Alessandra Villaamil is a User Experience Designer at New York Times and produces multimedia content for new platforms using new emerging technologies.
She is a journalist and creative technologist based in NY. She's passionate about emerging technologies and solving design problems that improve the relationship between people and the products, systems, and environments that we engage in.
O planeta agoniza na terra, na água e no ar e precisa de união para enfrentar e resolver os seus problemas; enquanto os seres humanos sem consciência pensam em si mesmos, abandonam os seus amigos e querem viver em um reino e no passado.
Alessandra Villaamil is a User Experience Designer at New York Times and produces multimedia content for new platforms using new emerging technologies.
She is a journalist and creative technologist based in NY. She's passionate about emerging technologies and solving design problems that improve the relationship between people and the products, systems, and environments that we engage in.
O planeta agoniza na terra, na água e no ar e precisa de união para enfrentar e resolver os seus problemas; enquanto os seres humanos sem consciência pensam em si mesmos, abandonam os seus amigos e querem viver em um reino e no passado.
Securing the Future | Public Good App HouseTechSoup
In an age where the digital privacy and security of activists are under constant siege, the imperative for change-makers to equip themselves with the critical knowledge and tools to protect their missions and communities has never been more urgent.
This event is designed to empower activists with the knowledge of decentralized technologies that serve to bolster privacy and enhance security measures.
The agenda includes a blend of insightful talks and live demonstrations by leading Makers of public good technologies.
APP DEMOS
👉 Snowflake: a free and open-source censorship circumvention tool from The Tor Project.
👉 Signal: why most chat tools are problematic for privacy, how they can be exploited, and how Signal can help. Freedom of the Press Foundation will demo some basic Signal features that will benefit activists.
👉 Quiet: a "Slackier Signal" for teams doing sensitive work.
👉 Surveillance Self-Defense: the EFF's repository of how-to guides and explainers for protecting yourself and your friends online.
CONTINUE LEARNING & BUILDING - Accelerating Makers is helping technology builders and nonprofits co-create purpose-built tools for public good: https://AcceleratingMakers.PublicGoodAppHouse.org
BROWSE - DWeb explainer documents and guides for civil society: https://acceleratingmakers.publicgoodapphouse.org/downloads
JOIN - Accelerating Makers community: https://survey.alchemer.com/s3/7572582/Accelerating-Makers-Community-Registration
ATTEND - Live tech events for makers and nonprofit Leaders: https://events.techsoup.org/public-good-app-house/
This event is supported by an award from the Filecoin Foundation for the Decentralized Web.: @filecoinfoundationforthede7472
Hosted by TechSoup on May 9, 2024.
https://events.techsoup.org/e/m6wcv9/
FinCEN’s Anti-Money Laundering Developments: A 2015 Update LIVE WebcastThomas LaPointe
In August 2014, the Financial Crimes Enforcement Network (FinCEN) of the U.S. Treasury published a proposed Anti-money Laundering (AML) rule that would require financial institutions, subject to Customer Identification Procedures (CIP), to identify beneficial owners of legal entity customers and subject them to customer due diligence. This includes banks, securities brokers and dealers, mutual funds, futures commission merchants, and others. This CLE course offers participants an overview of the latest trends and best practices with respect to FinCEN’s new rule on Anti-Money Laundering and other developments in BSA/AML enforcement. A panel of thought leaders and practitioners assembled by The Knowledge Group will help firms better understand how to advise clients about application of the new rules in their businesses.
The Knowledge Group has assembled a panel of key thought leaders to provide the audience with an in-depth over-view, analysis, and discussion of FinCEN’s new rule on Anti-Money Laundering and developments in BSA/AML enforcement.
Key issues include that will be covered in this course are:
Anti-money Laundering
Proposed Rules for Financial Transparency
FinCEN Advisories on AML Compliance
Trade-based Money Laundering
Identifying Customers
Identifying Beneficial Owners
Reporting Initiative on Cross-Border Cash Couriers
Recent Enforcement Actions
Compliance and Litigation Risks
To view the webcast go to this link: http://youtu.be/7MNt-5su2LU
To learn more about the webcast please visit our website: http://theknowledgegroup.org
The Fraud Investigation system developed by Logica for our client, was highly commended in The Banker Technology Awards, Fraud Prevention Solution category. The award reflected the great strides that the fraud investigation system and our client’s initiative had taken in helping prevent fraud in the UK.
Meet GDPR ‘Right to Erasure’ Requirements: Erase Customer Data Permanently & ...Blancco
Enterprise businesses trust ITADs to securely destroy their IT assets to the point that data cannot be recovered. Adding an additional level of security with software-based data erasure guarantees that even the most challenging IT assets (like SSDs) are completely wiped prior to destruction. Erasure also fits within Article 17 of GDPR requirements, the ‘Right to Erasure, ’ which requires businesses to permanently remove customer information upon request. Learn how you can prepare your organization to meet these requirements in this session with Fredrik Forslund, Director of Cloud and Data Center Erasure Solutions for Blancco Technology Group.
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...Withum
In the last year, hacker techniques have become even more sophisticated and every business’ threat landscape has widened making companies increasingly vulnerable to cyberattacks and breaches. The average cost of a data breach today in the United States is ~$8.19 Million. Ransomware attacks occur every 11 seconds. Cybercriminals are ready – exploiting employees working from home and companies operating on unsecured networks.
Withum cybersecurity expert Matthew Ferrante and Eric Jackson discussed how organizations can successfully reduce the likelihood of compliance failures and mitigate the impact of cybersecurity incidents. They were joined by Capital One Commercial Bank Treasury Management Lead Stephen Susnak, who discussed how to build more effective defenses against payments fraud.
Supplier Quality Management: Best Practices and Practical Insights in 2015 LI...Thomas LaPointe
Supplier Quality Management (SQM) is becoming an important business practice as more companies are out-sourcing manufacturing, distribution, shipping, and sales across the globe. Aside from the implications of failure to comply with a myriad of regulations, failure of SQM can lead to litigation, added costs, and harmed reputation among other problems such as product adulteration and mis-branding. However, there is a trade-off between managing supplier quality and costs. As such, SQ managers need to be aware of the risks and benefits of the relationship with suppliers as a whole.
Our panel of key thought leaders and practitioners assembled by The Knowledge Group will discuss Supplier Quality Management and provide Best Practices and Practical Insights.
Key topics include:
Supplier Quality Management – Overview
Supplier Selection, Evaluation, and Monitoring
Supplier Quality Agreements and Contracts
Cost of Poor Supplier Quality (COPQ)
Quality Management Systems
Cost Recovery and Supplier Audit
Closed Loop Corrective Actions
Suppliers Quality Metrics
Supply Chain Pressures
To view the webcast go to this link: http://youtu.be/FhW15o2pfCw
To learn more about the webcast please visit our website: http://theknowledgegroup.org
The webinar covers:
• The origin and need for security and privacy in IoT devices
• Elements of the IoT Trust Framework
• Plans for implementation and certification
This webinar was presented by Scott S. Perry CPA and Online Trust Alliance:
Scott Perry is Principle of Scott S. Perry CPA, an expert with more than 25 years of experience as a manager, senior manager and director on the audit firms. A national consulting firm has led him to drive his own licensed, nationally operating CPA firm based in Bellevue, Washington specializing in Cybersecurity Audits.
Craig Spiezle is Executive director of Online Trust Alliance (OTA), a recognized authority on trust and the convergence of privacy, security and interactive marketing promoting a privacy practices, balanced public policy, end-to-end security and data stewardship. Currently Craig is on board Identity Theft Council and a member of InfraGuard a partnership between the Federal Bureau of Investigation and private sector.
Link of the recorded session published on YouTube: https://youtu.be/K3KZHWHO8bg
Securing the Future | Public Good App HouseTechSoup
In an age where the digital privacy and security of activists are under constant siege, the imperative for change-makers to equip themselves with the critical knowledge and tools to protect their missions and communities has never been more urgent.
This event is designed to empower activists with the knowledge of decentralized technologies that serve to bolster privacy and enhance security measures.
The agenda includes a blend of insightful talks and live demonstrations by leading Makers of public good technologies.
APP DEMOS
👉 Snowflake: a free and open-source censorship circumvention tool from The Tor Project.
👉 Signal: why most chat tools are problematic for privacy, how they can be exploited, and how Signal can help. Freedom of the Press Foundation will demo some basic Signal features that will benefit activists.
👉 Quiet: a "Slackier Signal" for teams doing sensitive work.
👉 Surveillance Self-Defense: the EFF's repository of how-to guides and explainers for protecting yourself and your friends online.
CONTINUE LEARNING & BUILDING - Accelerating Makers is helping technology builders and nonprofits co-create purpose-built tools for public good: https://AcceleratingMakers.PublicGoodAppHouse.org
BROWSE - DWeb explainer documents and guides for civil society: https://acceleratingmakers.publicgoodapphouse.org/downloads
JOIN - Accelerating Makers community: https://survey.alchemer.com/s3/7572582/Accelerating-Makers-Community-Registration
ATTEND - Live tech events for makers and nonprofit Leaders: https://events.techsoup.org/public-good-app-house/
This event is supported by an award from the Filecoin Foundation for the Decentralized Web.: @filecoinfoundationforthede7472
Hosted by TechSoup on May 9, 2024.
https://events.techsoup.org/e/m6wcv9/
FinCEN’s Anti-Money Laundering Developments: A 2015 Update LIVE WebcastThomas LaPointe
In August 2014, the Financial Crimes Enforcement Network (FinCEN) of the U.S. Treasury published a proposed Anti-money Laundering (AML) rule that would require financial institutions, subject to Customer Identification Procedures (CIP), to identify beneficial owners of legal entity customers and subject them to customer due diligence. This includes banks, securities brokers and dealers, mutual funds, futures commission merchants, and others. This CLE course offers participants an overview of the latest trends and best practices with respect to FinCEN’s new rule on Anti-Money Laundering and other developments in BSA/AML enforcement. A panel of thought leaders and practitioners assembled by The Knowledge Group will help firms better understand how to advise clients about application of the new rules in their businesses.
The Knowledge Group has assembled a panel of key thought leaders to provide the audience with an in-depth over-view, analysis, and discussion of FinCEN’s new rule on Anti-Money Laundering and developments in BSA/AML enforcement.
Key issues include that will be covered in this course are:
Anti-money Laundering
Proposed Rules for Financial Transparency
FinCEN Advisories on AML Compliance
Trade-based Money Laundering
Identifying Customers
Identifying Beneficial Owners
Reporting Initiative on Cross-Border Cash Couriers
Recent Enforcement Actions
Compliance and Litigation Risks
To view the webcast go to this link: http://youtu.be/7MNt-5su2LU
To learn more about the webcast please visit our website: http://theknowledgegroup.org
The Fraud Investigation system developed by Logica for our client, was highly commended in The Banker Technology Awards, Fraud Prevention Solution category. The award reflected the great strides that the fraud investigation system and our client’s initiative had taken in helping prevent fraud in the UK.
Meet GDPR ‘Right to Erasure’ Requirements: Erase Customer Data Permanently & ...Blancco
Enterprise businesses trust ITADs to securely destroy their IT assets to the point that data cannot be recovered. Adding an additional level of security with software-based data erasure guarantees that even the most challenging IT assets (like SSDs) are completely wiped prior to destruction. Erasure also fits within Article 17 of GDPR requirements, the ‘Right to Erasure, ’ which requires businesses to permanently remove customer information upon request. Learn how you can prepare your organization to meet these requirements in this session with Fredrik Forslund, Director of Cloud and Data Center Erasure Solutions for Blancco Technology Group.
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...Withum
In the last year, hacker techniques have become even more sophisticated and every business’ threat landscape has widened making companies increasingly vulnerable to cyberattacks and breaches. The average cost of a data breach today in the United States is ~$8.19 Million. Ransomware attacks occur every 11 seconds. Cybercriminals are ready – exploiting employees working from home and companies operating on unsecured networks.
Withum cybersecurity expert Matthew Ferrante and Eric Jackson discussed how organizations can successfully reduce the likelihood of compliance failures and mitigate the impact of cybersecurity incidents. They were joined by Capital One Commercial Bank Treasury Management Lead Stephen Susnak, who discussed how to build more effective defenses against payments fraud.
Supplier Quality Management: Best Practices and Practical Insights in 2015 LI...Thomas LaPointe
Supplier Quality Management (SQM) is becoming an important business practice as more companies are out-sourcing manufacturing, distribution, shipping, and sales across the globe. Aside from the implications of failure to comply with a myriad of regulations, failure of SQM can lead to litigation, added costs, and harmed reputation among other problems such as product adulteration and mis-branding. However, there is a trade-off between managing supplier quality and costs. As such, SQ managers need to be aware of the risks and benefits of the relationship with suppliers as a whole.
Our panel of key thought leaders and practitioners assembled by The Knowledge Group will discuss Supplier Quality Management and provide Best Practices and Practical Insights.
Key topics include:
Supplier Quality Management – Overview
Supplier Selection, Evaluation, and Monitoring
Supplier Quality Agreements and Contracts
Cost of Poor Supplier Quality (COPQ)
Quality Management Systems
Cost Recovery and Supplier Audit
Closed Loop Corrective Actions
Suppliers Quality Metrics
Supply Chain Pressures
To view the webcast go to this link: http://youtu.be/FhW15o2pfCw
To learn more about the webcast please visit our website: http://theknowledgegroup.org
The webinar covers:
• The origin and need for security and privacy in IoT devices
• Elements of the IoT Trust Framework
• Plans for implementation and certification
This webinar was presented by Scott S. Perry CPA and Online Trust Alliance:
Scott Perry is Principle of Scott S. Perry CPA, an expert with more than 25 years of experience as a manager, senior manager and director on the audit firms. A national consulting firm has led him to drive his own licensed, nationally operating CPA firm based in Bellevue, Washington specializing in Cybersecurity Audits.
Craig Spiezle is Executive director of Online Trust Alliance (OTA), a recognized authority on trust and the convergence of privacy, security and interactive marketing promoting a privacy practices, balanced public policy, end-to-end security and data stewardship. Currently Craig is on board Identity Theft Council and a member of InfraGuard a partnership between the Federal Bureau of Investigation and private sector.
Link of the recorded session published on YouTube: https://youtu.be/K3KZHWHO8bg
Cyber Threat Intelligence: Knowing What Specific Threats Your Business Should...SurfWatch Labs
By using Cyber Threat Intelligence, organizations can understand what specific threats they face and use these insights to drive the most effective defense.
10. Peter Jeydel
§ Associate, Steptoe&Johnson LLP
§ Vice Chair of the American Bar
Association’s Export Controls
and Economic Sanctions
Committee of the International
Law Section
§ (202) 429-6291
10
18. List Based Controls
On the CCL & EAR99
1A202 Composite structures, other than
those controlled by 1A002, in the form of
tubes and having both of the following
characteristics (see List of Items Controlled).
License Requirements
Reason for Control: NP, AT
Control(s) Country Chart (See Supp.
No. 1 to part 738).
NP applies to entire entry NP Column 1
AT applies to entire entry AT Column 1
List Based License Exceptions (See Part 740
for a description of all license exceptions)
LVS: N/A
GBS: N/A
CIV: N/A
List Based License Exceptions (See Part 740
for a description of all license exceptions)
LVS: N/A
GBS: N/A
CIV: N/A
List of Items Controlled
Related Controls: (1) See ECCNs 1E201
(“use”) and 1E202 (“development” and
“production”) for technology for items
controlled by this entry. (2) Also see ECCNs
1A002, 1C010, 1C210, 9A010, and 9A110.
(3) “Composite” structures “specially
designed” or prepared for use in separating
uranium isotopes are subject to the export
licensing authority of the Nuclear
Regulatory Commission (see 10 CFR part
110).
Related Definitions: N/A
Items:
a. An inside diameter of between 75 mm and
400 mm; and
b. Made with any of the “fibrous or filamentary
materials” specified in 1C010.a or .b or 1C210.a
or with arbon prepreg materials specified in
1C210.c.
18
27. Mission / Approach
§ BIS falls under the Commerce Dept.
§ Mission to promote foreign trade within confines of
US law
§ Primarily impacts manufacturing/tech industries
§ Licensing often relatively quick and simple
§ Relatively well staffed
§ OFAC falls under the Treasury Dept.
§ OFAC’s historical mission to cut off trade with
enemy states, primarily through the US financial
sector
§ Staffing shortages
§ Licensing process often time consuming
§ These OFAC stereotypes are improving but still exist
27
Peter Jeydel
34. Similarities in Enforcement – BIS/OFAC
§ Strict liability (no knowledge or intent required) for most
civil/administrative enforcement
§ Broad/discretionary application of rules
§ Courts defer to agency interpretations of regulations
§ Most cases settled, not litigated
§ Little “case law” or “precedent”
§ Potential (but not guaranteed) leniency/credit for timely
voluntary disclosure, cooperation and remediation
§ Both agencies decline formal enforcement action for
vast majority of voluntary disclosures
§ Large proportion of cases involve interagency/foreign
cooperation
Peter Jeydel
34