Small Business Working Group. Charter

Size: px
Start display at page:

Download "Small Business Working Group. Charter"

Transcription

1 Small Business Working Group Charter March 2013

2 2013 Cloud Security Alliance All Rights Reserved All rights reserved. You may download, store, display on your computer, view, print, and link to the Cloud Security Alliance SBWG Charter at subject to the following: (a) the Charter may be used solely for your personal, informational, non-commercial use; (b) the Charter may not be modified or altered in any way; (c) the Charter may not be redistributed; and (d) the trademark, copyright or other notices may not be removed. You may quote portions of the Charter as permitted by the Fair Use provisions of the United States Copyright Act, provided that you attribute the portions to the Cloud Security Alliance SBWG Charter (2013) Cloud Security Alliance - All Rights Reserved 2

3 Contents 1.0 Working Group Executive Overview Working Group Structure, Scope and Deliverables Peer Review Deliverables Infrastructure & Resource Requirements Communications Methods Duration Cloud Security Alliance - All Rights Reserved 3

4 1.0 Working Group Executive Overview Small businesses (1-49 employees as defined by EU 1 ) are the bloodline of world economy. In the EU, the small businesses represent 97% of all registered companies. Cloud Security Alliance produced its Security Guidance for Critical Areas of Focus in Cloud Computing V3. While the information contained therein is pivotal in establishing best practices, at 177 pages, the Guidance is a rather lengthy reading. Small businesses typically do not have dedicated IT staff that can fully leverage the knowledge base produced by CSA in the Guidance and other documents produced by CSA working groups. Yet small businesses are more likely to have use cloud services without sufficient knowledge of security risks and requirements. Without fully understanding how cloud security affects small business processes, many companies may be unpleasantly surprised when things go wrong. That is not to say that cloud computing should be avoided by small businesses, rather it should be embraced, with full knowledge of the risks and rewards. In fact, businesses greatly benefit from the service model provided by cloud computing, as it lowers barriers to the market by not requiring large up-front investments (CAPEX), which is especially important in light of restricted business lending. Additionally, cloud providers have been selective in adapting their services to large companies, while small companies have to settle with standard terms and conditions (T&C). This leaves small companies vulnerable to large cloud players and further endangers small business survival, if things go wrong. This working group will focus on providing tailored guidance to small business, will cooperate with other working groups where appropriate, and will help cloud providers understand small business requirements. 2.0 Working Group Structure, Scope and Deliverables We would like to run the project in three main CSA regions: EMEA Americas Asia pack The Small Business Working Groups (SBWG) should be created in each of the regions, beginning with EMEA. The scope of SBWG will include the following topics: Create a small business version of the CSA Guidance 1 Definition of the EU can be found here: Cloud Security Alliance - All Rights Reserved 4

5 Create awareness material related to cloud security that can be readily used by small businesses (an equivalent of Trip Advisor for cloud computing) The working group will feed into other CSA working groups as identified in the initial phase and will suggest changes to CSA documents, such as CCM and CAI, to support small business better. Deliverables will be governed by CSA s intellectual property rights policy. 2.1 Peer Review We will seek CSA s help in reaching out to peers for reviewing our charter. 2.2 Deliverables Q Organize a series of online workshops to discuss small business cloud requirements and perception of current cloud alliance guidance. This can be achieved by contacting small business interest groups in the regions, preparing questionnaire and organizing online sessions to gather further feedback from small businesses. Analyze existing Cloud Security Alliance workgroups and identify where small business related input is required. Q Analyze responses from small businesses and organize online sessions with CSA project members to produce small business guidance document, draft version. The EMEA region working group will meet during CSA EMEA congress in September Q Finalize small business cloud guidance documents. It is expected that the document will include a main section that covers global aspects and sections for each region or even countries where local specifics require granular level of guidance. 3.0 Infrastructure & Resource Requirements The working groups will be composed of CSA volunteers; these will have a steering committee and co-chairs. Working groups will require typical project management, online workspace and technical writing assistance. Chairs of the working groups from all regions will ensure that the work produced by one working group is considered and can be reused by others. 3.1 Communications Methods We will utilize bi-weekly phone calls and online collaboration Cloud Security Alliance - All Rights Reserved 5

6 3.2 Duration The EMEA working group will operate until Q for its chartered deliverables, and at that time will consider charter renewal Cloud Security Alliance - All Rights Reserved 6

Incident Management & Forensics Working Group. Charter

Incident Management & Forensics Working Group. Charter Incident Management & Forensics Working Group Charter February 2013 2013 Cloud Security Alliance All Rights Reserved All rights reserved. You may download, store, display on your computer, view, print,

More information

CSA Position Paper on AICPA Service Organization Control Reports

CSA Position Paper on AICPA Service Organization Control Reports CSA Position Paper on AICPA Service Organization Control Reports February 2013 2013, Cloud Security Alliance. All rights reserved. You may download, store, display on your computer, view, print, and link

More information

2015 Cloud Security Alliance All Rights Reserved

2015 Cloud Security Alliance All Rights Reserved How Cloud Being How Cloud is is Being Used Used in in the Financial Sector: the Financial Sector: Survey Report Survey Report March 2015 February 2015 2015 Cloud Security Alliance All Rights Reserved All

More information

Cloud Adoption Practices & Priorities Survey Report

Cloud Adoption Practices & Priorities Survey Report Cloud Adoption Practices & Priorities Survey Report January 2015 2015 Cloud Security Alliance All Rights Reserved All rights reserved. You may download, store, display on your computer, view, print, and

More information

Cloud Usage: Risks and Opportunities Report. September 2014

Cloud Usage: Risks and Opportunities Report. September 2014 Cloud Usage: Risks and Opportunities Report September 2014 2014 Cloud Security Alliance All Rights Reserved All rights reserved. You may download, store, display on your computer, view, print, and link

More information

Software Defined Perimeter Working Group. SDP Hackathon Whitepaper

Software Defined Perimeter Working Group. SDP Hackathon Whitepaper Software Defined Perimeter Working Group SDP Hackathon Whitepaper April 2014 2014 Cloud Security Alliance All Rights Reserved. All rights reserved. You may download, store, display on your computer, view,

More information

IDENTITY SOLUTIONS: Security Beyond the Perimeter

IDENTITY SOLUTIONS: Security Beyond the Perimeter IDENTITY SOLUTIONS: Security Beyond the Perimeter 2016 Cloud Security Alliance All Rights Reserved All rights reserved. You may download, store, display on your computer, view, print, and link to the Cloud

More information

Centrify Server Suite Health Check

Centrify Server Suite Health Check CENTRIFY OPERATIONS HEALTH CHECK OVERVIEW Centrify Server Suite Health Check Summary Have you ever wondered if your organization is using Centrify s solution to the fullest potential? At Centrify, we take

More information

GRC Stack Research Sponsorship

GRC Stack Research Sponsorship GRC Stack Research Sponsorship Overview Achieving Governance, Risk Management and Compliance (GRC) goals requires appropriate assessment criteria, relevant control objectives and timely access to necessary

More information

Cloud Security Benchmark: Top 10 Cloud Service Providers Appendix A E January 5, 2015

Cloud Security Benchmark: Top 10 Cloud Service Providers Appendix A E January 5, 2015 Cloud Security Benchmark: Top 10 Cloud Service Providers Appendix A E January 5, 2015 2015 CloudeAssurance Page 1 Table of Contents Copyright and Disclaimer... 3 Appendix A: Introduction... 4 Appendix

More information

Cloud & Trust. Dr. Jesus Luna, CSA Research Director EMEA. Copyright 2014 Cloud Security Alliance. www.cloudsecurityalliance.org

Cloud & Trust. Dr. Jesus Luna, CSA Research Director EMEA. Copyright 2014 Cloud Security Alliance. www.cloudsecurityalliance.org Cloud & Trust Dr. Jesus Luna, CSA Research Director EMEA Copyright 2014 Cloud Security Alliance Enter the cloud The cloud can deliver a net gain of 2.5 million new European jobs, and an annual boost of

More information

Service Modelling & Service Architecture:

Service Modelling & Service Architecture: Service Modelling & Service Architecture: From Service Renewal and Service Flows to Service Architecture Presenter: Professor Paul Buhler Head of the Global University Alliance SOA Research & Development

More information

Cloud Security Benchmark: Top 10 Cloud Service Providers Executive Summary January 5, 2015

Cloud Security Benchmark: Top 10 Cloud Service Providers Executive Summary January 5, 2015 Cloud Security Benchmark: Top 10 Cloud Service Providers Executive Summary January 5, 2015 2015 CloudeAssurance Page 1 Table of Contents Copyright and Disclaimer... 3 Results: Top 10 Cloud Service Providers

More information

Cybersecurity and the Connected Home CABA Connected Home Council (CHC) Landmark Research 2015

Cybersecurity and the Connected Home CABA Connected Home Council (CHC) Landmark Research 2015 TERMS OF REFERENCE/PROSPECTUS Cybersecurity and the Connected Home CABA Connected Home Council (CHC) Landmark Research 2015 1. BACKGROUND The Continental Automated Buildings Association (CABA) is an industry

More information

OPEN DATA CENTER ALLIANCE SM CLOUD ADOPTION SURVEY

OPEN DATA CENTER ALLIANCE SM CLOUD ADOPTION SURVEY OPEN DATA CENTER ALLIANCE SM CLOUD ADOPTION SURVEY 2014 TABLE OF CONTENTS 3 Legal Notice 5 Executive Summary 5 ODCA Members Respond to Survey on Data Center Practices and Plans 6 Methodology 6 Growth in

More information

Robert Brammer. Senior Advisor to the Internet2 CEO rfbtech@internet2.edu. Internet2 NET+ Security Assessment Forum. 8 April 2014

Robert Brammer. Senior Advisor to the Internet2 CEO rfbtech@internet2.edu. Internet2 NET+ Security Assessment Forum. 8 April 2014 Robert Brammer Senior Advisor to the Internet2 CEO rfbtech@internet2.edu Internet2 NET+ Security Assessment Forum 8 April 2014 INTERNET2 NET+ Security Initiative Primary objective -- develop guidance to

More information

G-Cloud II Services Service Definition Accenture Cloud SaaS Implementation Services Google Apps

G-Cloud II Services Service Definition Accenture Cloud SaaS Implementation Services Google Apps G-Cloud II Services Service Definition Accenture Cloud SaaS Implementation Services Google Apps 1 Table of Contents 1. Scope of our Services... 3 2. Approach... 4 3. Assets and Tools... 5 4. Outcomes...

More information

Cloud Data Governance Research Sponsorship

Cloud Data Governance Research Sponsorship Cloud Data Governance Research Sponsorship Overview Cloud Computing marks the decrease in emphasis on 'systems' and the increase in emphasis on 'data'. With this trend, Cloud Computing stakeholders need

More information

Open Certification Framework. Vision Statement

Open Certification Framework. Vision Statement Open Certification Framework Vision Statement Jim Reavis and Daniele Catteddu August 2012 BACKGROUND The Cloud Security Alliance has identified gaps within the IT ecosystem that are inhibiting market adoption

More information

ZIMPERIUM, INC. END USER LICENSE TERMS

ZIMPERIUM, INC. END USER LICENSE TERMS ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side

More information

Health Communication for Diabetes Programs Personal Capacity Assessment

Health Communication for Diabetes Programs Personal Capacity Assessment Health Communication for Diabetes Programs Needs Assessment Thank you for registering to attend the Health Communication for Diabetes Programs course at the 2011 Institute. We are looking forward to working

More information

G-Cloud II Services Service Definition Accenture Cloud PaaS Implementation Services AWS Beanstalk

G-Cloud II Services Service Definition Accenture Cloud PaaS Implementation Services AWS Beanstalk G-Cloud II Services Service Definition Accenture Cloud PaaS Implementation Services AWS Beanstalk 1 Table of Contents 1. Scope of our Services... 3 2. Approach... 3 3. Assets and Tools... 4 4. Outcomes...

More information

Big Data Working Group. Comment on Big Data and the Future of Privacy

Big Data Working Group. Comment on Big Data and the Future of Privacy Big Data Working Group Comment on Big Data and the Future of Priacy March 2014 2014 Cloud Security Alliance All Rights Resered All rights resered. You may download, store, display on your computer, iew,

More information

G-Cloud IV Services Service Definition Accenture Cloud Security Services

G-Cloud IV Services Service Definition Accenture Cloud Security Services G-Cloud IV Services Service Definition Accenture Cloud Security Services 1 Table of contents 1. Scope of our services... 3 2. Approach... 3 3. Assets and tools... 4 4. Capabilities... 5 5. Expected Outcomes...

More information

Intelligent Buildings and Cybersecurity CABA Intelligent & Integrated Buildings Council (IIBC) Landmark Research 2015

Intelligent Buildings and Cybersecurity CABA Intelligent & Integrated Buildings Council (IIBC) Landmark Research 2015 TERMS OF REFERENCE/PROSPECTUS Intelligent Buildings and Cybersecurity CABA Intelligent & Integrated Buildings Council (IIBC) Landmark Research 2015 1. BACKGROUND The Continental Automated Buildings Association

More information

AIB Graduate Account. Supporting you on the road to success. Drop in to any branch 1890 788 336 www.aib.ie

AIB Graduate Account. Supporting you on the road to success. Drop in to any branch 1890 788 336 www.aib.ie AIB Graduate Account Supporting you on the road to success. Drop in to any branch 1890 788 336 www.aib.ie Contents 01 Introduction 02 How it works 04 AIB Phone, Internet & Tablet Banking 06 AIB Mobile

More information

Table of contents. Best practices in open source governance. Managing the selection and proliferation of open source software across your enterprise

Table of contents. Best practices in open source governance. Managing the selection and proliferation of open source software across your enterprise Best practices in open source governance Managing the selection and proliferation of open source software across your enterprise Table of contents The importance of open source governance... 2 Executive

More information

Big Data Research Sponsorship

Big Data Research Sponsorship Big Data Research Sponsorship Overview The term Big Data refers to the massive amounts of digital information companies and governments collect about us and our surroundings. Providing security and privacy

More information

TERMS OF REFERENCE FOR INDIVIDUAL CONTRACTORS/ CONSULTANTS

TERMS OF REFERENCE FOR INDIVIDUAL CONTRACTORS/ CONSULTANTS TERMS OF REFERENCE FOR INDIVIDUAL CONTRACTORS/ CONSULTANTS Title of Assignment Location Duration An individual consultant to support the production of a training module and a video tutorial for youth-led

More information

Service Definition: Agile Business Services

Service Definition: Agile Business Services Service Definition: Service Definition: Description: Sogeti s offers a tailored approach to agile support whether you need help with agile development, testing, or both. Our comprehensive coaching and

More information

Blackboard Learn 9.1 Last updated: May 2010

Blackboard Learn 9.1 Last updated: May 2010 Blackboard Learn 9.1 Last updated: May 2010 2010 Blackboard Inc. All rights reserved. The content of this manual may not be reproduced or distributed without the express written consent of Blackboard Inc.

More information

PROPOSED FINAL DRAFT. Revised under the Auspices of the ICOMOS International Scientific Committee on Interpretation and Presentation.

PROPOSED FINAL DRAFT. Revised under the Auspices of the ICOMOS International Scientific Committee on Interpretation and Presentation. The ICOMOS Charter for the Interpretation and Presentation of Cultural Heritage Sites PROPOSED FINAL DRAFT Revised under the Auspices of the ICOMOS International Scientific Committee on Interpretation

More information

Security as a Service Working Group. November 2015

Security as a Service Working Group. November 2015 Security as a Service Working Group November 2015 Agenda What is SecaaS? Who are we? Brief history Categories Where are we today? plans and charter What s next? Discussion Any Questions? How can you help?

More information

The Johns Hopkins University Human Resources Competency Dictionary

The Johns Hopkins University Human Resources Competency Dictionary The Johns Hopkins University Human Resources Competency Dictionary JHU Human Resources Competencies (Applies to All HR Functional Areas) Business Partnership and Consultation Ethics and values Decision

More information

Madison Advisors 2016 Research Overview

Madison Advisors 2016 Research Overview Madison Advisors 2016 Research Overview Copyright 2016 Madison Advisors, Inc. All Rights Reserved. All other product names are trade and service marks of their respective companies. This publication and

More information

Cloud Security Alliance: Industry Efforts to Secure Cloud Computing

Cloud Security Alliance: Industry Efforts to Secure Cloud Computing Cloud Security Alliance: Industry Efforts to Secure Cloud Computing Jim Reavis, Executive Director September, 2010 Cloud: Dawn of a New Age Art Coviello - the most overhyped, underestimated phenomenon

More information

Intelligent Buildings and Big Data CABA Intelligent & Integrated Buildings Council (IIBC) Landmark Research 2014

Intelligent Buildings and Big Data CABA Intelligent & Integrated Buildings Council (IIBC) Landmark Research 2014 Intelligent Buildings and Big Data CABA Intelligent & Integrated Buildings Council (IIBC) Landmark Research 2014 1. BACKGROUND The Continental Automated Buildings Association (CABA) is an industry association

More information

Web Application Hosting Cloud Architecture

Web Application Hosting Cloud Architecture Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described

More information

OpenText Information Exchange (IX) Professional Services

OpenText Information Exchange (IX) Professional Services OpenText Information Exchange (IX) Professional Services Solutions Maintenance Program Handbook January 2014 (Version 1.1) Handbook IX Solutions Maintenance Program 1. Introduction Welcome to OpenText

More information

PAYDAY LENDING MARKET INVESTIGATION. Summary of a response hearing with money.co.uk held on Wednesday 23 July 2014

PAYDAY LENDING MARKET INVESTIGATION. Summary of a response hearing with money.co.uk held on Wednesday 23 July 2014 PAYDAY LENDING MARKET INVESTIGATION Summary of a response hearing with money.co.uk held on Wednesday 23 July 2014 Background to money.co.uk 1. money.co.uk was established in 2008. It offers a comparison

More information

Using computers to enhance the lives of those with aphasia

Using computers to enhance the lives of those with aphasia Using computers to enhance the lives of those with aphasia Booklet 10 Email read, send, reply, reply all, forward and delete Acknowledgements This project was funded by the Long Term Conditions Alliance

More information

The CIO of the Future Research Report

The CIO of the Future Research Report The CIO of the Future Research Report Becoming a Business Game-Changer Share This Report The CIO of the Future: Becoming a Business Game-Changer While most CIOs agree that their role will change in the

More information

Terms of Business. The Detective Agency

Terms of Business. The Detective Agency Terms of Business Terms of Business following Terms and Conditions of Service apply to all products and services provided by Limited (hereinafter referred to as ). All work is carried out by on the understanding

More information

Agreement For Trainee Position At [Company Name]

Agreement For Trainee Position At [Company Name] Agreement For Trainee Position At [Company Name] Purpose The purpose of the Trainee Agreement is to identify the skill, trade or occupation for which the trainee is being trained and confirm the qualifying

More information

Telling a New Story about Calgary s Children, Youth, and Community

Telling a New Story about Calgary s Children, Youth, and Community UWC Toolkit - Sample Introductory Speech 1 Telling a New Story about Calgary s Children, Youth, and Community V. SAMPLE INTRODUCTORY SPEECH This short introductory speech provides an illustration of how

More information

Law Firm Professional Services Outsourcing White Paper

Law Firm Professional Services Outsourcing White Paper Law Firm Professional Services Outsourcing White Paper January 2010 prepared by: Access/Information, Inc. 234 Columbine Street Suite 310 Denver, Colorado 80206 303-778-7677 Copyright 2010 Access/Information,

More information

Requirements Workshop Work Breakdown Structure

Requirements Workshop Work Breakdown Structure Requirements Workshop Work Breakdown Structure Reference Introduction to Part II in Requirements by Collaboration by Ellen Gottesdiener, Addison-Wesley, 2002. Phase 1: Plan Stage 1: Define Workshop Purpose

More information

Need to reassure customers that your cloud services are secure? Inspire confidence with STAR Certification from BSI

Need to reassure customers that your cloud services are secure? Inspire confidence with STAR Certification from BSI Need to reassure customers that your cloud services are secure? Inspire confidence with STAR Certification from BSI What is STAR Certification? TM STAR Certification is a unique new certification which

More information

Call or Visit us Today 800.263.0940 www.altep.com. sponsors 2007-2010

Call or Visit us Today 800.263.0940 www.altep.com. sponsors 2007-2010 Topic Pack: Forming a Lasting Strategic Partnership With Your E-Discovery Provider Call or Visit us Today 800.263.0940 www.altep.com sponsors 2007-2010 Consulting Forensics Paper Discovery Electronic Discovery

More information

Copyright and PhD Theses

Copyright and PhD Theses This handout is aimed at providing general information to PhD candidates about copyright as it relates to doctoral theses. Information is provided especially on the issues of making a thesis available

More information

Copyright 2013 wolfssl Inc. All rights reserved. 2

Copyright 2013 wolfssl Inc. All rights reserved. 2 - - Copyright 2013 wolfssl Inc. All rights reserved. 2 Copyright 2013 wolfssl Inc. All rights reserved. 2 Copyright 2013 wolfssl Inc. All rights reserved. 3 Copyright 2013 wolfssl Inc. All rights reserved.

More information

BENEFITS REALIZATION ENSURES CHANGE DELIVERS GREATER BUSINESS VALUE

BENEFITS REALIZATION ENSURES CHANGE DELIVERS GREATER BUSINESS VALUE BENEFITS REALIZATION ENSURES CHANGE DELIVERS GREATER BUSINESS VALUE Focusing on the delivery of value-adding benefits is an excellent way to achieve greater ROI from change. Benefits & Value Management

More information

Software Maintenance and Support Services TECHNICAL SERVICES

Software Maintenance and Support Services TECHNICAL SERVICES Software Maintenance and TECHNICAL SERVICES Software Maintenance and Software Maintenance and Perceptive Software s Software Maintenance and Agreement, or SMSA, is a vital part of every customer relationship

More information

IT Services Management

IT Services Management IT Services Management Developing an Effective ITSM Communications Plan White Paper Prepared by: Rick Leopoldi May 25, 2002 Copyright 2002. All rights reserved. Duplication of this document or extraction

More information

Need to reassure customers that your cloud services are secure? Inspire confidence with STAR Certification from BSI

Need to reassure customers that your cloud services are secure? Inspire confidence with STAR Certification from BSI Need to reassure customers that your cloud services are secure? Inspire confidence with STAR Certification from BSI What is STAR Certification? TM STAR Certification differentiates you from your competition.

More information

IMPORTANT IT IS DEAMED THAT YOU HAVE READ AND AGREE TO ALL TERMS & CONDITIONS BEFORE USING THIS WEBSITE.

IMPORTANT IT IS DEAMED THAT YOU HAVE READ AND AGREE TO ALL TERMS & CONDITIONS BEFORE USING THIS WEBSITE. Terms & conditions for the use of this Website IMPORTANT IT IS DEAMED THAT YOU HAVE READ AND AGREE TO ALL TERMS & CONDITIONS BEFORE USING THIS WEBSITE. By using this website you are deemed to have full

More information

Agenda 4/21/2015. Evelyn de Souza Chair Cloud Security Alliance Data Governance Chair/ Data Privacy and Compliance Leader Cisco Systems

Agenda 4/21/2015. Evelyn de Souza Chair Cloud Security Alliance Data Governance Chair/ Data Privacy and Compliance Leader Cisco Systems Evelyn de Souza Chair Cloud Security Alliance Data Governance Chair/ Data Privacy and Compliance Leader Cisco Systems Cloud Security Alliance, 2015 Agenda Charter /Members What is Data Governance Data

More information

Operational Risk Management for Energy Companies

Operational Risk Management for Energy Companies Energy Risk magazine presents David Hirst on Operational Risk Management for Energy Companies Led by David Hirst, Director, Ainsty Risk Consulting Ltd incisive-training.com/opriskenergy About the course

More information

One Source...Many Resources Making HR & Benefits Easy

One Source...Many Resources Making HR & Benefits Easy HR, BENEFITS, & PAYROLL TECHNOLOGY MODEL FLEXIBLE HR, BENEFITS, & PAYROLL SOLUTIONS CO-SOURCED TO ENSURE SUCCESS HR, Benefits, & Payroll Consulting Consultation to identify new technologies that are available

More information

What the Financial & Insurance Industries Can Learn from Retailers

What the Financial & Insurance Industries Can Learn from Retailers What the Financial & Insurance Industries Can Learn from Retailers 1 Retailers have long understood that personalization is a strong business driver that helps them market to their customers with more

More information

FINANCIAL REPORTING COUNCIL GUIDANCE ON BOARD EFFECTIVENESS

FINANCIAL REPORTING COUNCIL GUIDANCE ON BOARD EFFECTIVENESS FINANCIAL REPORTING COUNCIL GUIDANCE ON BOARD EFFECTIVENESS MARCH 2011 Contents Paragraph Numbers Preface The Role of the Board and Directors 1.1 1.23 An Effective Board 1.1 1.3 The Role of the Chairman

More information

Introduction The Co-Motion Data Management Plan draws upon guidance from the Centre for Housing Policy s Data

Introduction The Co-Motion Data Management Plan draws upon guidance from the Centre for Housing Policy s Data Co-Motion: Data Management Plan Design for Wellbeing: Ageing and Mobility in the Built Environment EPSRC Grant Reference: EP/K03748X/1 Principal Investigator: Dr Mark Bevan Contact Project Manager: co-motion@york.ac.uk

More information

11/3/2014 9:30 AM - 11:30 AM

11/3/2014 9:30 AM - 11:30 AM Lean & Mean Presented by Cheryl M. Jekiel CM01 11/3/2014 9:30 AM - 11:30 AM The handouts and presentations attached are copyright and trademark protected and provided for individual use only. Ways to become

More information

หล กการจ าแนกประเภทรายจ ายตามงบประมาณ

หล กการจ าแนกประเภทรายจ ายตามงบประมาณ กร ณาด รายละเอ ยด งบบ คลากร ท ม การปร บปร ง ตามหน งส อสาน กงบประมาณ ท นร 0702/ว 45 ลงว นท 25 ม.ค. 2547 เร อง การปร บปร งหล กการจาแนกประเภทรายจ ายตามงบประมาณ ประกอบด วย หล กการจ าแนกประเภทรายจ ายตามงบประมาณ

More information

Post-Implementation Review

Post-Implementation Review Table of Contents 1. Post Implementation Review ()... 1 1.1. What is a Post Implementation Review?...1 1.2. Why is the Used?... 1 1.3. Where does a fit in?... 2 1.4. What constitutes the process?... 2

More information

Why are Companies in the EU Adopting More and More Cloud-Based Security Solutions? François GRATIOLET, Qualys Inc., CSO EMEA

Why are Companies in the EU Adopting More and More Cloud-Based Security Solutions? François GRATIOLET, Qualys Inc., CSO EMEA Why are Companies in the EU Adopting More and More Cloud-Based Security Solutions? François GRATIOLET, Qualys Inc., CSO EMEA 2 Agenda What is the cloud business value? What about the SecaaS? Why companies

More information

Move your CAD to the Cloud

Move your CAD to the Cloud Move your CAD to the Cloud You know that it would be smart to move your CAD files to a place where everyone can access them, from anywhere. The Cloud makes that possible for your company. Who wouldn t

More information

Opportunity Registration Program Guide

Opportunity Registration Program Guide Opportunity Registration Program Guide Table of Contents Citrix Opportunity Registration Program Summary... 2 Opportunity Registration Program Details... 3 Program Benefits... 3 Requirements... 3 Process...

More information

Continuous integration using Rational Team Concert

Continuous integration using Rational Team Concert IBM Software Group Continuous integration using Rational Team Concert Peter Steinfeld November 4, 2009 2009 IBM Corporation Overview The importance of using continuous integration How to use Rational Team

More information

PRCA Communications Management Standard (CMS) for In-House Teams

PRCA Communications Management Standard (CMS) for In-House Teams PRCA Communications Management Standard (CMS) for In-House Teams PRCA Communications Management Standard (CMS) for In-House Teams Contents Introduction 4 The Communications Management Standard for In-House

More information

Planning of the Pilot Program

Planning of the Pilot Program With the financial support from the European Commission - Justice DAPHNE III Programme of the European Planning of the Pilot Program This publication has been produced with the financial support of the

More information

Data quality and the customer experience. An Experian Data Quality white paper

Data quality and the customer experience. An Experian Data Quality white paper Data quality and the customer experience An Experian Data Quality white paper Data quality and the customer experience Contents Executive summary 2 Introduction 3 Research overview 3 Research methodology

More information

Nexinto Business Cloud Terms Microsoft Volume Licensing End user License Terms

Nexinto Business Cloud Terms Microsoft Volume Licensing End user License Terms Nexinto Business Cloud Terms Microsoft Volume Licensing End user Inhalt 1. Definitions... 2 2. Ownership of products... 2 3. Use of Client Software... 3 4. Use of Redistribution Software... 3 5. Copies...

More information

ICT SERVICE LEVEL AGREEMENT MANAGEMENT POLICY (EXTERNAL SERVICE PROVIDERS/VENDORS)

ICT SERVICE LEVEL AGREEMENT MANAGEMENT POLICY (EXTERNAL SERVICE PROVIDERS/VENDORS) ICT SERVICE LEVEL AGREEMENT MANAGEMENT POLICY (EXTERNAL SERVICE PROVIDERS/VENDORS) TABLE OF CONTENTS 1. INTRODUCTION... 3 2. LEGISLATIVE FRAMEWORK... 3 3. OBJECTIVE OF THE POLICY... 4 4. AIMS OF THE POLICY...

More information

GÉANT Cloud Activity Towards Pan-European Cloud Services

GÉANT Cloud Activity Towards Pan-European Cloud Services GÉANT Cloud Activity Towards Pan-European Cloud Services Lars Fuglevaag Head of Communications, UNINETT HEAnet 12 November 2015 GÉANT a collaborative effort Global reach on a par with the best 40 NRENs

More information

SAP Suite on HANA: Payroll Control Center - Johnson & Johnson and SAP journey innovating end-to-end payroll processing

SAP Suite on HANA: Payroll Control Center - Johnson & Johnson and SAP journey innovating end-to-end payroll processing Orange County Convention Center Orlando, Florida June 3-5, 2014 SAP Suite on HANA: Payroll Control Center - Johnson & Johnson and SAP journey innovating end-to-end payroll processing James Edwards Johnson

More information

Cloud ERP for Job Shops and Manufacturers. An Epicor White Paper

Cloud ERP for Job Shops and Manufacturers. An Epicor White Paper Cloud ERP for Job Shops and Manufacturers An Epicor White Paper Table of Contents Executive Summary...1 Cloud Deployed ERP and Manufacturers...1 Benefits of the Cloud...2 Low initial and predictable on-going

More information

Agenda 4/21/2015. 1. Big Data Level Set 2. Who are we? 3. What do we do? 4. What have we done so far? 5. What are we working on? 6.

Agenda 4/21/2015. 1. Big Data Level Set 2. Who are we? 3. What do we do? 4. What have we done so far? 5. What are we working on? 6. Wilco van Ginkel, Co-Chair BDWG Agenda 1. Big Data Level Set 2. Who are we? 3. What do we do? 4. What have we done so far? 5. What are we working on? 6. Q&A 1 Big Data Level Set 2 Word on the street Sliding

More information

Franchise Integrated Point-of-Purchase

Franchise Integrated Point-of-Purchase Prospectus Franchise Integrated Point-of-Purchase Focused Focused Market Sizing Opportunities, Challenges, & Requirements Awareness, Preferences, & Price Sensitivity Headquarters 97 Libbey Industrial Parkway

More information

Cloud Security Panel: Real World GRC Experiences. ISACA Atlanta s 2013 Annual Geek Week

Cloud Security Panel: Real World GRC Experiences. ISACA Atlanta s 2013 Annual Geek Week Cloud Security Panel: Real World GRC Experiences ISACA Atlanta s 2013 Annual Geek Week Agenda Introductions Recap: Overview of Cloud Computing and Why Auditors Should Care Reference Materials Panel/Questions

More information

TBR. Open Standards Are Dissolving Cloud Silos. May 2012. Author: Elizabeth Hedstrom Henlin, Software Analyst elizabeth.hedstromhenlin@tbri.

TBR. Open Standards Are Dissolving Cloud Silos. May 2012. Author: Elizabeth Hedstrom Henlin, Software Analyst elizabeth.hedstromhenlin@tbri. Open Standards Are Dissolving Cloud Silos May 2012 Author: Elizabeth Hedstrom Henlin, Software Analyst elizabeth.hedstromhenlin@tbri.com TBR T EC H N O LO G Y B U S I N ES S R ES EAR C H, I N C. Contents

More information

Qeystone Dashboard. What Is the Qeystone Dashboard?

Qeystone Dashboard. What Is the Qeystone Dashboard? Qeystone Dashboard Qeystone is a comprehensive Project Portfolio Management platform for Lean Six Sigma (LSS). As teams execute projects with the Qeystone Tools application, project data automatically

More information

Technology Partner Program

Technology Partner Program Technology Partner Program Partnering For Success Technology partnerships are critical to the ability of to deliver world-class solutions to customers. understands the challenges customers face in aligning

More information

Visual Communications Project Brief

Visual Communications Project Brief Visual Communications Project Brief S03/09373 26/03/2003 Version 1.0 Final For Distribution Document Control Page Document Number: S03/09373 File Number: 03-301/01/00023 Document Name: Visual Communications

More information

Project Quality Review Form

Project Quality Review Form (ee key Project Initiation and Planning 1. Project ponsor identified and named? 2. Project opened on Project Repository and communicated to project team? 3. Project Chartered (using Project Charter or

More information

Stephen M. Fiore, Ph.D. University of Central Florida Cognitive Sciences, Department of Philosophy and Institute for Simulation & Training

Stephen M. Fiore, Ph.D. University of Central Florida Cognitive Sciences, Department of Philosophy and Institute for Simulation & Training Stephen M. Fiore, Ph.D. University of Central Florida Cognitive Sciences, Department of Philosophy and Institute for Simulation & Training Fiore, S. M. (2015). Collaboration Technologies and the Science

More information

Health Information Management Module. Annual Review. Internal Audit Branch 378-1-233. Approved by Audit Committee

Health Information Management Module. Annual Review. Internal Audit Branch 378-1-233. Approved by Audit Committee Health Information Management Module Annual Review Internal Audit Branch 378-1-233 Approved by Audit Committee September 25 th, 2007 Table of Contents Executive Summary... i 1.0 Background...1 2.0 Objective

More information

Prepared by S. A. Stephens, Ph.D. Center for Assessment and Policy Development. Revised March 2011. CAPD March 2011 Page 1

Prepared by S. A. Stephens, Ph.D. Center for Assessment and Policy Development. Revised March 2011. CAPD March 2011 Page 1 COLLABORATIVE GROUPS, COLLABORATIVE CHAIRS, AND COMMUNITY COORDINATORS IN THE DISCOVERY INITIATIVE AS OF MID-2007 Report to the William Caspar Graustein Memorial Fund Prepared by S. A. Stephens, Ph.D.

More information

Corporate Governance Framework June 2015

Corporate Governance Framework June 2015 Corporate Governance Framework June 2015 This publication has been compiled by Don Clunes of the Office of the Director-General, Department of Energy and Water Supply. State of Queensland, 2015. The Queensland

More information

Partnership for Food Protection (PFP) Strategic Plan FY 2015 through FY 2020

Partnership for Food Protection (PFP) Strategic Plan FY 2015 through FY 2020 Partnership for Food Protection (PFP) Strategic Plan FY 2015 through FY 2020 Page 1 of 14 November 19, 2014 Dear Valued Partner: The Partnership for Food Protection (PFP) was established in 2009 to work

More information

Deliverable 7.1 Web Site and Promotional Materials

Deliverable 7.1 Web Site and Promotional Materials Support Action Big Data Europe Empowering Communities with Data Technologies Project Number: 644564 Start Date of Project: 01/01/2015 Duration: 36 months Deliverable 7.1 Web Site and Promotional Materials

More information

Business Continuity Planning (BCP) 101

Business Continuity Planning (BCP) 101 2011/EPWG/WKSP/004 Intro 1 Business Continuity Planning (BCP) 101 Submitted by: Business Continuity Management Institute Workshop on Private Sector Emergency Preparedness Sendai, Japan 1-3 August 2011

More information

An Epicor White Paper. Understanding ERP Deployment Choices

An Epicor White Paper. Understanding ERP Deployment Choices An Epicor White Paper Understanding ERP Deployment Choices October 2014 Abstract The rapid evolution of global business has changed the way companies are approaching the deployment of ERP. Today s need

More information

The Effectiveness of Cross-Cultural Training in the Australian Context

The Effectiveness of Cross-Cultural Training in the Australian Context The Effectiveness of Cross-Cultural Training in the Australian Context Robert Bean, Cultural Diversity Services Pty Ltd This report was prepared for the Department of Immigration and Multicultural Affairs

More information

Essential Guide to Strategic Planning

Essential Guide to Strategic Planning Essential Guide to Strategic Planning Written and Supported by: Compass Partnership ASSOCIATION OF CHIEF EXECUTIVES OF VOLUNTARY ORGANISATIONS Contents Introduction... 3 Part 1: Essential concepts... 3

More information

Guidebook: Cloud Fax Services ADVANTAGES. of Moving Fax to the Cloud

Guidebook: Cloud Fax Services ADVANTAGES. of Moving Fax to the Cloud Guidebook: Cloud Fax Services ADVANTAGES of Moving Fax to the Cloud 7 Advantages of Moving Fax to the Cloud 2 WELCOME TO THE FUTURE OF FAX Traditional faxing methods leave businesses vulnerable to higher

More information

G-Cloud III Services Service Definition Accenture Cloud Security Services

G-Cloud III Services Service Definition Accenture Cloud Security Services G-Cloud III Services Service Definition Accenture Cloud Security Services 1 Table of contents 1. Scope of our services... 3 2. Approach... 3 3. Assets and tools... 4 4. Outcomes... 5 5. Pricing... 5 6.

More information

IFAC Event Application Form

IFAC Event Application Form IFAC Event Application Form Note that data supplied under the headings 1-18 can be changed only in agreement with the IFAC Secretariat. Fill in all the headings marked with (red square). 1 Event Info 2

More information

Role and Skill Descriptions. For An ITIL Implementation Project

Role and Skill Descriptions. For An ITIL Implementation Project Role and Skill Descriptions For An ITIL Implementation Project The following skill traits were identified as fairly typical of those needed to execute many of the key activities identified: Customer Relationship

More information

The State of IT Transformation for Healthcare

The State of IT Transformation for Healthcare The State of IT Transformation for Healthcare An Analysis by EMC and VMware EMC and VMware are helping IT groups at healthcare organizations transform to business-focused service providers. The State of

More information