Governance, legal compliance and risk across the online economyERADAR
Will Roebuck's February 2012 lecture to Joint Masters Students from Manchester Business School and the University of Manchester's School of Computer Science
Legal Framework For E Commerce In Ecowas AfricaDayo Ogunyemi
Presentation summarizing UN Economic Commission for Africa (UN ECA) sponsored project to develop legal framework for E-Commerce for the Economic Community of West African States (ECOWAS). Delivered in Ouagadougou, 2006.
Some simplified slides I developed to use in briefings and discussions about “data sharing” and the “data sharing” provisions in the Digital Economy Bill (now Digital Economy Act)
Digitized services have been with us for many years already, and looking at the lessons we’ve all learned in times of COVID-19 and working-at-home, the benefits and possibilities are universally clear. But is the picture really complete? If you’ve ever looked at available tools, services, laws, or even functional requirements, you’ve probably asked yourself: does this meet my needs? Does this comply with legal requirements? Is it safe? What will happen when I need this information many years from now? Will I be able to find it, and will it be accepted as evidence?
After this session, you’ll not only understand what’s legally and technically possible but you’ll also be introduced to some of the solutions that are leading the digital shift today. And more importantly, you’ll see that you don’t have to wait for a bright future – it’s here today!
Watch the webinar here: https://xenit.eu/webinars/digital-signature-archiving/
These are slides from my presentation at the Law Firm Leaders Forum in New York, Nov. 6-7, 2014. Part I covers Substantive Hints of Change: Innovative Technology Popping Up and Part II covers Legal Design: Structured Innovation Process and Focus on Client/User Needs.
Governance, legal compliance and risk across the online economyERADAR
Will Roebuck's February 2012 lecture to Joint Masters Students from Manchester Business School and the University of Manchester's School of Computer Science
Legal Framework For E Commerce In Ecowas AfricaDayo Ogunyemi
Presentation summarizing UN Economic Commission for Africa (UN ECA) sponsored project to develop legal framework for E-Commerce for the Economic Community of West African States (ECOWAS). Delivered in Ouagadougou, 2006.
Some simplified slides I developed to use in briefings and discussions about “data sharing” and the “data sharing” provisions in the Digital Economy Bill (now Digital Economy Act)
Digitized services have been with us for many years already, and looking at the lessons we’ve all learned in times of COVID-19 and working-at-home, the benefits and possibilities are universally clear. But is the picture really complete? If you’ve ever looked at available tools, services, laws, or even functional requirements, you’ve probably asked yourself: does this meet my needs? Does this comply with legal requirements? Is it safe? What will happen when I need this information many years from now? Will I be able to find it, and will it be accepted as evidence?
After this session, you’ll not only understand what’s legally and technically possible but you’ll also be introduced to some of the solutions that are leading the digital shift today. And more importantly, you’ll see that you don’t have to wait for a bright future – it’s here today!
Watch the webinar here: https://xenit.eu/webinars/digital-signature-archiving/
These are slides from my presentation at the Law Firm Leaders Forum in New York, Nov. 6-7, 2014. Part I covers Substantive Hints of Change: Innovative Technology Popping Up and Part II covers Legal Design: Structured Innovation Process and Focus on Client/User Needs.
[Webinar Slides] Think Brexit Saves You From EU Data Regulations? Think Again!AIIM International
The General Data Protection Regulations (GDPR) will apply to any company that collects or handles the personal data of EU citizens. Review these slides to learn the steps to prepare your organization for compliance.
Learn even more how to protect your private data with AIIM's Information Government training: http://www.aiim.org/InfoGovTraining
What is Information Security and why you should care ...James Mulhern
An interactive introduction to Information Security and Cyber Security for BTEC students studying IT at Swindon College in the UK. The session illustrates the breadth and diversity of the subject and opportunities it can offer. The session illustrates things might not always be as they seem and the impacts can be far more reaching than at first imagined.
Oct 23rd 2014 Offices of Arthur Cox - Presentation by Paul C Dwyer CEO of Cyber Risk International outlining a high level overview of the holistic cyber threat landscape in 2014
E-Commerce: Study, Development and PrototypingIJERA Editor
This project was a study of the development of an electronic commerce in Paraguay, tracking laws and
regulatory decrees formulated by the technical agencies. As a result, a prototype is developed, which reproduces
the steps to follow in a web-based e-commerce transaction using fictitious credit cards as payment method. A
particular digital certificate created for testing purposes was used, performing secure connection via https
protocol and the digital certificate issued by the Enforcement Authority and the Ministry of Industry and Trade.
The results were obtained through the measurement of the database log, matching planned rules for transactions
with the results obtained
In this presentation, 10 steps (10 P's of POPI) are introduced as essential ingredients of meeting Protection of Personal Information (POPI) requirements. As a privacy law, POPI relies heavily on sound information management principles. The COR Concepts Integrated Information Governance model is also discussed, providing a framework for ensuring that POPI is not treated in isolation, and that it forms part of a cohesive approach to managing enterprise-wide information.
BYOD at bpost -
Tim Groenwals, Technology Innovation Manager at bpost will share his experiences with BYOD. With thousands of potential users, BYOD presents a great challenge for a company like bpost. Tim will explain why the company started with the project, how they approached it and will openly share challenges and successes along the way.
(2012)
[Webinar Slides] E-Signatures 101- An Introduction to Digital Transformation ...AIIM International
Check out these webinar slides for an overview of of the basic terminology, concepts, and laws related to electronic signatures.
Want to learn how to incorporate E-Signatures into your overall Enterprise Content Management approach? Visit: AIIM.org/ECMTraining
Gdpr demystified - making sense of the regulationJames Mulhern
Slightly out dated introduction to GDPR, that tries to move away from the headlines on fines and emphasises the global nature of the regulation, the numerous forms of lawful processing and the absolute need to manage privacy and be transparent. Goes on to show how using public cloud can help solve part of the problem.
[Webinar Slides] Your 2019 Information Management Resolution: Part TwoAIIM International
n this webinar, we'll explain the IIM toolkit, and how it can be applied to your everyday work to reach your digital transformation goals as well as offer practical advice on how to get started.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/your-2019-information-management-resolution-2
With a transactional practice, covering the areas of e-commerce, software and technology, Heather Buchta, with Quarles & Brady LLP, presented the different cloud regulations that impact our industry; from data privacy to compliance. Learn all the legal Internet/cloud considerations CIOs are faced with today and apply them to your value proposition.
Reinforcement of Information Privacy and Security NowadaysGoutama Bachtiar
Delivered in a guest lecture session conducted for Faculty of Communication Science, Padjadjaran University, West Java, Indonesia. It includes the topic on Indonesia's Laws #14 Year of 2008 on Disclosure of Public Information.
More and more organisations are allowing their employees to use their personally-owned devices, for example iPads and tablets, at work. This is because online technologies are now part of our everyday lives, not just at work but at home and at play too.
Will Roebuck's short Slideshare presentation looks at some of the key legal risks associated with consumer technology in the workplace.
[Webinar Slides] Think Brexit Saves You From EU Data Regulations? Think Again!AIIM International
The General Data Protection Regulations (GDPR) will apply to any company that collects or handles the personal data of EU citizens. Review these slides to learn the steps to prepare your organization for compliance.
Learn even more how to protect your private data with AIIM's Information Government training: http://www.aiim.org/InfoGovTraining
What is Information Security and why you should care ...James Mulhern
An interactive introduction to Information Security and Cyber Security for BTEC students studying IT at Swindon College in the UK. The session illustrates the breadth and diversity of the subject and opportunities it can offer. The session illustrates things might not always be as they seem and the impacts can be far more reaching than at first imagined.
Oct 23rd 2014 Offices of Arthur Cox - Presentation by Paul C Dwyer CEO of Cyber Risk International outlining a high level overview of the holistic cyber threat landscape in 2014
E-Commerce: Study, Development and PrototypingIJERA Editor
This project was a study of the development of an electronic commerce in Paraguay, tracking laws and
regulatory decrees formulated by the technical agencies. As a result, a prototype is developed, which reproduces
the steps to follow in a web-based e-commerce transaction using fictitious credit cards as payment method. A
particular digital certificate created for testing purposes was used, performing secure connection via https
protocol and the digital certificate issued by the Enforcement Authority and the Ministry of Industry and Trade.
The results were obtained through the measurement of the database log, matching planned rules for transactions
with the results obtained
In this presentation, 10 steps (10 P's of POPI) are introduced as essential ingredients of meeting Protection of Personal Information (POPI) requirements. As a privacy law, POPI relies heavily on sound information management principles. The COR Concepts Integrated Information Governance model is also discussed, providing a framework for ensuring that POPI is not treated in isolation, and that it forms part of a cohesive approach to managing enterprise-wide information.
BYOD at bpost -
Tim Groenwals, Technology Innovation Manager at bpost will share his experiences with BYOD. With thousands of potential users, BYOD presents a great challenge for a company like bpost. Tim will explain why the company started with the project, how they approached it and will openly share challenges and successes along the way.
(2012)
[Webinar Slides] E-Signatures 101- An Introduction to Digital Transformation ...AIIM International
Check out these webinar slides for an overview of of the basic terminology, concepts, and laws related to electronic signatures.
Want to learn how to incorporate E-Signatures into your overall Enterprise Content Management approach? Visit: AIIM.org/ECMTraining
Gdpr demystified - making sense of the regulationJames Mulhern
Slightly out dated introduction to GDPR, that tries to move away from the headlines on fines and emphasises the global nature of the regulation, the numerous forms of lawful processing and the absolute need to manage privacy and be transparent. Goes on to show how using public cloud can help solve part of the problem.
[Webinar Slides] Your 2019 Information Management Resolution: Part TwoAIIM International
n this webinar, we'll explain the IIM toolkit, and how it can be applied to your everyday work to reach your digital transformation goals as well as offer practical advice on how to get started.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/your-2019-information-management-resolution-2
With a transactional practice, covering the areas of e-commerce, software and technology, Heather Buchta, with Quarles & Brady LLP, presented the different cloud regulations that impact our industry; from data privacy to compliance. Learn all the legal Internet/cloud considerations CIOs are faced with today and apply them to your value proposition.
Reinforcement of Information Privacy and Security NowadaysGoutama Bachtiar
Delivered in a guest lecture session conducted for Faculty of Communication Science, Padjadjaran University, West Java, Indonesia. It includes the topic on Indonesia's Laws #14 Year of 2008 on Disclosure of Public Information.
More and more organisations are allowing their employees to use their personally-owned devices, for example iPads and tablets, at work. This is because online technologies are now part of our everyday lives, not just at work but at home and at play too.
Will Roebuck's short Slideshare presentation looks at some of the key legal risks associated with consumer technology in the workplace.
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...CIO Edge
Learn what the EU Global Data Protection Regulation means for your business – Carrot or Stick its your choice but with fines of €20m or up to 4% of Global Revenue (whichever is the larger) being applied for every data breach and every data mis-use after May 2018 the carrot is the better option.
Are you aware? Are you prepared? Do you comply?
To book a free non sales consultation about GDPR with Ian West contact us enquiry@digitalenterprisefest.com
Talk by Polina Zvyagina, Airbnb (San Francisco), at Stanford Engineering on February 25 2019, Session #6: 'Growing ‘Bitcoin Cities’ Across the Globe from Slovenia || GDPR Compliance Case Study || EU Digital Economy Policy'.
Website: http://www.StanfordEuropreneurs.org
YouTube Channel: https://www.youtube.com/user/StanfordEuropreneurs
Twitter: @Europreneurs
identity and cloud cybersecurity today mean a lot more than has traditionally been understood in these technology disciplines. we will see how the technological and legal shifts that have taken place have major implications not just for IAM and cybersecurity, but also for the discipline traditionally known as customer relationship management, or CRM.
Assessing Risk: How Organizations Can Proactively Manage Privacy RiskTrustArc
In today’s uncertain environment, organizations are regularly confronting new and evolving risks. Data-related risks can stand alone or converge with other enterprise risks, such as third party risk, regulatory compliance risk - such as CCPA and GDPR, security risk, operational and financial risks.
Identifying, understanding, managing, and reporting on data risks across the organization is a critical part of an integrated data governance strategy and essential to enterprise risk management. Organizations that have continuous insights into their evolving risks are able to focus resources on the highest areas of risk and prioritize risk mitigation strategies and plans.
This webinar will review: risk management & privacy, 3rd party vendor risks in today’s climate, top considerations to focus resources on highest areas of risk, risk reporting to management and the board; and the tools & best practices to manage, automate and continuously monitor both company and third-party risk.
This Webinar featuring guests from the EU Commission, the French data regulator CNIL, DLA Piper and IBM provided an overview of the new EU data protection and privacy perspective from the perspective of the regulation author, regulator, legal advisor and technology providers.
At the Synopsys Security Event Israel, Ram Levi, Founder & CEO, Konfidas presented on GDPR. For more information, please visit our website at www.synopsys.com/software
n this webinar, GDPR expert, Richard Hogg, answers the following questions:
What will the GDPR mean for my organization?
Where do I start on the journey to compliance?
What tools and technology are available to help?
Attendees: Operations, Finance, Compliance, Governance, IT
https://www.integro.com/recorded-webinar/nov-17-2016-gdpr
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...confluent
Speakers: Paige Bartley, Senior Analyst, Data and Enterprise Intelligence, Ovum + Cameron Tovey, Head of Information Security, Confluent
For many organizations that want to adopt streaming data, strengthening their governance protocol is a key requirement. While this certainly poses a challenge for data protection regulations and standards, it also limits the potential of data in broader enterprise initiatives that look to maximize the value of information.
There’s a prevailing enterprise perception that compliance with data protection regulations and standards, such as General Data Protection Regulation (GDPR) in the EU, Payment Card Industry (PCI), International Standards Organization (ISO) and many others is a burden: limiting the leverage of data. However, the core requirement of compliance—better control of data—has multiple downstream benefits. When compliance objectives are aligned with existing business objectives, the business can experience net gain.
For many organizations that want to adopt streaming data, strengthening their governance protocol is a key requirement. While this certainly poses a challenge for data protection regulations and standards, it also limits the potential of data in broader enterprise initiatives that look to maximize the value of information.
Learning objectives:
-Understand how data compliance can be a facilitator of existing business objectives rather than a burden
-Find out how to align existing business initiatives with compliance initiatives for maximum business benefit
-Learn about the place of streaming data and data-in-motion in the compliance effort
-Identify governance and tooling needs, existing controls and how they apply to new and emerging technology
-Discover your options for improving governance
Fully understand how GDPR affects the life of millions of EU citizens by having in mind the 10 simple facts exposed by Dr. Karsten Kinast
The presentation gives a short glimpse in to the motivation of GDPR, the key changes it brings, and the ongoing compliance on information lifecycle it presumes.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
IISP NW branch meeting 15 nov 2012 security through governance, compliance…
1. What's on your E RADAR?
IT Governance, Security and Risk
across the online economy
Will Roebuck
Founder and CEO
E RADAR | Smarter business online
2. Why is IT governance important?
● It costs jobs and affects livelihoods without it
● Safeguard competitive and collaborative advantage
● Corporate reputation
● (Public) procurement requirements
● Officer (director) liability
● Meet fiscal, legal and regulatory requirements
● Provide minimum standards of best practice
3. Online in 2012 – 15 years of strengths
● Speed and convenience of business transactions
● Cost and inventory control
● Global presence and market opportunity
● Better customer service
● Competitive and collaborative advantage
● Research and innovation
● Social revolution (accessibility and connecting people)
4. Online in 2012 – 15 years of weaknesses
● Pace of change v legacy technologies
● e.g. Royal Bank of Scotland, NHS IT Infrastructure
● Conflict of laws and regulations
● Whose law applies?
● Common law v statute
● Work place social networking v time-management
● Increased globalisation = domino effect (e.g. Enron)
● Take up of network and information security
● Beware of imitations...
6. Online in 2012 – 15 years of opportunity
● 2,405,510,036 online June 2012 (34.3% world population)*
● E-commerce sales represents 16.9 per cent of total sales
● Website sales represented 4.2 per cent of total sales
● 78.7 per cent of businesses had a website
● 51.9 per cent of businesses had mobile broadband using
3G
● 86.5 per cent of businesses used the Internet to interact
with public authorities.
* Internet World Stats http://www.internetworldstats.com/stats.htm
7. Online in 2012 – 15 years of threats
● Society, business and government
● Financial fraud
● Children and citizens e.g. harassment, bullying...
● Theft – identity, data, intellectual property
● International terrorism
● UK Cyber Crime Strategy (Nov 2011)
● Cost to UK economy
● Cyber crime - £27 billion per year?
● Welfare/tax fraud - £200/£300 per citizen per year
8. Online business environment
● Supply and demand
● Goods, services, digital downloads, financial instruments
● The 'bottom line'
● Encouraged by
● Competition, enterprise and innovation
● Supported by
● People, processes, technology, and information
● Laws, regulations, standards and best practice
9. What does this all mean?
● Balance supply and demand against risk
● Deploy resources carefully
● Smarter business management
● Identify, develop and use 'the right' people skills
● Re-engineer business processes
● Invest in enabling technology
● Provide good laws and regulations
● Responsive legal environment
10. IT challenges over next decade
● Cloud computing
● More online applications
● Just require connectivity; transparent licensing
● Social networks and software
● Enagage with partners and customers; find out interests
● Document management and collaboration
● Organise resources centrally – audit trails
● CRM 2.0
● Internet capabilities to manage customers, incl loyalty
11. IT challenges over next decade
● Unified communications
● Connecting to the right people
● Web 3.0 – semantic web
● Intelligent applications
● Business intelligence
● Improving insights to employees... professional networks
● Virtualisation – Green IT
● Physical to virtual servers saving energy, carbon foot print,
● Enterprise mobility
● Applications accessible from mobile devices
12. Why governance and compliance?
● Customer trust and confidence
● Business protection e.g. evidential trail
● Sector requirements
● Reduced insurance premiums
● Corporate reputation
● Director and vicarious liability
● 'The regulatory stick'
● Secure transactions
13. Challenges and issues
● Corporate
● Vicarious and director liability
● Duty of care towards employee
● Prevent improper and illegal activity over systems /networks
● Personal
● Directors failing to undertake duties implied by law or as
additional duties in their contract
14. Challenges and issues
Contractual
● Prove existence of agreement in disagreement with a
customer
● Defend an action for unfair dismissal before employment
tribunal
● Legal
● Prove an intellectual property right or invention
15. Challenges and issues
Regulatory
● Registering, reporting, retaining and disposal of records
– Annual returns
– Invoicing and VAT
– Health and Safety
– Personnel records
● Data Protection
● Consumer Protection
● Security of systems and networks... and information
16. Digital evidence and admissibility
● Evidence is
● the way that a fact is proved or disproved in a court, tribunal
or disciplinary.
● Oral, real (primary or secondary) or hearsay (less reliable)
– Primary = e.g. signed original contract
– Secondary = e.g. unsigned draft of the contract
● Burden of proof
● Civil cases = with plaintiff and 'balance of probabilities'
● Criminal cases = with prosecution and 'beyond reasonable
doubt'
17. Digital evidence and admissibility
● Evidence in electronic format is admissible
● Electronic Communications Act 2000
● Civil Evidence Act / Youth Justice and Criminal Evidence Act
● May be legally acceptable but may not be admissible.
● Admissible document must be sufficiently relevant
● Court must decide and may give different weight to primary
or secondary evidence
● British Standards Code for Legal Admissibility and
Evidential Weight of Information Stored Electronically.
18. Misuse of devices
● Abuse and misuse (Illegal, illicit or wrong)
● Defamatory remarks
● Breach of confidentiality
● Using and abusing copyright without permission
● Negligence in sending viruses to other business
● Sexual or racial harassment
● Criminal Offences
● e.g. downloading child pornography
● Other illegal images
19. Monitoring communications
● Right to privacy – even at work
● Regulation of Investigatory Powers Act 2000
● Lawful Business Practice Regulations 2000
● Inform monitoring for lawful business purposes
● Quality, training and security
● How do you 'monitor' remote workers?
● Blanket monitoring of employees not acceptable
● Must be justified
● Other alternatives?
20. Data protection
● 8 data protection principles
● Principle 7 – adequate security measures
● Principle 8 – international transfers
● Cloud computing
● Where is personal data
● Information Commissioner's Guidance
● Sensitive personal data
● Encryption
21. Retention, deletion and retrieval
● Organisations must have evidence to rely upon it!
● Information management policy covering
● Retention, access and exchange (including security),
deletion and retrieval
● Why a policy?
● Business (cost, time and risk management)
● Legal (e.g. accounting records = 6 years, criminal penalties)
● Regulatory (FSA Rules, Food Standards etc)
22. About E RADAR
● Championing enterprise and the online economy
● Focus on public policy, governance, compliance and risk
● Pre-legislation and post legislation
● IT and online contracting
● Free-to-use forums
● Monitoring and scrutiny
● Thought-leadership and best practice
● Knowledge Xchange
● Social network
23. Back to you... and 2012
● A turning point?
● Global recession with Euro under threat
● £1 trillion UK government borrowing
● 60% EU cross-border e-commerce transactions fail
● Public sector cuts and increasing unemployment
● European Digital Single Market – working or not?
We need visionaries, innovators and entrepreneurs to
recognise the opportunities and walk through the door...”
24. “The best way to predict
the future is to create it!”