INFORMATION TECHNOLOGY (IT)

Infrastructure and Network:

  1. Assess if the company's IT and network environment is primarily Windows-based and identify other supported platforms.

  2. Provide a list of all company sites with network and e-mail connectivity, detailing the type of business, headcount, and circuit size at each site.

  3. List any additional company sites not connected to a WAN.

  4. Describe external connectivity, including remote access, partners, vendors, firewalls, and third-party data connections.

  5. Detail the company's website hosting environment, including location, server count, and service level agreements.


Internet


  1. Does the company use the Internet for internal use as an interactive part of operations? What functions are used in this manner?

  2. Has the company's firewall ever been penetrated, and how sensitive is the information stored on the company network's publicly available segments?

  3. Does the company provide technical support information through its Web site?

  4. Are Web site usage statistics tracked? If so, how are they used for management decisions?

  5. In what way could operational costs decrease if the company's customers interacted with it through the Internet?


Systems and Applications:

  1. Describe the company's e-mail and calendaring systems.

  2. Identify internal business systems and applications supported, specifying the platforms they run on (e.g., Finance, HR, Sales, Operations, CRM).

  3. Describe the security policies and procedures for the company's website and web services, including firewalls and traffic access points.

  4. Outline connections between the company's website/web services and the internal office network, including usage and traffic volume.


Data Management and Security:

  1. Provide details of the company's data backup solutions and disaster recovery processes.

  2. Confirm if the company's website/web services use encryption.

  3. List third-party IT and network service providers and fulfillment vendors.

  4. Describe the operational interactions with customers and the maintenance of those relationships.

  5. Detail the use of third-party software versus custom-built solutions, including maintenance contracts and version status.

  6. Assess the extent of modifications to third-party systems and the impact on upgradeability.


Compliance and Licensing:

  1. Evaluate monitoring of user computers for unauthorized software and the security of software distribution.

  2. Determine the anticipated difficulty of integrating the company's databases into the buyer's systems.

  3. Ensure there are adequate backup systems with offsite storage for corporate databases and individual computers.

  4. List the software used by the company and provide copies of licensing agreements.

  5. Detail any IT outsourcing agreements.


Operational and Strategic IT Review:

  1. Assess current system usage, age, and the list of interfaces linking systems together.

  2. Document IT processes, including application development, operations, disaster recovery, security, and cost management.

  3. Gather information on the security and controls framework.

  4. Detail any past cybersecurity incidents, including hacks or breaches.

  5. Review the company's research and development plans for anticipated changes and cost implications.


Research, Development, and Compliance:

  1. Evaluate the effectiveness of research and development personnel and their capacity for technological innovation.

  2. Review royalty contracts for contingencies and verify terms with licensees.

  3. Assess professional affiliations of management or R&D personnel for potential competing technology claims.

  4. Ensure the company's exports comply with export control laws.


COPY & PASTE QUESTIONS with answers along with other appropriate files:

UPLOAD BELOW with file name(s) of company