Your completed Basic Email Security Scorecard will give you a clear presentation of which Basic Email Security areas need attention.
Basic Email Security
Scorecard Example
Example of how the finalized Scorecard can look like:
Basic Email Security
Scorecard
Your Scores:
BEGINNING OF THE
SELF-ASSESSMENT:
Table of Contents
About The Art of Service7
Included Resources - how to access7
Purpose of this Self-Assessment9
How to use the Self-Assessment10
Basic Email Security
Scorecard Example12
Basic Email Security
Scorecard13
BEGINNING OF THE
SELF-ASSESSMENT:14
CRITERION #1: RECOGNIZE15
CRITERION #2: DEFINE:27
CRITERION #3: MEASURE:43
CRITERION #4: ANALYZE:57
CRITERION #5: IMPROVE:73
CRITERION #6: CONTROL:88
CRITERION #7: SUSTAIN:101
Basic Email Security and Managing Projects, Criteria for Project Managers:126
1.0 Initiating Process Group: Basic Email Security127
1.1 Project Charter: Basic Email Security129
1.2 Stakeholder Register: Basic Email Security131
1.3 Stakeholder Analysis Matrix: Basic Email Security132
2.0 Planning Process Group: Basic Email Security134
2.1 Project Management Plan: Basic Email Security136
2.2 Scope Management Plan: Basic Email Security138
2.3 Requirements Management Plan: Basic Email Security140
2.4 Requirements Documentation: Basic Email Security142
2.5 Requirements Traceability Matrix: Basic Email Security144
2.6 Project Scope Statement: Basic Email Security146
2.7 Assumption and Constraint Log: Basic Email Security148
2.8 Work Breakdown Structure: Basic Email Security150
2.9 WBS Dictionary: Basic Email Security152
2.10 Schedule Management Plan: Basic Email Security155
2.11 Activity List: Basic Email Security157
2.12 Activity Attributes: Basic Email Security159
2.13 Milestone List: Basic Email Security161
2.14 Network Diagram: Basic Email Security163
2.15 Activity Resource Requirements: Basic Email Security165
2.16 Resource Breakdown Structure: Basic Email Security166
2.17 Activity Duration Estimates: Basic Email Security168
2.18 Duration Estimating Worksheet: Basic Email Security170
2.19 Project Schedule: Basic Email Security172
2.20 Cost Management Plan: Basic Email Security174
2.21 Activity Cost Estimates: Basic Email Security176
2.22 Cost Estimating Worksheet: Basic Email Security178
2.23 Cost Baseline: Basic Email Security180
2.24 Quality Management Plan: Basic Email Security182
2.25 Quality Metrics: Basic Email Security184
2.26 Process Improvement Plan: Basic Email Security186
2.27 Responsibility Assignment Matrix: Basic Email Security188
2.28 Roles and Responsibilities: Basic Email Security190
2.29 Human Resource Management Plan: Basic Email Security192
2.30 Communications Management Plan: Basic Email Security194
2.31 Risk Management Plan: Basic Email Security196
2.32 Risk Register: Basic Email Security198
2.33 Probability and Impact Assessment: Basic Email Security200
2.34 Probability and Impact Matrix: Basic Email Security202
2.35 Risk Data Sheet: Basic Email Security204
2.36 Procurement Management Plan: Basic Email Security206
2.37 Source Selection Criteria: Basic Email Security208
2.38 Stakeholder Management Plan: Basic Email Security210
2.39 Change Management Plan: Basic Email Security212
3.0 Executing Process Group: Basic Email Security214
3.1 Team Member Status Report: Basic Email Security216
3.2 Change Request: Basic Email Security218
3.3 Change Log: Basic Email Security220
3.4 Decision Log: Basic Email Security222
3.5 Quality Audit: Basic Email Security224
3.6 Team Directory: Basic Email Security226
3.7 Team Operating Agreement: Basic Email Security228
3.8 Team Performance Assessment: Basic Email Security230
3.9 Team Member Performance Assessment: Basic Email Security232
3.10 Issue Log: Basic Email Security234
4.0 Monitoring and Controlling Process Group: Basic Email Security236
4.1 Project Performance Report: Basic Email Security238
4.2 Variance Analysis: Basic Email Security240
4.3 Earned Value Status: Basic Email Security242
4.4 Risk Audit: Basic Email Security244
4.5 Contractor Status Report: Basic Email Security246
4.6 Formal Acceptance: Basic Email Security248
5.0 Closing Process Group: Basic Email Security250
5.1 Procurement Audit: Basic Email Security252
5.2 Contract Close-Out: Basic Email Security254
5.3 Project or Phase Close-Out: Basic Email Security256
5.4 Lessons Learned: Basic Email Security258
Index260
CRITERION #1: RECOGNIZE
INTENT: Be aware of the need for change. Recognize that there is an unfavorable variation, problem or symptom.
In my belief, the answer to this question is clearly defined:
5 Strongly Agree
4 Agree
3 Neutral
2 Disagree
1 Strongly Disagree
1. What training and capacity building actions are needed to implement proposed reforms?