SlideShare a Scribd company logo
Digital Content & Sox compliance




SOX

The Sarbanes–Oxley Act of 2002 was put in place by the US government to protect investors in public
companies following a series of corporate and accounting scandals perpetrated in the late 90’s and early 00’s
which included Enron, Tyco International, Adelphia, Peregrine Systems and WorldCom. These scandals, which
cost investors billions of dollars when the share prices of affected companies collapsed, shook public
confidence in the nation's securities markets.

Much has been written about these scandals and also SOX and what is now required of Public Companies and
their stakeholders to secure societies confidence in the Markets and keep corporate officers and employees
out of jail. This piece concerns itself with a specific set of challenges relating to Digital Content used in a public
company or for that matter any company.

Section 404, 802 & Digital Content
Section 404 of the Act “Assessment of Internal Controls” & Section 802 “Criminal Penalties for influencing
US Agency Investigation” are key sections relating to the effectiveness of the act and the actions and
processes public companies must take or put in place.

In particular section 404 is concerned with the prevention and detection of fraud and error and the adequacy
of controls required. The integrity, authenticity and provenance of digital content (data, text, Audio, Video
etc.) must be secured and be non repudiable. We know that digital content is much easier to change than
paper based content and public companies must find cost effective solutions to assure trust and confidence in
their management and control of Digital content. Section 404 focuses on content authenticity and integrity

Section 802: “ Whoever knowingly alters, destroys, mutilates, conceals, covers up, falsifies, or makes a false
entry in any record, document, or tangible object with the intent to impede, obstruct, or influence the
investigation or proper administration of any matter within the jurisdiction of any department or agency of the
United States or any case filed under title 11, or in relation to or contemplation of any such matter or case,
shall be fined under this title, imprisoned not more than 20 years, or both”. This brings home the importance
of being able to identify fraudulent, malicious or even just simple errors that may be part of an audit or
evidential chain and required to establish trust and confidence in digital data/content. Section 802 in addition
to the focus above in section 404 also brings attention to the history and flows of the digital content.

How can public companies identify and prevent fraud or error in their digital content cost effectively?

      1.   Identify & List the company’s digital assets (versions, time lines etc.)
      2.   Perform a Risk analysis and identify those critical digital assets
      3.   Identify those critical digital content types and forms that must be protected and controlled through
           their life cycle.

Sample critical Digital Assets
    Contractual documentation
    Policy & Procedure documents and records
    Intellectual Property
    Trademarks and copyright
    Financial reports
    HR& employee records
    Performance Management records
    Software applications
    Software logs
    Databases
    Recorded telephone conversations
    Recorded conference calls(Audio/Video)

www.digiprove.com                                  ©Digiprove                                           Feb 2012
Digital Content & Sox compliance


        Images, Photographs, Videos

Identify& implement appropriate software controls as a solution to the digital content/asset protection such as
Digiprove.

What are the core features that a simple software solution must have?

        Establish the authenticity and integrity of digital content on entry into the company’s digital world
         whether created within that world or entering externally whether it be via an electronic
         communications or scanned solution. (This can be achieved by creating a unique digital fingerprint of
         the content and meta data such as date, time, location, ownership)
        Maintain full confidentiality of this digital content in that it does not get sent externally outside the
         companies own controlled digital world to be certified.
        Create an audit trail for the defined digital content and any actions taken on that content.
        Be able to verify the provenance of any digital content once it has been certified and verify if it has
         been tampered with.

Digiprove products tick all the boxes:

Selfprotect – a simple SaaS on-line service for content and communications
Autoprotect – a simple background utility that automatically protects the identified files and folders.
Completeprotect – includes digital log event certification and audit trail along with autoprotected content.
(New Product)
Signasure – enables and protects documents with all types of digital signatures (New Product)
Brokerprove – A standalone solution for SME professional service providers
Embedprotect – A software developer’s kit that enables Digiprove technology to be quickly integrated into a
company’s business applications




www.digiprove.com                                 ©Digiprove                                         Feb 2012

More Related Content

What's hot

Top 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be ReadingTop 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be Reading
DDoS Mitigation
 
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SMCarlos Valderrama
 
Blockchain Decentralized Identifier (DID) Innovation Insights from Patents
Blockchain Decentralized Identifier (DID) Innovation Insights from PatentsBlockchain Decentralized Identifier (DID) Innovation Insights from Patents
Blockchain Decentralized Identifier (DID) Innovation Insights from Patents
Alex G. Lee, Ph.D. Esq. CLP
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoT
Amy Daly
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
sreelekha appakondappagari
 
Odoo iot box integration
Odoo iot box integrationOdoo iot box integration
Odoo iot box integration
Celine George
 
SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014
Chin Wan Lim
 
Trinity Profile 001
Trinity Profile 001Trinity Profile 001
Trinity Profile 001trifuturein
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
Usman Anjum
 
Internet of things
Internet of thingsInternet of things
Internet of things
varungoyal98
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
Anushka Perera
 
Attacking the cloud with social engineering
Attacking the cloud with social engineeringAttacking the cloud with social engineering
Attacking the cloud with social engineering
Peter Wood
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...OKsystem
 
Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And ComplianceOracle
 
IoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex TrainingIoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex Training
Bryan Len
 
Iot Market Readiness
Iot Market ReadinessIot Market Readiness
Iot Market Readiness
Murali Munagapati
 
12th International Conference on Communications Security & Information Assura...
12th International Conference on Communications Security & Information Assura...12th International Conference on Communications Security & Information Assura...
12th International Conference on Communications Security & Information Assura...
ijasuc
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscapeSamir SEHIL
 
Good Security Whitepaper
Good Security WhitepaperGood Security Whitepaper
Good Security Whitepaper
genasun
 

What's hot (20)

Top 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be ReadingTop 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be Reading
 
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
 
Blockchain Decentralized Identifier (DID) Innovation Insights from Patents
Blockchain Decentralized Identifier (DID) Innovation Insights from PatentsBlockchain Decentralized Identifier (DID) Innovation Insights from Patents
Blockchain Decentralized Identifier (DID) Innovation Insights from Patents
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoT
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
Odoo iot box integration
Odoo iot box integrationOdoo iot box integration
Odoo iot box integration
 
SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014
 
2012 DBIR
2012 DBIR2012 DBIR
2012 DBIR
 
Trinity Profile 001
Trinity Profile 001Trinity Profile 001
Trinity Profile 001
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
Attacking the cloud with social engineering
Attacking the cloud with social engineeringAttacking the cloud with social engineering
Attacking the cloud with social engineering
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
 
Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And Compliance
 
IoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex TrainingIoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex Training
 
Iot Market Readiness
Iot Market ReadinessIot Market Readiness
Iot Market Readiness
 
12th International Conference on Communications Security & Information Assura...
12th International Conference on Communications Security & Information Assura...12th International Conference on Communications Security & Information Assura...
12th International Conference on Communications Security & Information Assura...
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 
Good Security Whitepaper
Good Security WhitepaperGood Security Whitepaper
Good Security Whitepaper
 

Similar to The relevance of Digital content in SOX compliance

Embed trust in your software & data
Embed trust in your software & dataEmbed trust in your software & data
Embed trust in your software & data
Strategic Business & IT Services
 
Mulin Holstein PKI-strategy
Mulin Holstein PKI-strategyMulin Holstein PKI-strategy
Mulin Holstein PKI-strategyfEngel
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
LabSharegroup
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
eletseditorial
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
mistryritesh
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Anil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Anil
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Cohesive Networks
 
Mobile Application Security by Design
Mobile Application Security by DesignMobile Application Security by Design
Mobile Application Security by Design
DMI
 
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong Authentication
FIDO Alliance
 
VulnerabilityRewardsProgram
VulnerabilityRewardsProgramVulnerabilityRewardsProgram
VulnerabilityRewardsProgramTaha Kachwala
 
f6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdff6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdf
Surendhar57
 
How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech application
nimbleappgenie
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
Kresimir Popovic
 
Department of Transportation and Communications of Philippines Selects Guardt...
Department of Transportation and Communications of Philippines Selects Guardt...Department of Transportation and Communications of Philippines Selects Guardt...
Department of Transportation and Communications of Philippines Selects Guardt...
flashnewsrelease
 
Contractor Exposed Manufacturer's Sensitive Data
Contractor Exposed Manufacturer's Sensitive DataContractor Exposed Manufacturer's Sensitive Data
Contractor Exposed Manufacturer's Sensitive Data
Digital Shadows
 
2016 01-05 csr css non-confidential slide deck
2016 01-05 csr  css non-confidential slide deck2016 01-05 csr  css non-confidential slide deck
2016 01-05 csr css non-confidential slide deck
Richard (Dick) Kaufman
 
Presentation Deck Dec.pdf
Presentation Deck Dec.pdfPresentation Deck Dec.pdf
Presentation Deck Dec.pdf
Paolo Costanzo
 
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachCloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
SLA-Ready Network
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
The Security of Things Forum
 

Similar to The relevance of Digital content in SOX compliance (20)

Embed trust in your software & data
Embed trust in your software & dataEmbed trust in your software & data
Embed trust in your software & data
 
Mulin Holstein PKI-strategy
Mulin Holstein PKI-strategyMulin Holstein PKI-strategy
Mulin Holstein PKI-strategy
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
 
Mobile Application Security by Design
Mobile Application Security by DesignMobile Application Security by Design
Mobile Application Security by Design
 
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong Authentication
 
VulnerabilityRewardsProgram
VulnerabilityRewardsProgramVulnerabilityRewardsProgram
VulnerabilityRewardsProgram
 
f6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdff6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdf
 
How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech application
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Department of Transportation and Communications of Philippines Selects Guardt...
Department of Transportation and Communications of Philippines Selects Guardt...Department of Transportation and Communications of Philippines Selects Guardt...
Department of Transportation and Communications of Philippines Selects Guardt...
 
Contractor Exposed Manufacturer's Sensitive Data
Contractor Exposed Manufacturer's Sensitive DataContractor Exposed Manufacturer's Sensitive Data
Contractor Exposed Manufacturer's Sensitive Data
 
2016 01-05 csr css non-confidential slide deck
2016 01-05 csr  css non-confidential slide deck2016 01-05 csr  css non-confidential slide deck
2016 01-05 csr css non-confidential slide deck
 
Presentation Deck Dec.pdf
Presentation Deck Dec.pdfPresentation Deck Dec.pdf
Presentation Deck Dec.pdf
 
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachCloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 

More from Strategic Business & IT Services

Unitary Developmental Theory Elaborated for all human systems
Unitary Developmental Theory Elaborated for all human systemsUnitary Developmental Theory Elaborated for all human systems
Unitary Developmental Theory Elaborated for all human systems
Strategic Business & IT Services
 
Digital Transformation & Improvement Pocketbook
Digital Transformation & Improvement PocketbookDigital Transformation & Improvement Pocketbook
Digital Transformation & Improvement Pocketbook
Strategic Business & IT Services
 
Introduction to Unitary Developmental Theory & Application
Introduction to Unitary Developmental Theory & ApplicationIntroduction to Unitary Developmental Theory & Application
Introduction to Unitary Developmental Theory & Application
Strategic Business & IT Services
 
Overview of The Organization Maturity Index
Overview of The Organization Maturity IndexOverview of The Organization Maturity Index
Overview of The Organization Maturity Index
Strategic Business & IT Services
 
Introduction to UDT and its application 061222.pdf
Introduction to UDT and its application 061222.pdfIntroduction to UDT and its application 061222.pdf
Introduction to UDT and its application 061222.pdf
Strategic Business & IT Services
 
Transformation, Chanhe and Improvement Newsletter July 2021
Transformation, Chanhe and Improvement Newsletter July 2021Transformation, Chanhe and Improvement Newsletter July 2021
Transformation, Chanhe and Improvement Newsletter July 2021
Strategic Business & IT Services
 
Building intrinsic organisation resilience 2021
Building intrinsic organisation resilience 2021Building intrinsic organisation resilience 2021
Building intrinsic organisation resilience 2021
Strategic Business & IT Services
 
Organisation Resilience in times of disruption study 2021
Organisation Resilience in times of disruption study 2021Organisation Resilience in times of disruption study 2021
Organisation Resilience in times of disruption study 2021
Strategic Business & IT Services
 
Transformation, Change & Improvement Newsletter Q1-2021
Transformation, Change & Improvement Newsletter Q1-2021Transformation, Change & Improvement Newsletter Q1-2021
Transformation, Change & Improvement Newsletter Q1-2021
Strategic Business & IT Services
 
Situational Leadership, Organisation Maturity & Culture
Situational Leadership, Organisation Maturity & CultureSituational Leadership, Organisation Maturity & Culture
Situational Leadership, Organisation Maturity & Culture
Strategic Business & IT Services
 
What are capability maturity models & why are they Important?
What are capability maturity models & why are they Important?What are capability maturity models & why are they Important?
What are capability maturity models & why are they Important?
Strategic Business & IT Services
 
Organisation, Team & Digital Assessment process
Organisation, Team & Digital Assessment process Organisation, Team & Digital Assessment process
Organisation, Team & Digital Assessment process
Strategic Business & IT Services
 
Odti newsletter dec 2020 release
Odti newsletter dec 2020 release Odti newsletter dec 2020 release
Odti newsletter dec 2020 release
Strategic Business & IT Services
 
Organisation change readiness assessment paper
Organisation change readiness assessment paper Organisation change readiness assessment paper
Organisation change readiness assessment paper
Strategic Business & IT Services
 
ODTI newsletter oct 2020
ODTI newsletter oct 2020 ODTI newsletter oct 2020
ODTI newsletter oct 2020
Strategic Business & IT Services
 
The new world of work securing the crisis gains & adapting
The new world of work securing the crisis gains & adaptingThe new world of work securing the crisis gains & adapting
The new world of work securing the crisis gains & adapting
Strategic Business & IT Services
 
How digital can enable continuous innovation 2nd edition 130520
How digital can enable continuous innovation 2nd edition 130520How digital can enable continuous innovation 2nd edition 130520
How digital can enable continuous innovation 2nd edition 130520
Strategic Business & IT Services
 
Achieving the best possible organisation crisis outcome (New Normal)
Achieving the best possible organisation crisis outcome (New Normal)Achieving the best possible organisation crisis outcome (New Normal)
Achieving the best possible organisation crisis outcome (New Normal)
Strategic Business & IT Services
 
Organisation Culture Change Masterclass
Organisation Culture Change MasterclassOrganisation Culture Change Masterclass
Organisation Culture Change Masterclass
Strategic Business & IT Services
 
Organisation Culture Change Masterclass
Organisation Culture Change MasterclassOrganisation Culture Change Masterclass
Organisation Culture Change Masterclass
Strategic Business & IT Services
 

More from Strategic Business & IT Services (20)

Unitary Developmental Theory Elaborated for all human systems
Unitary Developmental Theory Elaborated for all human systemsUnitary Developmental Theory Elaborated for all human systems
Unitary Developmental Theory Elaborated for all human systems
 
Digital Transformation & Improvement Pocketbook
Digital Transformation & Improvement PocketbookDigital Transformation & Improvement Pocketbook
Digital Transformation & Improvement Pocketbook
 
Introduction to Unitary Developmental Theory & Application
Introduction to Unitary Developmental Theory & ApplicationIntroduction to Unitary Developmental Theory & Application
Introduction to Unitary Developmental Theory & Application
 
Overview of The Organization Maturity Index
Overview of The Organization Maturity IndexOverview of The Organization Maturity Index
Overview of The Organization Maturity Index
 
Introduction to UDT and its application 061222.pdf
Introduction to UDT and its application 061222.pdfIntroduction to UDT and its application 061222.pdf
Introduction to UDT and its application 061222.pdf
 
Transformation, Chanhe and Improvement Newsletter July 2021
Transformation, Chanhe and Improvement Newsletter July 2021Transformation, Chanhe and Improvement Newsletter July 2021
Transformation, Chanhe and Improvement Newsletter July 2021
 
Building intrinsic organisation resilience 2021
Building intrinsic organisation resilience 2021Building intrinsic organisation resilience 2021
Building intrinsic organisation resilience 2021
 
Organisation Resilience in times of disruption study 2021
Organisation Resilience in times of disruption study 2021Organisation Resilience in times of disruption study 2021
Organisation Resilience in times of disruption study 2021
 
Transformation, Change & Improvement Newsletter Q1-2021
Transformation, Change & Improvement Newsletter Q1-2021Transformation, Change & Improvement Newsletter Q1-2021
Transformation, Change & Improvement Newsletter Q1-2021
 
Situational Leadership, Organisation Maturity & Culture
Situational Leadership, Organisation Maturity & CultureSituational Leadership, Organisation Maturity & Culture
Situational Leadership, Organisation Maturity & Culture
 
What are capability maturity models & why are they Important?
What are capability maturity models & why are they Important?What are capability maturity models & why are they Important?
What are capability maturity models & why are they Important?
 
Organisation, Team & Digital Assessment process
Organisation, Team & Digital Assessment process Organisation, Team & Digital Assessment process
Organisation, Team & Digital Assessment process
 
Odti newsletter dec 2020 release
Odti newsletter dec 2020 release Odti newsletter dec 2020 release
Odti newsletter dec 2020 release
 
Organisation change readiness assessment paper
Organisation change readiness assessment paper Organisation change readiness assessment paper
Organisation change readiness assessment paper
 
ODTI newsletter oct 2020
ODTI newsletter oct 2020 ODTI newsletter oct 2020
ODTI newsletter oct 2020
 
The new world of work securing the crisis gains & adapting
The new world of work securing the crisis gains & adaptingThe new world of work securing the crisis gains & adapting
The new world of work securing the crisis gains & adapting
 
How digital can enable continuous innovation 2nd edition 130520
How digital can enable continuous innovation 2nd edition 130520How digital can enable continuous innovation 2nd edition 130520
How digital can enable continuous innovation 2nd edition 130520
 
Achieving the best possible organisation crisis outcome (New Normal)
Achieving the best possible organisation crisis outcome (New Normal)Achieving the best possible organisation crisis outcome (New Normal)
Achieving the best possible organisation crisis outcome (New Normal)
 
Organisation Culture Change Masterclass
Organisation Culture Change MasterclassOrganisation Culture Change Masterclass
Organisation Culture Change Masterclass
 
Organisation Culture Change Masterclass
Organisation Culture Change MasterclassOrganisation Culture Change Masterclass
Organisation Culture Change Masterclass
 

Recently uploaded

By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 

Recently uploaded (20)

By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 

The relevance of Digital content in SOX compliance

  • 1. Digital Content & Sox compliance SOX The Sarbanes–Oxley Act of 2002 was put in place by the US government to protect investors in public companies following a series of corporate and accounting scandals perpetrated in the late 90’s and early 00’s which included Enron, Tyco International, Adelphia, Peregrine Systems and WorldCom. These scandals, which cost investors billions of dollars when the share prices of affected companies collapsed, shook public confidence in the nation's securities markets. Much has been written about these scandals and also SOX and what is now required of Public Companies and their stakeholders to secure societies confidence in the Markets and keep corporate officers and employees out of jail. This piece concerns itself with a specific set of challenges relating to Digital Content used in a public company or for that matter any company. Section 404, 802 & Digital Content Section 404 of the Act “Assessment of Internal Controls” & Section 802 “Criminal Penalties for influencing US Agency Investigation” are key sections relating to the effectiveness of the act and the actions and processes public companies must take or put in place. In particular section 404 is concerned with the prevention and detection of fraud and error and the adequacy of controls required. The integrity, authenticity and provenance of digital content (data, text, Audio, Video etc.) must be secured and be non repudiable. We know that digital content is much easier to change than paper based content and public companies must find cost effective solutions to assure trust and confidence in their management and control of Digital content. Section 404 focuses on content authenticity and integrity Section 802: “ Whoever knowingly alters, destroys, mutilates, conceals, covers up, falsifies, or makes a false entry in any record, document, or tangible object with the intent to impede, obstruct, or influence the investigation or proper administration of any matter within the jurisdiction of any department or agency of the United States or any case filed under title 11, or in relation to or contemplation of any such matter or case, shall be fined under this title, imprisoned not more than 20 years, or both”. This brings home the importance of being able to identify fraudulent, malicious or even just simple errors that may be part of an audit or evidential chain and required to establish trust and confidence in digital data/content. Section 802 in addition to the focus above in section 404 also brings attention to the history and flows of the digital content. How can public companies identify and prevent fraud or error in their digital content cost effectively? 1. Identify & List the company’s digital assets (versions, time lines etc.) 2. Perform a Risk analysis and identify those critical digital assets 3. Identify those critical digital content types and forms that must be protected and controlled through their life cycle. Sample critical Digital Assets  Contractual documentation  Policy & Procedure documents and records  Intellectual Property  Trademarks and copyright  Financial reports  HR& employee records  Performance Management records  Software applications  Software logs  Databases  Recorded telephone conversations  Recorded conference calls(Audio/Video) www.digiprove.com ©Digiprove Feb 2012
  • 2. Digital Content & Sox compliance  Images, Photographs, Videos Identify& implement appropriate software controls as a solution to the digital content/asset protection such as Digiprove. What are the core features that a simple software solution must have?  Establish the authenticity and integrity of digital content on entry into the company’s digital world whether created within that world or entering externally whether it be via an electronic communications or scanned solution. (This can be achieved by creating a unique digital fingerprint of the content and meta data such as date, time, location, ownership)  Maintain full confidentiality of this digital content in that it does not get sent externally outside the companies own controlled digital world to be certified.  Create an audit trail for the defined digital content and any actions taken on that content.  Be able to verify the provenance of any digital content once it has been certified and verify if it has been tampered with. Digiprove products tick all the boxes: Selfprotect – a simple SaaS on-line service for content and communications Autoprotect – a simple background utility that automatically protects the identified files and folders. Completeprotect – includes digital log event certification and audit trail along with autoprotected content. (New Product) Signasure – enables and protects documents with all types of digital signatures (New Product) Brokerprove – A standalone solution for SME professional service providers Embedprotect – A software developer’s kit that enables Digiprove technology to be quickly integrated into a company’s business applications www.digiprove.com ©Digiprove Feb 2012