SlideShare a Scribd company logo
1 of 2
Download to read offline
Beyond Borders 
global supply chain strategies 
30 ISM November | December 2014 
Technology is an impor-tant 
driving force for 
global economic devel-opment. 
However, in the 
wake of high-profile data breaches 
in the United States and revelations 
of classified U.S. surveillance pro-grams 
by Edward Snowden, there 
will be many more global tech-nology 
challenges over the next 
decade. 
Businesses are just beginning 
to understand the macro-powers 
of regional blocs such as the 
European Union and NAFTA, to 
define not only trade, but also secu-rity, 
science and technology. There 
is currently a struggle to maintain 
privacy in a world increasingly 
dependent on digital intercon-nection. 
Although there are con-flicting 
security threats and privacy 
protection issues in the U.S. and 
Europe, it’s clear a global consis-tent 
approach is needed. Cyber war 
is one of the biggest threats of the 
21st century, and as businesses 
continue to confront boundary-less 
crimes and terrorism, the 
need for collaboration on both 
sides of the Atlantic and a 
focus on long-range goals and 
principles is necessary. 
There has been intense 
global interest in the European 
Commission’s new data pro-tection 
proposal and its effect 
on non-EU businesses and their 
global supply chains. In 2012, the 
commission proposed a major 
reform of the EU legal framework 
on the protection of personal 
data. The new proposals will 
strengthen individual rights and 
tackle the challenges of globaliza-tion 
and new technologies. The 
new EU legislation is expected to 
address current vulnerabilities of 
companies’ business IT systems, 
including payment, ERP and cus-tomer 
relationship management 
systems, as well as some of the 
other challenges currently facing 
our information society. 
It’s anticipated the reform leg-islation 
will provide a basic frame-work 
for data privacy legislation to 
other regions and countries around 
the globe. Supply management 
practitioners will see a major shift 
in business leadership attitudes 
regarding the protection of all 
personal data. That’s because the 
binding nature and extraterritorial 
reach of the upcoming EU reform 
will affect any business that pro-vides 
goods or services to EU citi-zens, 
as well as those that monitor 
the activities of EU citizens. 
The reform legislation is good 
news for EU consumers because it 
holds all third parties accountable 
for data breaches and will stream-line 
the current data protection 
requirements and procedures for 
all 28 EU countries. The privacy 
framework is expected to provide 
a uniform set of guidelines for all 
the European countries, assuring 
Cybersecurity Collaboration 
Needed Between U.S., EU 
Upcoming European Union privacy reform highlights the need for 
consistent, global legislation to help businesses protect customer 
and supplier information. 
By Adriana Sanford, J.D., Dual LL.M., 
and Wilfried Grommen
www.ism.ws 31 
businesses and EU consumers 
consistent legislation and adequate 
protection. 
Multinational companies, such 
as Hewlett-Packard, that supply data 
services to large enterprises wel-come 
this unified regulatory frame-work 
because it offers consistent 
regulation for all its European data 
centers. Many multinational com-panies 
already employ a dedicated 
data privacy officer who handles 
the compliance requirements with 
the various data protection author-ities. 
They are also in close collab-oration 
and discussion with the EU 
regulatory committees in Brussels 
regarding the proposed regulation. 
Not surprisingly, the request 
by the U.S. government for per-sonal 
data processed by Microsoft 
outside the U.S. is creating serious 
concerns for the cloud computing 
industry. The July 2014 U.S. court 
ruling upholding a warrant and 
requiring Microsoft to deliver data 
from a Dublin, Ireland, data center 
to prosecutors in a law enforcement 
investigation case bypasses the 
existing formal procedures that are 
agreed upon by both nations. The 
Mutual Legal Assistance agreement 
was designed to manage foreign 
government requests for access to 
information and ensure certain safe-guards 
in terms of data protection. 
Additionally, in the recent 
Google Spain case ruling, the Court 
of Justice of the European Union 
ruled that, as regards the issue of 
territoriality of the EU rules, these 
rules apply “even if” the physical 
server of a company’s processing 
data is located outside Europe. The 
Court of Justice clearly stated that 
EU rules apply to search engine 
operators, if they have a branch or 
a subsidiary in an EU member state. 
The need for collaboration 
between the United States and the 
EU has never been greater for multi-national 
companies and technology 
businesses. Consumer cloud service 
providers are concerned about the 
ramifications of conflict of laws 
where inconsistent or conflicting 
data privacy legislation could hinder 
their ability to do business and store 
data in centers in Europe or other 
locations. In a world where cloud 
computing is rapidly expanding, 
a modern, multinational, cross-boundary 
approach to privacy and 
data protection would help global 
businesses. Companies want to 
expand globally without the added 
burden of penalties for non-compli-ance 
due to conflicting country laws. 
Over the next few years, the EU 
will be preparing for Horizon 2020, 
one of the biggest publicly funded 
worldwide research and innovation 
programs to date with a budget 
of nearly 80 billion euros. Horizon 
2020 will not only raise the level of 
excellence in Europe’s science and 
technology base, but also ensure 
a steady stream of world-class 
research along with major invest-ment 
in key industrial technologies. 
It’s an attractive program for mul-tinationals 
searching for cyberse-curity 
information, consistent data 
protection laws and those who 
believe privacy is (or should be) a 
basic human right. ISM 
Adriana Sanford, J.D., Dual LL.M., is an 
ASU Lincoln Professor of Global Corporate 
Compliance and Ethics, a clinical associate 
professor in the W. P. Carey School of 
Business, and a College of Liberal Arts & 
Sciences residential college faculty fellow 
at Arizona State University in Tempe, 
Arizona. Her current academic research 
focuses on comparative law regarding 
cybersecurity, privacy and data protection. 
Wilfried Grommen, located in Brussels, 
is chief technologist of public sector and 
European institutions for Hewlett-Packard. 
For more information, send an email to 
author@ism.ws. 
Capital, government, currency 
and religion: Cardiff; the British 
pound sterling; Wales is a consti-tutional 
monarchy as part of the 
United Kingdom. 
Mind your manners: Politeness in 
communication is highly valued. 
Expect to hear a lot of “please,” 
“thank you” and “sorry.” The Welsh 
tend to be indirect communicators. 
Down to business: Being on 
time for meetings, and fol-lowing 
schedules and deadlines, 
matter in Wales. Decisions tend 
to be made from the top down. 
Humor is often used in negoti-ations, 
sometimes as a defense 
mechanism or in the form of 
self-deprecation and/or irony. 
Avoid hard-selling and any sort 
of conflict or confrontation. 
What to wear: For men, conser-vative, 
dark or medium-colored 
suits with shirts and conserva-tive 
ties; for women, stylish yet 
classic business suits or dresses 
and blouses. Jeans or busi-ness- 
casual attire may be appro-priate 
depending on the industry. 
Source: www.culturecrossing.net/ 
basics_business_student.php?id=240 
Around the World 
Wales 
© Institute for Supply Management®. All rights reserved. Reprinted with permission from the publisher, the Institute for Supply Management®.

More Related Content

What's hot

The Transatlantic Trade and Investment Partnership: The Intersection of the I...
The Transatlantic Trade and Investment Partnership: The Intersection of the I...The Transatlantic Trade and Investment Partnership: The Intersection of the I...
The Transatlantic Trade and Investment Partnership: The Intersection of the I...Patton Boggs LLP
 
scce-cep-2015-06-Dhont-1-04
scce-cep-2015-06-Dhont-1-04scce-cep-2015-06-Dhont-1-04
scce-cep-2015-06-Dhont-1-04Jan Dhont
 
No Man is an Island: The Battle for Data Privacy
No Man is an Island: The Battle for Data PrivacyNo Man is an Island: The Battle for Data Privacy
No Man is an Island: The Battle for Data PrivacyKate Chan
 
delphix-wp-gdpr-for-data-masking
delphix-wp-gdpr-for-data-maskingdelphix-wp-gdpr-for-data-masking
delphix-wp-gdpr-for-data-maskingJes Breslaw
 
Martha Buyer V SCTC day conference 24 feb16
Martha Buyer V SCTC day conference 24 feb16Martha Buyer V SCTC day conference 24 feb16
Martha Buyer V SCTC day conference 24 feb16Agustin Argelich Casals
 
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...FIA2010
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethicalSheetal Verma
 
20170624-Track or be tracked? The challenges of the ePrivacy Regulation
20170624-Track or be tracked? The challenges of the ePrivacy Regulation20170624-Track or be tracked? The challenges of the ePrivacy Regulation
20170624-Track or be tracked? The challenges of the ePrivacy Regulationyasoiler
 
Your Big Data Opportunity
Your Big Data OpportunityYour Big Data Opportunity
Your Big Data OpportunityiCrossing
 
Raising the EU Data Protection Laws in a U.S. Litigation: A Guidepost for the...
Raising the EU Data Protection Laws in a U.S. Litigation: A Guidepost for the...Raising the EU Data Protection Laws in a U.S. Litigation: A Guidepost for the...
Raising the EU Data Protection Laws in a U.S. Litigation: A Guidepost for the...Freshfields
 
Social Media and the Law - by Tom Cowling
Social Media and the Law - by Tom CowlingSocial Media and the Law - by Tom Cowling
Social Media and the Law - by Tom CowlingiCrossing
 
Data Privacy Protection & Advisory - EY India
Data Privacy Protection & Advisory - EY India Data Privacy Protection & Advisory - EY India
Data Privacy Protection & Advisory - EY India SadanandGahivare
 
DP on both sides of the Atlantic - august 2015
DP on both sides of the Atlantic - august 2015DP on both sides of the Atlantic - august 2015
DP on both sides of the Atlantic - august 2015Saira Nayak, JD, CIPP/US/E
 
Gdpr and usa data privacy issues
Gdpr and usa data privacy issuesGdpr and usa data privacy issues
Gdpr and usa data privacy issuesStefan Schippers
 
ENCRYPTION LAWS AND COMPLIANCE FOR THE EUROPEAN UNION
ENCRYPTION LAWS AND COMPLIANCE FOR THE EUROPEAN UNIONENCRYPTION LAWS AND COMPLIANCE FOR THE EUROPEAN UNION
ENCRYPTION LAWS AND COMPLIANCE FOR THE EUROPEAN UNIONQudsiyah Munir
 

What's hot (20)

The Transatlantic Trade and Investment Partnership: The Intersection of the I...
The Transatlantic Trade and Investment Partnership: The Intersection of the I...The Transatlantic Trade and Investment Partnership: The Intersection of the I...
The Transatlantic Trade and Investment Partnership: The Intersection of the I...
 
scce-cep-2015-06-Dhont-1-04
scce-cep-2015-06-Dhont-1-04scce-cep-2015-06-Dhont-1-04
scce-cep-2015-06-Dhont-1-04
 
No Man is an Island: The Battle for Data Privacy
No Man is an Island: The Battle for Data PrivacyNo Man is an Island: The Battle for Data Privacy
No Man is an Island: The Battle for Data Privacy
 
delphix-wp-gdpr-for-data-masking
delphix-wp-gdpr-for-data-maskingdelphix-wp-gdpr-for-data-masking
delphix-wp-gdpr-for-data-masking
 
Martha Buyer V SCTC day conference 24 feb16
Martha Buyer V SCTC day conference 24 feb16Martha Buyer V SCTC day conference 24 feb16
Martha Buyer V SCTC day conference 24 feb16
 
Law Web Directory
Law Web DirectoryLaw Web Directory
Law Web Directory
 
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethical
 
20170624-Track or be tracked? The challenges of the ePrivacy Regulation
20170624-Track or be tracked? The challenges of the ePrivacy Regulation20170624-Track or be tracked? The challenges of the ePrivacy Regulation
20170624-Track or be tracked? The challenges of the ePrivacy Regulation
 
Your Big Data Opportunity
Your Big Data OpportunityYour Big Data Opportunity
Your Big Data Opportunity
 
Raising the EU Data Protection Laws in a U.S. Litigation: A Guidepost for the...
Raising the EU Data Protection Laws in a U.S. Litigation: A Guidepost for the...Raising the EU Data Protection Laws in a U.S. Litigation: A Guidepost for the...
Raising the EU Data Protection Laws in a U.S. Litigation: A Guidepost for the...
 
Spokeo v Robins
Spokeo v RobinsSpokeo v Robins
Spokeo v Robins
 
Legal challenges in E-commerce
Legal challenges in E-commerce Legal challenges in E-commerce
Legal challenges in E-commerce
 
Social Media and the Law - by Tom Cowling
Social Media and the Law - by Tom CowlingSocial Media and the Law - by Tom Cowling
Social Media and the Law - by Tom Cowling
 
Data Privacy Protection & Advisory - EY India
Data Privacy Protection & Advisory - EY India Data Privacy Protection & Advisory - EY India
Data Privacy Protection & Advisory - EY India
 
DP on both sides of the Atlantic - august 2015
DP on both sides of the Atlantic - august 2015DP on both sides of the Atlantic - august 2015
DP on both sides of the Atlantic - august 2015
 
Gdpr and usa data privacy issues
Gdpr and usa data privacy issuesGdpr and usa data privacy issues
Gdpr and usa data privacy issues
 
PL&B _UK_80
PL&B _UK_80PL&B _UK_80
PL&B _UK_80
 
FINAL REPORT
FINAL REPORTFINAL REPORT
FINAL REPORT
 
ENCRYPTION LAWS AND COMPLIANCE FOR THE EUROPEAN UNION
ENCRYPTION LAWS AND COMPLIANCE FOR THE EUROPEAN UNIONENCRYPTION LAWS AND COMPLIANCE FOR THE EUROPEAN UNION
ENCRYPTION LAWS AND COMPLIANCE FOR THE EUROPEAN UNION
 

Viewers also liked

Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Adriana Sanford
 
2015-LatinCACS-brochure_bro_Spa_0715
2015-LatinCACS-brochure_bro_Spa_07152015-LatinCACS-brochure_bro_Spa_0715
2015-LatinCACS-brochure_bro_Spa_0715Adriana Sanford
 
Manufacturing Talk Radio
Manufacturing Talk RadioManufacturing Talk Radio
Manufacturing Talk RadioAdriana Sanford
 
Business Ethics Brochure
Business Ethics BrochureBusiness Ethics Brochure
Business Ethics BrochureAdriana Sanford
 
Etica empresarial Brochure (2)
Etica empresarial Brochure (2)Etica empresarial Brochure (2)
Etica empresarial Brochure (2)Adriana Sanford
 

Viewers also liked (6)

Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014
 
2015-LatinCACS-brochure_bro_Spa_0715
2015-LatinCACS-brochure_bro_Spa_07152015-LatinCACS-brochure_bro_Spa_0715
2015-LatinCACS-brochure_bro_Spa_0715
 
Manufacturing Talk Radio
Manufacturing Talk RadioManufacturing Talk Radio
Manufacturing Talk Radio
 
Business Ethics Brochure
Business Ethics BrochureBusiness Ethics Brochure
Business Ethics Brochure
 
Slide5
Slide5Slide5
Slide5
 
Etica empresarial Brochure (2)
Etica empresarial Brochure (2)Etica empresarial Brochure (2)
Etica empresarial Brochure (2)
 

Similar to 30-31 BB Nov_Dec14 (3)

Companies, digital transformation and information privacy: the next steps
Companies, digital transformation and information privacy: the next stepsCompanies, digital transformation and information privacy: the next steps
Companies, digital transformation and information privacy: the next stepsThe Economist Media Businesses
 
16 C O M M U N I C AT I O N S O F T H E A C M N O.docx
16    C O M M U N I C AT I O N S  O F  T H E  A C M       N O.docx16    C O M M U N I C AT I O N S  O F  T H E  A C M       N O.docx
16 C O M M U N I C AT I O N S O F T H E A C M N O.docxRAJU852744
 
16 C O M M U N I C AT I O N S O F T H E A C M N O.docx
16    C O M M U N I C AT I O N S  O F  T H E  A C M       N O.docx16    C O M M U N I C AT I O N S  O F  T H E  A C M       N O.docx
16 C O M M U N I C AT I O N S O F T H E A C M N O.docxaulasnilda
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxadampcarr67227
 
Webinar - Security 2.0: A new way to deal with today’s security challenges in...
Webinar - Security 2.0: A new way to deal with today’s security challenges in...Webinar - Security 2.0: A new way to deal with today’s security challenges in...
Webinar - Security 2.0: A new way to deal with today’s security challenges in...Quiver
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationMark Johnson
 
Cnil 35th activity report 2014
Cnil 35th activity report 2014Cnil 35th activity report 2014
Cnil 35th activity report 2014Market iT
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in ITAnushka Perera
 
LLM Masters in Information Technology and Intellectual Property Law - Sussex
LLM Masters in Information Technology and Intellectual Property Law - SussexLLM Masters in Information Technology and Intellectual Property Law - Sussex
LLM Masters in Information Technology and Intellectual Property Law - SussexChris Marsden
 
Data protection may be sidelined as eu and us talk trade
Data protection may be sidelined as eu and us talk tradeData protection may be sidelined as eu and us talk trade
Data protection may be sidelined as eu and us talk tradeJohn Davis
 
GDPR: A Threat or Opportunity? www.normanbroadbent.
GDPR: A Threat or Opportunity? www.normanbroadbent.GDPR: A Threat or Opportunity? www.normanbroadbent.
GDPR: A Threat or Opportunity? www.normanbroadbent.Steven Salter
 
Kroll.cross border ediscovery-2016
Kroll.cross border ediscovery-2016Kroll.cross border ediscovery-2016
Kroll.cross border ediscovery-2016Kate Chan
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...Symantec
 
EU Push for Digital Sovereignty (1).pptx
EU Push for Digital Sovereignty (1).pptxEU Push for Digital Sovereignty (1).pptx
EU Push for Digital Sovereignty (1).pptxTeddyIswahyudi1
 
What is GDPR?
What is GDPR?What is GDPR?
What is GDPR?Faidepro
 
Spain is responsible for 80% of European Data Protection fines. (on page 3)
Spain is responsible for 80% of European Data Protection fines. (on page 3)Spain is responsible for 80% of European Data Protection fines. (on page 3)
Spain is responsible for 80% of European Data Protection fines. (on page 3)Aurélie Pols
 
Telcos and ISPs Prepare For New Data Breach Disclosure Rules
Telcos and ISPs Prepare For New Data Breach Disclosure RulesTelcos and ISPs Prepare For New Data Breach Disclosure Rules
Telcos and ISPs Prepare For New Data Breach Disclosure RulesJohn Davis
 
Deloitte the case for disruptive technology in the legal profession 2017
Deloitte the case for disruptive technology in the legal profession 2017 Deloitte the case for disruptive technology in the legal profession 2017
Deloitte the case for disruptive technology in the legal profession 2017 Ian Beckett
 

Similar to 30-31 BB Nov_Dec14 (3) (20)

Companies, digital transformation and information privacy: the next steps
Companies, digital transformation and information privacy: the next stepsCompanies, digital transformation and information privacy: the next steps
Companies, digital transformation and information privacy: the next steps
 
16 C O M M U N I C AT I O N S O F T H E A C M N O.docx
16    C O M M U N I C AT I O N S  O F  T H E  A C M       N O.docx16    C O M M U N I C AT I O N S  O F  T H E  A C M       N O.docx
16 C O M M U N I C AT I O N S O F T H E A C M N O.docx
 
16 C O M M U N I C AT I O N S O F T H E A C M N O.docx
16    C O M M U N I C AT I O N S  O F  T H E  A C M       N O.docx16    C O M M U N I C AT I O N S  O F  T H E  A C M       N O.docx
16 C O M M U N I C AT I O N S O F T H E A C M N O.docx
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
Webinar - Security 2.0: A new way to deal with today’s security challenges in...
Webinar - Security 2.0: A new way to deal with today’s security challenges in...Webinar - Security 2.0: A new way to deal with today’s security challenges in...
Webinar - Security 2.0: A new way to deal with today’s security challenges in...
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
Cnil 35th activity report 2014
Cnil 35th activity report 2014Cnil 35th activity report 2014
Cnil 35th activity report 2014
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
 
LLM Masters in Information Technology and Intellectual Property Law - Sussex
LLM Masters in Information Technology and Intellectual Property Law - SussexLLM Masters in Information Technology and Intellectual Property Law - Sussex
LLM Masters in Information Technology and Intellectual Property Law - Sussex
 
Data protection may be sidelined as eu and us talk trade
Data protection may be sidelined as eu and us talk tradeData protection may be sidelined as eu and us talk trade
Data protection may be sidelined as eu and us talk trade
 
GDPR: A Threat or Opportunity? www.normanbroadbent.
GDPR: A Threat or Opportunity? www.normanbroadbent.GDPR: A Threat or Opportunity? www.normanbroadbent.
GDPR: A Threat or Opportunity? www.normanbroadbent.
 
Kroll.cross border ediscovery-2016
Kroll.cross border ediscovery-2016Kroll.cross border ediscovery-2016
Kroll.cross border ediscovery-2016
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
 
EU Push for Digital Sovereignty (1).pptx
EU Push for Digital Sovereignty (1).pptxEU Push for Digital Sovereignty (1).pptx
EU Push for Digital Sovereignty (1).pptx
 
[REPORT PREVIEW] GDPR Beyond May 25, 2018
[REPORT PREVIEW] GDPR Beyond May 25, 2018[REPORT PREVIEW] GDPR Beyond May 25, 2018
[REPORT PREVIEW] GDPR Beyond May 25, 2018
 
What is GDPR?
What is GDPR?What is GDPR?
What is GDPR?
 
Spain is responsible for 80% of European Data Protection fines. (on page 3)
Spain is responsible for 80% of European Data Protection fines. (on page 3)Spain is responsible for 80% of European Data Protection fines. (on page 3)
Spain is responsible for 80% of European Data Protection fines. (on page 3)
 
Telcos and ISPs Prepare For New Data Breach Disclosure Rules
Telcos and ISPs Prepare For New Data Breach Disclosure RulesTelcos and ISPs Prepare For New Data Breach Disclosure Rules
Telcos and ISPs Prepare For New Data Breach Disclosure Rules
 
Deloitte the case for disruptive technology in the legal profession 2017
Deloitte the case for disruptive technology in the legal profession 2017 Deloitte the case for disruptive technology in the legal profession 2017
Deloitte the case for disruptive technology in the legal profession 2017
 

More from Adriana Sanford

More from Adriana Sanford (10)

Universidad de Talca
Universidad de TalcaUniversidad de Talca
Universidad de Talca
 
EPICS Gold ASU
EPICS Gold ASUEPICS Gold ASU
EPICS Gold ASU
 
ISM Forward Scan_4_15
ISM Forward Scan_4_15ISM Forward Scan_4_15
ISM Forward Scan_4_15
 
ASU Thrive 3
ASU Thrive 3ASU Thrive 3
ASU Thrive 3
 
Grommen About the Author Brochure
Grommen About the Author BrochureGrommen About the Author Brochure
Grommen About the Author Brochure
 
Sanford ISM2015 Brochure
Sanford ISM2015 BrochureSanford ISM2015 Brochure
Sanford ISM2015 Brochure
 
Terrorism
TerrorismTerrorism
Terrorism
 
CECO ISM_Forward_Scan_6_12
CECO ISM_Forward_Scan_6_12CECO ISM_Forward_Scan_6_12
CECO ISM_Forward_Scan_6_12
 
CECO ISM_Forward_Scan_6_12
CECO ISM_Forward_Scan_6_12CECO ISM_Forward_Scan_6_12
CECO ISM_Forward_Scan_6_12
 
ISM Forward Scan_Risky Realities of Counterfeiting
ISM Forward Scan_Risky Realities of CounterfeitingISM Forward Scan_Risky Realities of Counterfeiting
ISM Forward Scan_Risky Realities of Counterfeiting
 

30-31 BB Nov_Dec14 (3)

  • 1. Beyond Borders global supply chain strategies 30 ISM November | December 2014 Technology is an impor-tant driving force for global economic devel-opment. However, in the wake of high-profile data breaches in the United States and revelations of classified U.S. surveillance pro-grams by Edward Snowden, there will be many more global tech-nology challenges over the next decade. Businesses are just beginning to understand the macro-powers of regional blocs such as the European Union and NAFTA, to define not only trade, but also secu-rity, science and technology. There is currently a struggle to maintain privacy in a world increasingly dependent on digital intercon-nection. Although there are con-flicting security threats and privacy protection issues in the U.S. and Europe, it’s clear a global consis-tent approach is needed. Cyber war is one of the biggest threats of the 21st century, and as businesses continue to confront boundary-less crimes and terrorism, the need for collaboration on both sides of the Atlantic and a focus on long-range goals and principles is necessary. There has been intense global interest in the European Commission’s new data pro-tection proposal and its effect on non-EU businesses and their global supply chains. In 2012, the commission proposed a major reform of the EU legal framework on the protection of personal data. The new proposals will strengthen individual rights and tackle the challenges of globaliza-tion and new technologies. The new EU legislation is expected to address current vulnerabilities of companies’ business IT systems, including payment, ERP and cus-tomer relationship management systems, as well as some of the other challenges currently facing our information society. It’s anticipated the reform leg-islation will provide a basic frame-work for data privacy legislation to other regions and countries around the globe. Supply management practitioners will see a major shift in business leadership attitudes regarding the protection of all personal data. That’s because the binding nature and extraterritorial reach of the upcoming EU reform will affect any business that pro-vides goods or services to EU citi-zens, as well as those that monitor the activities of EU citizens. The reform legislation is good news for EU consumers because it holds all third parties accountable for data breaches and will stream-line the current data protection requirements and procedures for all 28 EU countries. The privacy framework is expected to provide a uniform set of guidelines for all the European countries, assuring Cybersecurity Collaboration Needed Between U.S., EU Upcoming European Union privacy reform highlights the need for consistent, global legislation to help businesses protect customer and supplier information. By Adriana Sanford, J.D., Dual LL.M., and Wilfried Grommen
  • 2. www.ism.ws 31 businesses and EU consumers consistent legislation and adequate protection. Multinational companies, such as Hewlett-Packard, that supply data services to large enterprises wel-come this unified regulatory frame-work because it offers consistent regulation for all its European data centers. Many multinational com-panies already employ a dedicated data privacy officer who handles the compliance requirements with the various data protection author-ities. They are also in close collab-oration and discussion with the EU regulatory committees in Brussels regarding the proposed regulation. Not surprisingly, the request by the U.S. government for per-sonal data processed by Microsoft outside the U.S. is creating serious concerns for the cloud computing industry. The July 2014 U.S. court ruling upholding a warrant and requiring Microsoft to deliver data from a Dublin, Ireland, data center to prosecutors in a law enforcement investigation case bypasses the existing formal procedures that are agreed upon by both nations. The Mutual Legal Assistance agreement was designed to manage foreign government requests for access to information and ensure certain safe-guards in terms of data protection. Additionally, in the recent Google Spain case ruling, the Court of Justice of the European Union ruled that, as regards the issue of territoriality of the EU rules, these rules apply “even if” the physical server of a company’s processing data is located outside Europe. The Court of Justice clearly stated that EU rules apply to search engine operators, if they have a branch or a subsidiary in an EU member state. The need for collaboration between the United States and the EU has never been greater for multi-national companies and technology businesses. Consumer cloud service providers are concerned about the ramifications of conflict of laws where inconsistent or conflicting data privacy legislation could hinder their ability to do business and store data in centers in Europe or other locations. In a world where cloud computing is rapidly expanding, a modern, multinational, cross-boundary approach to privacy and data protection would help global businesses. Companies want to expand globally without the added burden of penalties for non-compli-ance due to conflicting country laws. Over the next few years, the EU will be preparing for Horizon 2020, one of the biggest publicly funded worldwide research and innovation programs to date with a budget of nearly 80 billion euros. Horizon 2020 will not only raise the level of excellence in Europe’s science and technology base, but also ensure a steady stream of world-class research along with major invest-ment in key industrial technologies. It’s an attractive program for mul-tinationals searching for cyberse-curity information, consistent data protection laws and those who believe privacy is (or should be) a basic human right. ISM Adriana Sanford, J.D., Dual LL.M., is an ASU Lincoln Professor of Global Corporate Compliance and Ethics, a clinical associate professor in the W. P. Carey School of Business, and a College of Liberal Arts & Sciences residential college faculty fellow at Arizona State University in Tempe, Arizona. Her current academic research focuses on comparative law regarding cybersecurity, privacy and data protection. Wilfried Grommen, located in Brussels, is chief technologist of public sector and European institutions for Hewlett-Packard. For more information, send an email to author@ism.ws. Capital, government, currency and religion: Cardiff; the British pound sterling; Wales is a consti-tutional monarchy as part of the United Kingdom. Mind your manners: Politeness in communication is highly valued. Expect to hear a lot of “please,” “thank you” and “sorry.” The Welsh tend to be indirect communicators. Down to business: Being on time for meetings, and fol-lowing schedules and deadlines, matter in Wales. Decisions tend to be made from the top down. Humor is often used in negoti-ations, sometimes as a defense mechanism or in the form of self-deprecation and/or irony. Avoid hard-selling and any sort of conflict or confrontation. What to wear: For men, conser-vative, dark or medium-colored suits with shirts and conserva-tive ties; for women, stylish yet classic business suits or dresses and blouses. Jeans or busi-ness- casual attire may be appro-priate depending on the industry. Source: www.culturecrossing.net/ basics_business_student.php?id=240 Around the World Wales © Institute for Supply Management®. All rights reserved. Reprinted with permission from the publisher, the Institute for Supply Management®.