can take many forms but you cannot rely on guessing or adding a certain percentage buffer (say 10%) as a fall back plan. Regardless of scope or schedule, funding is critical in Read more about What is Rough Order of Magnitude (ROM)[…]

How to write an IT Security Audit Plan

While lending enormous benefits to society, advancements in information technology have put the security of sensitive information at risk, especially for government agencies. The threat from hackers, virus, fraud, sabotage and natural disasters can have devastating consequences if the computer systems, information, critical operations and infrastructures they support are not secured properly. IT security audits Read more about How to write an IT Security Audit Plan[…]

How to implement a Contingency Plan

A contingency plan is developed to prepare a business to face abnormal situations and mitigate the impact of sudden disasters. The contingency plan outlines the procedure to be followed in the event of failure of one or more critical systems. A contingency plan is often referred to as a business continuity plan (BCP) and professional Read more about How to implement a Contingency Plan[…]

The 10 Steps involved in writing a Business Continuity Plan

A Business Continuity Plan (BCP) outlines the approach to be taken if and when the business is hit by adverse conditions (man-made or natural disasters). A BCP is not just a disaster recovery procedure. It is a plan to ensure that the normal day-to-day business transactions continue to function even in the event of failure Read more about The 10 Steps involved in writing a Business Continuity Plan[…]

Writing a Communications Plan

In the course of executing a project, the various stakeholders communicate with each other through documents, e-mails, meetings etc. Communications may be one-to-one (between project manager and team leader) or one-to-many (project leader instructing the team members) or many-to-one (team members submitting status reports to team leader). A communication plan helps to maintain uniformity and Read more about Writing a Communications Plan[…]

Letter Of Intent to Respond

Letter of Intent to Respond

Purpose: A Request for Proposal (RFP) usually will require a Letter of Intent to respond (or bid). As a minimum, this is typically a document that includes the company name, the contact person, and contact information for that person. This Letter of Intent to Respond Template is suitable for companies looking to initiate a business Read more about Letter of Intent to Respond[…]

Letter Of Intent to Bid

Purpose: An asset sale will often require a letter of intent to bid (or purchase). As a minimum, this is typically a document that includes the asset details, buyer name and contact information. This Letter of Intent to Bid Template is suitable for individuals or agents to show intent to purchase or bid on an asset Read more about Letter Of Intent to Bid[…]

Requirements Definition Template

Purpose: The primary purpose of the Requirements Definition document is to develop a basis of mutual understanding between the business users and the project team about the requirements for the project. The result of this understanding is an approved Requirements Specification that becomes the initial baseline for product design. Also referred to as a Requirements Read more about Requirements Definition Template[…]

IT Security Plan

Purpose:The purpose of an Information Technology Security Plan is to provide an overview of the security requirements of the system and describe the controls in place or planned for meeting those requirements. This document provides an I.T. security strategy for providing information assurance. The Security Program is an ongoing venture that follows a cyclical process Read more about IT Security Plan[…]