herefore alleviating time waste, and promoting management to act in the best of their division. Such things as performance analysis and management reporting are looked at and assessed from current to previous years. Other things that are brought into play are an alert to important news items, and on-screen calculation of trends, ratios, and new versions of data. With the use of charts, maps, or queries, the information can be viewed according to the preference of the user. The final element to Evans IT strategic plans and advantage would be their systems testing and security for the organization. Security controls related to the technology infrastructure-such as backup supplies, network access control, and firewall protection- are the most relevant area that Evans has to deal with. Managers must be careful in identifying what is valid data, what errors might be made while handling data, and what potential business losses could result form inaccurate or lost data. At Evans, each individual is given a user name in which they have to log on to the system with. This will enable the IT organization to limit and monitor what systems and software the user is using and has access to. Without the proper authority granted by the IT organization, the user is withheld from accessing any information that should not be seen. The unauthorized use of data can result in a material loss, such as embezzlement of funds, or in harder to measure losses, such as disclosure of sensitive data. The ultimate protection against system failures is to have a backup copy. When a file becomes contaminated or destroyed, the most recent version can be restored. This is what Evans has come to realize and control. In any case, the security of data, and computers is necessary for Evans so that employees, customers, and others can be confident that their interactions with the organization are confident and the assets of the business are safe. Physical security...