A 60-minute webinar presented by Core Compliance & Legal Services and sponsored by LiveOffice.
View this crash course in email compliance, and find out what you need to know to protect yourself and your business.
You’ll learn:
• The scope of electronic communications and how to capture them
• Current regulations as well as SEC and FINRA expectations
• How to properly conduct electronic communications review
What's New for Business, Finance and Technology Law in Thailand? Peerasak C.
by Warot Wanakankowit (Wingman & Partners)
Agenda
New BOI Privileges for Digital Businesses
Regulatory sandbox issued by Bank of Thailand (BOT)
Q&A
Acc Itpec Letter And Discussion Points Re Ali Principles Of The Law Of Softwa...Mark Radcliffe
This letter from the IT, Privacy & eCommerce committee of the American Corporate Counsel Association and their concerns with the new American Law Institute's Principles of the Law of Software Contracts. These Principles could dramatically alter the law of software contracts. For more information, see my blog: http://lawandlifesiliconvalley.com/blog/?p=240
Voting is an essential feature of democracy, but electoral fraud unfortunately is as old as voting itself. Increasingly, however, the way we count our votes completely depends on the computer system. Those systems have to work correctly and securely or the outcome of the election could be in jeopardy. Many jurisdictions don’t have in place proper safeguards, which create new opportunities for fraud.
The goal of the report is to provide sound understanding of how computer security is critical to the election process in broadly applicable sense and what we need to do to keep the election secure.
Back in 2001, there were a lot of Internet Law issues that were just beginning to be explored which is what gave rise to the title "Internet Law: An Expedition" -- what we did not realize back then was that many of those issues would still be evolving 15 years later! For example, this presentation discusses use of email and whether it is safe and appropriate for confidential information; Internet or computer use policies, something that I still discuss frequently, and privacy issues in the employment context. It was fascinating to take a look back down memory lane with these presentation slides.
How Does the ePrivacy Regulation and General Data ProtectionShield
Check out this slide to learn about ePrivacy regulation and General Data Protection Regulation. Is their implication brings more challenges to financial industries and Communications Compliance? Go through this slide for full info or visit this link: https://bit.ly/3nxlwLW
What's New for Business, Finance and Technology Law in Thailand? Peerasak C.
by Warot Wanakankowit (Wingman & Partners)
Agenda
New BOI Privileges for Digital Businesses
Regulatory sandbox issued by Bank of Thailand (BOT)
Q&A
Acc Itpec Letter And Discussion Points Re Ali Principles Of The Law Of Softwa...Mark Radcliffe
This letter from the IT, Privacy & eCommerce committee of the American Corporate Counsel Association and their concerns with the new American Law Institute's Principles of the Law of Software Contracts. These Principles could dramatically alter the law of software contracts. For more information, see my blog: http://lawandlifesiliconvalley.com/blog/?p=240
Voting is an essential feature of democracy, but electoral fraud unfortunately is as old as voting itself. Increasingly, however, the way we count our votes completely depends on the computer system. Those systems have to work correctly and securely or the outcome of the election could be in jeopardy. Many jurisdictions don’t have in place proper safeguards, which create new opportunities for fraud.
The goal of the report is to provide sound understanding of how computer security is critical to the election process in broadly applicable sense and what we need to do to keep the election secure.
Back in 2001, there were a lot of Internet Law issues that were just beginning to be explored which is what gave rise to the title "Internet Law: An Expedition" -- what we did not realize back then was that many of those issues would still be evolving 15 years later! For example, this presentation discusses use of email and whether it is safe and appropriate for confidential information; Internet or computer use policies, something that I still discuss frequently, and privacy issues in the employment context. It was fascinating to take a look back down memory lane with these presentation slides.
How Does the ePrivacy Regulation and General Data ProtectionShield
Check out this slide to learn about ePrivacy regulation and General Data Protection Regulation. Is their implication brings more challenges to financial industries and Communications Compliance? Go through this slide for full info or visit this link: https://bit.ly/3nxlwLW
Emotions are a form of non verbal communication that we use to reflect our physiological and mental state. We express emotions when we are dealing with everything around us even with our computers. Since we are becoming more dependent on computers in our lives, we need to design more interactive systems. In other words, we need to adapt computers to our needs as well as to our behavior; make computers emotionally intelligent, in order to be able to detect ours mood and make decisions based on that.
A 60-minute webinar on How Hosted Email Archiving Can Save You Money.
View this presentation for an in-depth look at hosted email archiving and discover how much money you can save with software-as-a-service (SaaS) solutions - during a recession or any economic climate.
You'll learn how SaaS email archiving can help you:
- Save more money and time - both upfront as well as on an ongoing basis
- Get more value - in terms of storage, disaster recovery and environmental friendliness
- Worry less - in terms of deployment time, infrastructure and security/compliance
Emotions are a form of non verbal communication that we use to reflect our physiological and mental state. We express emotions when we are dealing with everything around us even with our computers. Since we are becoming more dependent on computers in our lives, we need to design more interactive systems. In other words, we need to adapt computers to our needs as well as to our behavior; make computers emotionally intelligent, in order to be able to detect ours mood and make decisions based on that.
A 60-minute webinar on How Hosted Email Archiving Can Save You Money.
View this presentation for an in-depth look at hosted email archiving and discover how much money you can save with software-as-a-service (SaaS) solutions - during a recession or any economic climate.
You'll learn how SaaS email archiving can help you:
- Save more money and time - both upfront as well as on an ongoing basis
- Get more value - in terms of storage, disaster recovery and environmental friendliness
- Worry less - in terms of deployment time, infrastructure and security/compliance
36Chapter Chapter 5 – Corporate and IT Governance5 Quiz.docxtamicawaysmith
36
Chapter Chapter 5 – Corporate and IT Governance
5 Quiz
Question 1
5 / 5 points
Which of the following act creates international standards that strengthen global capital and liquidity rules?
1)
Foreign corrupt practices Act
2)
Gramm-Leach-Bliley Act
3)
California Senate Bill 1386
4)
Basel II Accord
Question 2
5 / 5 points
Which act identifies the U.S. taxpayers who hold financial assets in non-U.S. financial institutions and offshore accounts?
1)
Foreign Account Tax Compliance Act
2)
Foreign Corrupt Practices Act
3)
U.S. Senate Bill Act
4)
Basel II Tax Accord
Question 3
5 / 5 points
Which of the following frameworks provides information technology (IT) services based on a synthesis of the best ideas from international practitioners?
1)
IT Infrastructure Library (ITIL)
2)
Committee of Sponsoring Organizations (COSO) 2013
3)
Control Objectives for Information and Related Technology (COBIT)
4)
International Standards Organization (ISO) 27002
Question 4
5 / 5 points
Which of the following provides a framework for information technology (IT) management and governance consisting of process descriptions, management guidelines, and models to assess maturity and capability for each process?
1)
Committee of Sponsoring Organizations (COSO) 2013
2)
Information Infrastructure Library (ITIL)
3)
Control Objectives for Information and Related Technology (COBIT)
4)
International Standards Organization (ISO) 27002
Question 5
5 / 5 points
Which of the following is a method used to achieve the goals of information technology (IT) governance?
1)
Strategic alignment
2)
IT value delivery
3)
Risk management
4)
Operations management
Question 6
5 / 5 points
Which of the following is a goal of effective information technology (IT) governance?
1)
Resource management
2)
Risk management
3)
Operations alignment
4)
Strategic alignment
Question 7
5 / 5 points
Which of the following is an inexpensive yet safe way to backup vital data?
1)
Allow employees to take backup copies of vital data home at the end of the work day.
2)
Copy online databases to magnetic storage devices and ship them off-site.
3)
Store the backup data in a building located near the company.
4)
Use online databases to update and backup the data.
Question 8
0 / 5 points
Which of the following factors influences information technology (IT) related initiatives?
1)
A company’s internal control system
2)
A company’s balance sheet
3)
Career growth of employees
4)
The values of IT stakeholders
Question 9
5 / 5 points
In the Plan-Do-Check-Act (PDCA) model, identify the step that requires the improvement team to identify its target improvement area.
1)
The Do step
2)
The Check step
3)
The Plan step
4)
The Act step
Question 10
5 / 5 points
Interest in corporate governance has grown due to _____ scandals.
1)
accounting
2)
espionage
3)
journalistic
...
This presentation provides in-house counsel with a brief overview of IT / ICT related legislation within South Africa and the impact it might have on its organisations and its people
Ф franciscronje.com
regulatory compliance explained
Indian law and cyber crime who as dont know the punishment of crime, this ppt helps you what are the penalty is there and what are the information technology does give the information about crime and what are the punishment their in the indian constitution. indian constitution is the bigg support for who are sufforing from injusties.
Look Before You Leap: Unauthorized Practice of the Law, Supervision of Non-La...Kevin O'Shea
Together with my (future) partner, Peter Imse, these are the slides for our June 2011 CLE presented in conjunction with the First American Title Insurance Company. The topics in these slides were revisited in my June 2014 presentation (Avoiding Technical Fouls:Selected Ethical Issues in Advertising, Social Media, and Cloud Computing). Nevertheless, there is some interesting data in this presentation that does not appear in my June 2014 slides.
The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of the Indian Parliament (No 21 of 2000) notified on 17 October 2000. It is the primary law in India dealing with cybercrime and electronic commerce. It is based on the United Nations Model Law on Electronic Commerce 1996 (UNCITRAL Model) recommended by the General Assembly of United Nations by a resolution dated 30 January 1997.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 3
LiveOffice Email Archiving & Compliance 101
1.
2. Electronic Communications Compliance 101 Fundamentals to Regulatory Requirements Presented by Core Compliance & Legal Services, Inc. November 18, 2008 Slide 2
3. 3 Introduction Definition and Scope of Electronic Communications Current Regulations SEC and FINRA Expectations How to Conduct Electronic Communications Review Slide 3
4. 4 Definition of Electronic Communication Two types of communication: oral and written “Oral” means real-time communications to a live audience “Written” means any written, printed, or graphic (electronic) media Use of electronic devices and systems for transferring, processing, storing, displaying, analyzing, protecting, and disposing of information Source: 18 U.S.C. § 2510(12) (2007) Slide 4
5. 5 Scope of Electronic Communication Regulators use the terms “electronic communications,” “e-mail” and “electronic correspondence” inter-changeably Includes: E-mail, E-faxes Web Sites Bloomberg Blogs, Chat Rooms, Instant Messaging Text Messaging Slide 5
6. 6 How to Capture Electronic Communications E-mail E-faxes Instant and Text Messaging Blogs Chat Rooms Message Boards Slide 6
7. 7 How to Capture Electronic Communications Web sites Regulation FD 18 U.S.C. § 2510(12)(a) does not include telephone conversations in the definition of electronic communications Oral communications are not within definition of written or graphic communications unless broadly disseminated (e.g. blast voice mail) Slide 7
8. 8 Rules Governing Electronic Communications Communications with the Public (FINRA Rule 2210) Includes advertisements, sales literature, correspondence, institutional sales material, public appearances, and independently prepared reprints Must be fair & balanced, not false/misleading, not exaggerated/unwarranted, no material omissions, no projections/predictions Slide 8
9. 9 Rules Governing Electronic Communications Institutional Sales Material and Correspondence (FINRA Rule 2211) Correspondence means any written or electronic message sent to one or more current retail customers and fewer than 25 prospective retail customers within any 30-day period Includes: Business cards, letterhead, written letters, form letters sent to existing customers, instant messages, and emails sent to less than 25 prospective customers within 30 days Slide 9
10. 10 Rules Governing Electronic Communications Books and Records (FINRA Rule 3110) requires books and records to be made and kept in conformity with SEC Rules 17a-3 and 17a-4 Includes: Originals of everything received Copies of everything sent Received written customer complaints Communications supervision compliance records Duration: 3 years (first 2 in “easily accessible” place) Use of micro and electronic storage media permitted in non-erasable, non-rewritable format Format: “legible, true, complete and current” Slide 10
11. 11 Rules Governing Electronic Communications Books and Records Requirements for Brokers and Dealers under Securities Exchange Act of 1934 Rules 17a-3 & 17a-4 (Cont.) Storage with Third Parties Permitted SEC Rule 17a-4(i) Third party vendor must file written undertaking with SEC, signed by duly authorized person Undertaking must include an SEC-required provision permitting examiners to access records Slide 11
12. 12 Rules Governing Electronic Communications Books and Records to Be Maintained by Investment Advisers under Rule 204-2(a)(7) Includes: Originals of all written communications received and copies of all written communications sent by an IA Regarding recommendations, advice, funds, or placing an order Slide 12
13. 13 Rules Governing Electronic Communications Books and Records to be maintained by Investment Advisers under Rule 204-2(e)-(g) Storage requirements: 5 years (first 2 years in an “easily accessible” place) General requirements: Arranged and indexed for easy location, access, and retrieval; Legible, true, and complete printout or copy of the record and the means to access, view, and print the records; and Keep a separately stored duplicate copy of the record in any permissible format. Slide 13
14. 14 Rules Governing Electronic Communications Books and Records to be maintained by Investment Advisers under Rule 204-2(g)(3) Special requirements for electronic storage : Reasonably protect against loss, alteration, or destruction; Limit access to the records to properly authorized personnel and the Commission (including examiners and representatives); and Reasonably ensure that any reproduction of a hard copy original record that is stored electronically is complete, true, and legible when retrieved. Slide 14
15. 15 Interpretive Releases on Electronic Communications Guidance on the Review and Supervision of Electronic Communications (NTM 07-59) Electronic communications requiring review : External (outside email platforms (e.g. Yahoo!), message boards, and e-faxes) Internal methods (e.g. inter-office MS Outlook) Suggested methods of review include: Lexicon-based Random-percentage sampling Combination method Slide 15
16. 16 Interpretive Releases on Electronic Communications Guidance on the Review and Supervision of Electronic Communications (NTM 07-59) (Cont.) Include policies and procedures to address new and emerging technologies Include ongoing evaluation procedures to check for loopholes or problems Specify any additional reviews to address any loopholes or problems If using an automated tool or system, understand system limitations and specify any further reviews needed to address limitations Slide 16
17. 17 Regulatory Expectations FINRA Expects Brokers and Dealers to: Apply flexible risk-based approach based on nature of individual business Consider the content of the e-mail or IM and who the e-mail or IM is directed towards (audience) Ensure records are “legible, true, complete, and current” Slide 17
18. 18 Regulatory Expectations SEC Expects Investment Advisers to: Consider the nature of the firm's operations (risk-based) Have effective policies and procedures for electronic communication Capture, compile, maintain, and report relevant and timely information in e-mail and instant messages Expectation: Save everything Prevent, detect and correct violations Safeguard records from unauthorized access or destruction Slide 18
19. 19 Recent Enforcement Actions Three General Deficiencies Found: Failure to retain required electronic communications Failure to timely produce electronic communications Failure to supervise electronic communications Cases/Hearings: Bear Stearns, Morgan Stanley, Banc of America U.S. Financial Investments censured and fined $40,000 Argosy Capital Securities censured and fined $10,000 Registered Principal fined additional $10,000 Chicago Investment Group, LLC fined $75,000 Registered Principal fined $15,000 Another Registered Principal fined $20,000 Slide 19
20. 20 Questions? Please contact us if you have any additional questions Core Compliance & Legal Services, Inc. Tel: (619) 278-0020 Email: christina.rovira@corecls.com Website: www.corecls.com Slide 20
22. Key Takeaways You need to understand: Requirements apply, regardless of firm size Types of communications you have Value of saving everything How to produce communications quickly Review, supervision and chain of custody procedures How to recover lost communications in the event of a disaster Slide 22