s to deal with. Managers must be careful in identifying what is valid data, what errors might be made while handling data, and what potential business losses could result form inaccurate or lost data. At Evans, each individual is given a user name in which they have to log on to the system with. This will enable the IT organization to limit and monitor what systems and software the user is using and has access to. Without the proper authority granted by the IT organization, the user is withheld from accessing any information that should not be seen. The unauthorized use of data can result in a material loss, such as embezzlement of funds, or in harder to measure losses, such as disclosure of sensitive data. The ultimate protection against system failures is to have a backup copy. When a file becomes contaminated or destroyed, the most recent version can be restored. This is what Evans has come to realize and control. In any case, the security of data, and computers is necessary for Evans so that employees, customers, and others can be confident that their interactions with the organization are confident and the assets of the business are safe. Physical security also is an important part of the IT organization at Evans. Each employee is given a Chubb security card that has their thumb print scanned on to it. This gives access to the different buildings, and once inside, access to the divisions. Such areas as imaging require special access because of the amount of equipment that the room houses. Storage facilities called the "Vault", for back-ups and important documentation, also require added accessibility.All of these precautions Evans does is according to their IT strategy.Looking at Evans at a whole, it is a obvious that there are many aspects in which information technology is used. Each element serves it's own purpose and it part of their strategic plan and advantage. From communication to security measures, Evans h...