BUILDING DATA CENTERS: UNDERSTANDING THE RISKS. Managing Risk Maximising Opportunity.

Size: px
Start display at page:

Download "BUILDING DATA CENTERS: UNDERSTANDING THE RISKS. Managing Risk Maximising Opportunity. www.controlrisks.com"

Transcription

1 BUILDING DATA CENTERS: UNDERSTANDING THE RISKS Managing Risk Maximising Opportunity

2 Building Data Centers: UNDERSTANDING THE RISKS The world is inundated in new information. Ninety percent of all data ever created has been generated in the past two years, and the amount of data worldwide is expected to increase 40-fold in the next decade, according to a recent IDC/EMC Digital Universe study. With this amount of growth, it s not surprising that the number of data centers around the world is also increasing exponentially. For more and more companies both in the United States and abroad data centers have become critical to successful business operations, both domestically and internationally. Once exclusive to the technology world, data centers started popping up more and more during the dotcom boom. Today, every mid- and large-size company must have at least one well-established and efficiently functioning data center to house its massive quantities of data. Some companies choose to build and house their own data center, others share data center space and functionality with other companies in a co-located facility, and those with more limited needs may make due with cloud services. Setting up a data center requires careful consideration. Depending on the size of the data center and the jurisdiction in which a company decides to build it, various complex considerations, from technical performance to risk tolerance, are at play. With each of those considerations comes risk. Regulatory issues, such as data privacy concerns, as well as intellectual property and e-discovery issues, are all factors that companies must consider as they start assessing their options. Corporate legal departments must be involved in these projects from day one. This report discusses best practices for companies building data centers both in the US and abroad, the risks associated with the process, and the legal department s role. Six Steps for Setting Up an Efficient Data Center or Co-location When a company realizes that it has amassed so much data that it needs a dedicated data center, there are several steps it can take to ensure a smooth and efficient set-up process. From the initial decision to set up the data center until the first file upload and beyond, the corporate legal department is a critical player. Step 1: Evaluate the need. The decision to build a data center typically arises out of growing demand for technological resources. Determining a company s technology needs and how those needs will change in the coming years will inform many of the logistical decisions that go into creating a data center. Understanding security and backup needs will also inform this process. Legal department s role: In-house lawyers must look at the data retention requirements and decide how much data the company needs to retain and for how long. This information is essential for the IT team to understand what requirements its data center facility must be able to fulfill. Step 2: Align the data center requirements with the corporate risk threshold. No matter where the data center is built, its location poses some level of legal risk. Different jurisdictions have different data privacy regulations, litigation hold requirements, and e-discovery concerns. Companies that understand these risks can select a location that is consistent with their risk tolerance. Legal department s role: Lawyers must first assess specific jurisdictional risks. Then they must work with the IT team and corporate management to determine how those risks fit into the data center business plan. Step 3: Obtain stakeholder buy-in. Data center deployments usually involve many departments, including facilities, security, IT, sales, marketing, risk management, finance, and legal. Involving all stakeholders early in the planning process will help ensure the success of the data center deployment. 1

3 Legal department s role: Like all other departments, the legal department s role at this stage is to participate in planning meetings and provide input, helping to clear the path to move forward. Step 4: Choose a site. Site selection should take into account all the stakeholder requirements and risk considerations identified in steps 2 and 3. For companies that opt for a co-located data center, these factors also inform the selection of a hosting service provider. Legal department s role: In choosing a site and hosting provider, the legal department should flag any regulatory issues or contractual terms that could present problems. Step 5: Plan for systems deployment. Building out a data center requires attention to a host of technical details that will ensure adequate performance. But some of these choices have non-technical ramifications, such as incorporating renewable energy, hiring local vendors and integrating disaster protection into the design. Legal department s role: In this step, the company must be aware particularly with data centers abroad of the risk that facilitation payments will be demanded during the building process. These can sometimes be considered bribes and may violate various anti-bribery laws. The legal department may also assist in finding tax credits for the company during the building of a data center. Step 6: Deploy systems. Ensure sufficient time to properly equip and set up the data center. Often, companies rush this critical part of the deployment. The consequences of actions taken in the deployment phase will persist for years, sometimes causing problems that will be difficult to diagnose. That is, equipment must be installed properly and take long-term considerations into account at this stage so that the data center can continue to function well for a long time to come. Legal department s role: With the deployment plan set, in this step, the legal department primarily serves as counselor if and when potential legal issues arise. Data Center Risks and Challenges United States With each step in building a data center either from the ground up or a co-location there are challenges and risks. In the US, the biggest challenge is choosing the right location. Because data centers are getting bigger and more complex, space is a concern. A common mistake many companies make is planning to build a data center on their own sites. While this can work for organizations with a lot of land in remote locations, it is impossible for those in big, dense cities. Most office buildings and high rises simply don t have the infrastructure or the space needed to support a data center. Some US companies especially those that manage large volumes of data have established data centers, or even moved parts of their operations, to more remote locations where land is less expensive and they have the space to build large campuses and sophisticated facilities. In addition to space concerns, companies need to factor in access to inexpensive electricity, or electricity generation capacity, when choosing a data center site. Budget is another major concern for most companies building a data center or co-locating. Step 2 is critical to avoid going over budget: aligning the data center requirements with the corporate risk threshold prevents the scope of the project from getting too big. Once a site is chosen, communication among the various stakeholders the leaders of the corporate departments involved is crucial to the success of the building process, particularly between IT and the legal department. While IT is working to get the data center up and running, the legal department must stay informed of what decisions are being made and implemented to avoid inadvertently violating any laws or regulations. In the US, regulatory concerns vary greatly from state to state, but the most common regulatory issue that arises is data privacy particularly with regard to litigation hold notices, data retention policies, IT infrastructure and human resources databases. For the legal department, this means safeguarding the company against any wrongdoing by staying well educated about any regulations within the given state and industry. Legal must continually audit, revisit, revise, update and oversee the implementation of its data privacy policy. In this respect, the legal department s job never ends. International Not surprisingly, regulatory issues are also a concern when building a data center abroad. In fact, they are by far the biggest challenge for companies with data privacy issues, again, at the top of the list. 2

4 Regulations differ dramatically from country to country. Particularly challenging are the strict and sometimes ambiguous data protection and movement laws in China. Europe is also challenging, particularly France and Germany, where data privacy laws are especially sensitive. In international locations, companies must assess the risk and interpret the various regulations and their requirements, then make decisions on how to proceed based on their own risk tolerance. Other local laws and cultural considerations can affect the project. In India, for example, the country s laws do not allow companies to use foreign legal counsel. So a company must first find, vet, and hire a local firm often one that doesn t know its client s business very well to help cut through the legal red tape. In Brazil, data center building projects are sometimes stalled because of corruption. Officials have been known to charge companies certain taxes often just bribes in disguise to move forward with the project, raising the risk that a company may violate the Foreign Corrupt Practices Act (FCPA). In Japan, the business culture dictates that it is impolite to say no to colleagues and clients so companies may find that a step they believe had been agreed to has not been taken. Conclusion While it may not seem obvious at first glance, the legal department is an integral player in the process of finding a data center solution. It must ensure that the departments involved are communicating and keep the company on the straight and narrow with regard to laws and regulations, both in the US and abroad. During each step of the project, the legal department has a specific role to play from reviewing contracts and understanding jurisdictional laws and regulations to assessing the company s risk appetite and ensuring its client doesn t run afoul of anti-bribery laws, such as the FCPA and UK Bribery Act. Data centers can certainly be built efficiently and effectively, with minimal risk and within budget. Success requires a solid set of best practices, as well as the expertise and continual support of the corporate legal department. Published by Control Risks Group Limited ( the Company ), Cottons Centre, Cottons Lane, London SE1 2QG. The Company endeavours to ensure the accuracy of all information supplied. Advice and opinions given represent the best judgement of the Company, but subject to Section 2 (1) Unfair Contract Terms Act 1977, the Company shall in no case be liable for any claims, or special, incidental or consequential damages, whether caused by the Company s negligence (or that of any member of its staff) or in any other way. Copyright: Control Risks Group Limited All rights reserved. Reproduction in whole or in part prohibited without the prior consent of the Company. 3

5 Control Risks offices

BRING YOUR OWN DEVICE

BRING YOUR OWN DEVICE BRING YOUR OWN DEVICE TEN GOOD PRACTICES FOR EMPLOYERS AND THEIR DATA Managing Risk Maximising Opportunity www.controlrisks.com TEN GOOD PRACTICES FOR EMPLOYERS AND THEIR DATA The concept of employees

More information

FRANCHISORS AND FRANCHISEES: UNDERSTANDING COMPLIANCE RISKS

FRANCHISORS AND FRANCHISEES: UNDERSTANDING COMPLIANCE RISKS FRANCHISORS AND FRANCHISEES: UNDERSTANDING COMPLIANCE RISKS Franchisors and Franchisees: Understanding Compliance Risks What do KFC, Liberty Tax Service, Fatburger, and Orkin have in common? In addition

More information

CHARTER FOR THE THE REGULATORY, COMPLIANCE & GOVERNMENT AFFAIRS COMMITTEE CHARTER THE BOARD OF DIRECTORS

CHARTER FOR THE THE REGULATORY, COMPLIANCE & GOVERNMENT AFFAIRS COMMITTEE CHARTER THE BOARD OF DIRECTORS CHARTER FOR THE THE REGULATORY, COMPLIANCE & GOVERNMENT AFFAIRS COMMITTEE CHARTER OF THE BOARD OF DIRECTORS OF Copyright/permission to reproduce Materials in this document were produced or compiled by

More information

Cutting-Edge Third Party Risk Management

Cutting-Edge Third Party Risk Management Cutting-Edge Third Party Risk Management SCCE Utilities & Energy Compliance & Ethics Conference Flora A. Francis Compliance Counsel Flow & Process Technologies GE Oil & Gas Houston, Texas February 25,

More information

PEPs and the FCPA. Presented to 10 th Puerto Rican Symposium of Anti Money Laundering. February 28 March 1, 2013

PEPs and the FCPA. Presented to 10 th Puerto Rican Symposium of Anti Money Laundering. February 28 March 1, 2013 PEPs and the FCPA Presented to 10 th Puerto Rican Symposium of Anti Money Laundering February 28 March 1, 2013 by Jay Perlman, Director Global Investigations & Compliance, Navigant Table of Contents I.

More information

E-discovery and Legal Outsourcing New Trends and Services Offered in Litigation Support

E-discovery and Legal Outsourcing New Trends and Services Offered in Litigation Support E-discovery and Legal Outsourcing New Trends and Services Offered in Litigation Support www.connect-goal.com 28 Jan 2013 Speakers Michael Lew Director & Head - Digital Forensics Chio Lim Stone Forest Singapore

More information

Beyond Compliance: Building a Robust Ethics and Compliance Program

Beyond Compliance: Building a Robust Ethics and Compliance Program Beyond Compliance: Building a Robust Ethics and Compliance Program Overview Risks are increasing and organizations are called to develop effective compliance risk mitigation programs Today, the explosion

More information

Earning Your Security Trustmark+

Earning Your Security Trustmark+ QUICK START GUIDE Earning Your Security Trustmark+ CompTIA.org www.comptia.org/communities Introduction One of the biggest challenges for solution providers is protecting their clients networks and information

More information

FOREIGN CORRUPT PRACTICES ACT POLICY for PROJECT PROFESSIONALS GROUP PTY. LTD.

FOREIGN CORRUPT PRACTICES ACT POLICY for PROJECT PROFESSIONALS GROUP PTY. LTD. FOREIGN CORRUPT PRACTICES ACT POLICY for PROJECT PROFESSIONALS GROUP PTY. LTD. 1.0 Purpose and Scope of this Manual The purpose of this Policy is to ensure compliance by Project Professionals Group Pty.

More information

( and how to fix them )

( and how to fix them ) THE 5 BIGGEST MISTAKES LAWYERS MAKE WHEN CHOOSING A CLOUD SERVICE PROVIDER ( and how to fix them ) In recent years, an increasingly large number of law firms have moved their software and data to the cloud.

More information

Meeting Changing Information Management Needs with Next-Generation Email Archiving

Meeting Changing Information Management Needs with Next-Generation Email Archiving Whitepaper Sponsored by Written by Info-Tech Research Group Meeting Changing Information Management Needs with Next-Generation Email Archiving Introduction Email archiving is evolving beyond pure storage

More information

IT Insights. Managing Third Party Technology Risk

IT Insights. Managing Third Party Technology Risk IT Insights Managing Third Party Technology Risk According to a recent study by the Institute of Internal Auditors, more than 65 percent of organizations rely heavily on third parties, yet most allocate

More information

Hillary Clinton Email Incident: Five Lessons Learned for Information Governance

Hillary Clinton Email Incident: Five Lessons Learned for Information Governance Hillary Clinton Email Incident: Five Lessons Learned for Information Governance Soo Y Kang, IGP, CIPP/US General Counsel / Director, Consulting Division Zasio Enterprises, Inc. March 2015 June 2015 Article

More information

Introduction to the Foreign Corrupt Practices Act (a training presentation for employees)

Introduction to the Foreign Corrupt Practices Act (a training presentation for employees) Introduction to the Foreign Corrupt Practices Act (a training presentation for employees) Introduction Thank you for participating in our Foreign Corrupt Practices Act (FCPA) training program. [Our Company]

More information

THIRD PARTY. T i m L i e t z R e g i o n a l P r a c t i c e L e a d e r R i s k A d v i s o r y S e r v i c e s

THIRD PARTY. T i m L i e t z R e g i o n a l P r a c t i c e L e a d e r R i s k A d v i s o r y S e r v i c e s MANAGING THIRD PARTY RISK T i m L i e t z R e g i o n a l P r a c t i c e L e a d e r R i s k A d v i s o r y S e r v i c e s Experis -- a different kind of talent company. Experis Tuesday, January 08,

More information

SEMGROUP CORPORATION. Anti-Corruption Compliance Policy August, 2011

SEMGROUP CORPORATION. Anti-Corruption Compliance Policy August, 2011 SEMGROUP CORPORATION Anti-Corruption Compliance Policy August, 2011 SCOPE This is a global policy (the Policy ) applicable to the worldwide operations of SemGroup Corporation ("SemGroup") and all of its

More information

How To Be A Successful Company

How To Be A Successful Company 177 Hitachi s Approach As a global company, upholding the laws and regulations of the countries and regions where we do business is a basic premise of our operations. We have enhanced our compliance framework

More information

DRAFT. Anti-Bribery and Anti-Corruption Policy. Introduction. Scope. 1. Definitions

DRAFT. Anti-Bribery and Anti-Corruption Policy. Introduction. Scope. 1. Definitions DRAFT Change History: Anti-Bribery and Anti-Corruption Policy Control Risks Group Ltd Commercial in confidence Introduction This document defines Control Risks policy on the avoidance of bribery and corruption.

More information

BBC. Anti-Bribery Policy. June 2011

BBC. Anti-Bribery Policy. June 2011 BBC Anti-Bribery Policy June 2011 CONTENTS CLAUSE 1. Anti-Bribery Policy statement... 1 2. Who is covered by the policy?... 2 3. What is bribery?... 2 4. Gifts and hospitality... 3 5. Gifts and hospitality

More information

ANTI-BRIBERY AND FOREIGN CORRUPT PRACTICES ACT COMPLIANCE POLICY

ANTI-BRIBERY AND FOREIGN CORRUPT PRACTICES ACT COMPLIANCE POLICY Issued: November 12, 2013 ANTI-BRIBERY AND FOREIGN CORRUPT PRACTICES ACT COMPLIANCE POLICY SCOPE This policy applies to all Magnetek, Inc. ( Magnetek ) employees, its subsidiaries and affiliates worldwide,

More information

RISK AND COMPLIANCE COMMITTEE CHARTER

RISK AND COMPLIANCE COMMITTEE CHARTER 1. GENERAL SCOPE AND AUTHORITY 1.1 Introduction This charter governs the operations of the Risk & Compliance Committee of Redflex Holdings Limited (RHL or Company). 1.2 Purpose The Risk & Compliance Committee

More information

APEC General Elements of Effective Voluntary Corporate Compliance Programs

APEC General Elements of Effective Voluntary Corporate Compliance Programs 2014/CSOM/041 Agenda Item: 3 APEC General Elements of Effective Voluntary Corporate Compliance Programs Purpose: Consideration Submitted by: United States Concluding Senior Officials Meeting Beijing, China

More information

360 o View of. Global Immigration

360 o View of. Global Immigration 360 o View of Global Immigration In a fast moving global economy, remaining compliant with immigration laws, being informed and in control is more challenging than ever before. We are a globally linked

More information

DIGITAL RIVER, INC. FOREIGN CORRUPT PRACTICES ACT AND ANTI-BRIBERY POLICY. (Adopted by resolution of the Board of Directors on December 1, 2011)

DIGITAL RIVER, INC. FOREIGN CORRUPT PRACTICES ACT AND ANTI-BRIBERY POLICY. (Adopted by resolution of the Board of Directors on December 1, 2011) DIGITAL RIVER, INC. FOREIGN CORRUPT PRACTICES ACT AND ANTI-BRIBERY POLICY (Adopted by resolution of the Board of Directors on December 1, 2011) Digital River, Inc. and our affiliates ( DR ) must comply

More information

Practical Lessons Learned: An Overview of Cybersecurity Law & Information Governance

Practical Lessons Learned: An Overview of Cybersecurity Law & Information Governance Baltimore Chapter Practical Lessons Learned: An Overview of Cybersecurity Law & Information Governance presented by Howard R. Feldman S. Keith Moulsdale hfeldman@wtplaw.com kmoulsdale@wtplaw.com 410.347.8793

More information

VIOLENCE IN THE WORKPLACE

VIOLENCE IN THE WORKPLACE VIOLENCE IN THE WORKPLACE A KEY BUSINESS CONTINUITY RISK Managing Risk Maximising Opportunity www.controlrisks.com Violence in the Workplace A Key Business Continuity Risk John Lane and Rebecca Scorzato

More information

Corporate Compliance: A Global Perspective

Corporate Compliance: A Global Perspective Corporate Compliance: A Global Perspective 6/27/2012 37 Offices in 18 Countries Current Compliance Environment Ever-intensifying regulatory burden new areas of regulation existing regulations becoming

More information

Model Anti-Bribery Policy/FCPA Version

Model Anti-Bribery Policy/FCPA Version Model Anti-Bribery Policy/FCPA Version Model Anti-Bribery Policy/FCPA Version This model anti-bribery policy template is intended to assist organizations in creating a values-based anti-bribery and anti-corruption

More information

ANTI BRIBERY AND FOREIGN CORRUPT PRACTICES ACT COMPLIANCE POLICY

ANTI BRIBERY AND FOREIGN CORRUPT PRACTICES ACT COMPLIANCE POLICY ANTI BRIBERY AND FOREIGN CORRUPT PRACTICES ACT COMPLIANCE POLICY THIS POLICY DOES NOT CREATE A CONTRACT OF EMPLOYMENT OR ALTER THE AT WILL NATURE OF ANY EMPLOYEE S EMPLOYMENT IN ANY WAY. 1. Statement of

More information

Foreign Corrupt Practices Act:

Foreign Corrupt Practices Act: Foreign Corrupt Practices Act: A Guide to U.S. Anti-Bribery Law Roger J. Magnuson 1 1 Guide to U.S. Anti-Bribery Law Foreign Corrupt Practices Act Three Components to this Presentation: Overview of the

More information

SAFETY FIRST. Emerging Trends in IT Disaster Recovery. By Cindy LaChapelle, Principal Consultant. www.isg-one.com

SAFETY FIRST. Emerging Trends in IT Disaster Recovery. By Cindy LaChapelle, Principal Consultant. www.isg-one.com SAFETY FIRST Emerging Trends in IT Disaster Recovery By Cindy LaChapelle, Principal Consultant www.isg-one.com INTRODUCTION Against a backdrop of increasingly integrated and interdependent global service

More information

Anti-Money Laundering controls in Mergers & Acquisitions

Anti-Money Laundering controls in Mergers & Acquisitions White Paper Anti-Money Laundering controls in Mergers & Acquisitions June 2014 Anti-Money Laundering controls in Mergers & Acquisitions Authors: Ana L. Pereira and Ana Maria H. de Alba Caveat emptor let

More information

Supplier Code of Conduct

Supplier Code of Conduct Delta Air Lines Supplier Code of Conduct Delta Air Lines 3/11/13 [Type the author name] Table of Contents A Legal Compliance 2 B Labor and Human Rights 3 C Health and Safety 3 D Environment 3 E Supplier

More information

What does it mean for Non-US Companies?

What does it mean for Non-US Companies? White Paper FCPA Enforcement What does it mean for Non-US Companies? September 2012 Last updated July 2014 Table of Contents FCPA enforcement: What does it mean for Non-US Companies? 3 International scope

More information

DNS Server Security Survey

DNS Server Security Survey EXECUTIVE BRIEF DNS Server Security Survey Sponsored by: EfficientIP Romain Fouchereau June 2014 INTRODUCTION With most organizations having some business linked to and more importantly relying on an online

More information

This Webcast Will Begin Shortly

This Webcast Will Begin Shortly This Webcast Will Begin Shortly If you have any technical problems with the Webcast or the streaming audio, please contact us via email at: customercare@smartpros.com Thank You! It s a Small World and

More information

Making Leaders Successful Every Day

Making Leaders Successful Every Day Making Leaders Successful Every Day Succeeding In Global ecommerce Forrester Research Benjamin Ensor Research Director, ebusiness & Channel Strategy March 13, 2013 For internal use only Agenda What s the

More information

Introduction. More time to run their business, Less HR cost to reinvest back to their organization and

Introduction. More time to run their business, Less HR cost to reinvest back to their organization and Introduction The Barbelo Group is a one stop Human Resources Outsourcing, Staffing and Consulting firm. It is the only outsource and consulting HR organization in the industry to apply Six Sigma methodologies

More information

Strategically Source Your Next Data Centre Data Centre Purchasing Drivers, Priorities, and Barriers for Asia-Pacific Firms

Strategically Source Your Next Data Centre Data Centre Purchasing Drivers, Priorities, and Barriers for Asia-Pacific Firms A Forrester Consulting Thought Leadership Paper Commissioned By Digital Realty July 2014 Strategically Source Your Next Data Centre Data Centre Purchasing Drivers, Priorities, and Barriers for Asia-Pacific

More information

Complying with the U.S. Foreign Corrupt Practices Act

Complying with the U.S. Foreign Corrupt Practices Act Complying with the U.S. Foreign Corrupt Practices Act 1. About This Manual This Manual describes the Foreign Corrupt Practices Act ( FCPA ), 15 U.S.C. 78m, 78dd, 78ff (collectively, FCPA ), anti-corruption

More information

Global Cloud Storage Market. More Info: hitesh@researchfox.com. Contact: 080-61341600/500 Visit: www.researchfox.com. saran@researchfox.

Global Cloud Storage Market. More Info: hitesh@researchfox.com. Contact: 080-61341600/500 Visit: www.researchfox.com. saran@researchfox. Global Cloud Storage Market Technology, Education, Training and Infrastructure are key areas which are rapidly developing in emerging Tier II and Tier III cities across the Globe. For IT and ITeS industries,

More information

EAGLE PARENT, INC EPICOR SOFTWARE CORPORATION ACTIVANT SOLUTIONS, INC. UK ANTI-BRIBERY AND CORRUPTION POLICY. (As Adopted July 2011)

EAGLE PARENT, INC EPICOR SOFTWARE CORPORATION ACTIVANT SOLUTIONS, INC. UK ANTI-BRIBERY AND CORRUPTION POLICY. (As Adopted July 2011) EAGLE PARENT, INC EPICOR SOFTWARE CORPORATION ACTIVANT SOLUTIONS, INC. UK ANTI-BRIBERY AND CORRUPTION POLICY (As Adopted July 2011) Introduction This UK Anti-Bribery and Corruption Policy ( Policy ) is

More information

Developing a Data Governance System

Developing a Data Governance System UNIVERSITY BUSINESS EXECUTIVE ROUNDTABLE Developing a Data Governance System Custom Research Brief October 22, 2010 RESEARCH ASSOCIATE Jeff Durkin TABLE OF CONTENTS I. Research Methodology II. Executive

More information

GUIDANCE FOR MANAGING THIRD-PARTY RISK

GUIDANCE FOR MANAGING THIRD-PARTY RISK GUIDANCE FOR MANAGING THIRD-PARTY RISK Introduction An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships,

More information

Global Compliance Audit

Global Compliance Audit WHITE PAPER Global Compliance Audit Understanding the Critical Importance of FCPA and Export Management Compliance 333 Route 46 West Suite 200 Mountain Lakes, NJ 07046 1.866.611.7874 973.808.3366 fax 973.227.1873

More information

BDO NORDIC. Investigation, fraud prevention and computer forensics. You can guess. You can assume. Or you can know. And knowing is always better.

BDO NORDIC. Investigation, fraud prevention and computer forensics. You can guess. You can assume. Or you can know. And knowing is always better. BDO NORDIC Investigation, fraud prevention and computer forensics You can guess. You can assume. Or you can know. And knowing is always better. CONTENT OUR SERVICES 3 Investigation - Identifying the facts

More information

White Paper on Financial Institution Vendor Management

White Paper on Financial Institution Vendor Management White Paper on Financial Institution Vendor Management Virtually every organization in the modern economy relies to some extent on third-party vendors that facilitate business operations in a wide variety

More information

Avoiding The Hidden Costs

Avoiding The Hidden Costs Avoiding The Hidden Costs of the Cloud Germany Enterprise Results 2013 CONTENTS 4 5 6 7 8 9 10 INTRODUCTION ROGUE CLOUD IMPLEMENTATIONS CLOUD BACK UP AND RECOVERY INEFFICIENT CLOUD STORAGE COMPLIANCE AND

More information

Legal exchange. Total Legal Spend Management Solution for Insurance Companies

Legal exchange. Total Legal Spend Management Solution for Insurance Companies TM Legal exchange Total Legal Spend Management Solution for Insurance Companies Legal exchange Helps Leading Insurance Companies Drive Strategic Thinking Delivering Unprecedented Insight into Litigation

More information

ENN: SAP Access Control helps ENN to build Regular Role and Authority Risk Management Mechanism

ENN: SAP Access Control helps ENN to build Regular Role and Authority Risk Management Mechanism 2013 SAP AG or an SAP affiliate company. All rights reserved. ENN: SAP Access Control helps ENN to build Regular Role and Authority Risk Management Mechanism ENN Group Industry Energy Products and Services

More information

12 Considerations for Managing Foreign Supplier Risk

12 Considerations for Managing Foreign Supplier Risk 12 Considerations for Managing Foreign Supplier Risk November 2014 Lockton Companies A growing number of manufacturers over the past VINCE GAFFIGAN, CPA EVP, Director, Risk Consulting Risk Management Services

More information

User Agreement. Quality. Value. Efficiency.

User Agreement. Quality. Value. Efficiency. User Agreement Quality. Value. Efficiency. Welcome to QVuE, the Leaders Network on Quality, Value and Efficiency website sponsored by The Medicines Company. The information provided in this Webinar Series

More information

Avoiding The Hidden Costs. of the Cloud

Avoiding The Hidden Costs. of the Cloud Avoiding The Hidden Costs of the Cloud 2013 CONTENTS 4 5 6 7 8 9 10 INTRODUCTION ROGUE CLOUD IMPLEMENTATIONS CLOUD BACK UP AND RECOVERY INEFFICIENT CLOUD STORAGE COMPLIANCE AND ediscovery SSL CERTIFICATE

More information

Ethical hotlines and whistleblowing ensuring businesses are not in conflict with local laws

Ethical hotlines and whistleblowing ensuring businesses are not in conflict with local laws Ethical hotlines and whistleblowing ensuring businesses are not in conflict with local laws 16 January 2014 Robert Bond, CCEP Partner and Notary Public Our Team Speechly Bircham is an ambitious, full-service

More information

What You Need to Know about the U.S. Foreign Corrupt Practices Act

What You Need to Know about the U.S. Foreign Corrupt Practices Act What You Need to Know about the U.S. Foreign Corrupt Practices Act Angella Castille Faegre Baker Daniels LLP Presentation to Indiana University October 9, 2012 Overview Introduction Enforcement Trends

More information

What s the Path? Information Life-cycle part of Vendor Management

What s the Path? Information Life-cycle part of Vendor Management Disclaimer The materials provided in this presentation and any comments or information provided by the presenter are for educational purposes only and nothing conveyed or provided should be considered

More information

CARDINAL RESOURCES LLC INTRODUCTION

CARDINAL RESOURCES LLC INTRODUCTION CARDINAL RESOURCES LLC ANTI- BRIBERY AND ANTI- CORRUPTION POLICY INTRODUCTION The purpose of this Anti- bribery and Anti- corruption Policy (the "Policy") is to ensure compliance by the Red Bird Group

More information

RISK MANAGEMENt AND INtERNAL CONtROL

RISK MANAGEMENt AND INtERNAL CONtROL RISK MANAGEMENt AND INtERNAL CONtROL Overview 02-09 Internal control the Board meets regularly throughout the year and has adopted a schedule of matters which are required to be brought to it for decision.

More information

Security in Fax: Minimizing Breaches and Compliance Risks

Security in Fax: Minimizing Breaches and Compliance Risks Security in Fax: Minimizing Breaches and Compliance Risks Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information

More information

OMNI TECHNICAL SOLUTIONS. Business Ethics, Compliance, Anti-Corruption and Anti-Money Laundering Policy

OMNI TECHNICAL SOLUTIONS. Business Ethics, Compliance, Anti-Corruption and Anti-Money Laundering Policy OMNI TECHNICAL SOLUTIONS Business Ethics, Compliance, Anti-Corruption and Anti-Money Laundering Policy Updated: September 2015 Table of Contents 1. Introduction... 2 2. Business Ethics... 3 2.1 Compliance...

More information

Overview. What are operational policies? Development, adoption, implementation

Overview. What are operational policies? Development, adoption, implementation Practical Geospatial Policies: Resolving Operational Issues to Optimize Your SDI Ed Kennedy Hickling Arthurs Low Corporation and Cynthia Mitchell and Simon Riopel Division, Natural Resources Canada Overview

More information

2,000,000 files on 240 computers in 3 countries. By Monday. How?*

2,000,000 files on 240 computers in 3 countries. By Monday. How?* e-discovery Services 2,000,000 files on 240 computers in 3 countries. By Monday. How?* *connectedthinking With dedicated forensic labs in Zurich and Lausanne, our Swiss team of skilled professionals have

More information

How To Know If You Can Get A Job At A Company

How To Know If You Can Get A Job At A Company What Maritime Lawyers Need to Know about the Foreign Corrupt Practices Act (FCPA) and other anti-corruption laws? Presented by Evelyn M. Suarez & Jim Barratt 2015 Port Administration & Legal Issues Seminar

More information

Right-Sizing Electronic Discovery: The Case For Managed Services. A White Paper

Right-Sizing Electronic Discovery: The Case For Managed Services. A White Paper Right-Sizing Electronic Discovery: The Case For Managed Services A White Paper 1 2 Table of Contents Introduction....4 An Overview of the Options...4 Insourcing: Bringing E-Discovery Processes In-House....4

More information

Managed Security in the Enterprise (U.S. Enterprise)

Managed Security in the Enterprise (U.S. Enterprise) MANAGED SECURITY IN THE ENTERPRISE Managed Security in the Enterprise (U.S. Enterprise) March 2009 CONTENTS Executive overview... 3 Methodology... 4 Demographics... 5 Finding 1: Cyber Risk a Big Problem...

More information

Cloud Computing: Contracting and Compliance Issues for In-House Counsel

Cloud Computing: Contracting and Compliance Issues for In-House Counsel International In-house Counsel Journal Vol. 6, No. 23, Spring 2013, 1 Cloud Computing: Contracting and Compliance Issues for In-House Counsel SHAHAB AHMED Director Legal and Corporate Affairs, Microsoft,

More information

Samsung Engineering Co., Ltd.

Samsung Engineering Co., Ltd. Introduction to Our Compliance Program Samsung Engineering Co., Ltd. 500 Samsung GEC, Sangil-dong, Gangdong-gu, Seoul, Korea 134-090 +82-2-2053-3000 www.samsungengineering.com 03 Since its establishment

More information

Customers have noticed that we are very responsive, meet our service level agreements, and are more cost conscious. MIKE ROBINSON

Customers have noticed that we are very responsive, meet our service level agreements, and are more cost conscious. MIKE ROBINSON AMDOCS CUSTOMER success story AMDOCS HELPS VIRGIN MEDIA IMPROVE WORKFLOW AND INCREASE EFFICIENCY BY MORE THAN 10% Customers have noticed that we are very responsive, meet our service level agreements,

More information

OPENREACH SET TO DELIVER CUSTOMER SERVICE TRANSFORMATION WITH AMDOCS CONSULTANCY

OPENREACH SET TO DELIVER CUSTOMER SERVICE TRANSFORMATION WITH AMDOCS CONSULTANCY AMDOCS CUSTOMER success story OPENREACH SET TO DELIVER CUSTOMER SERVICE TRANSFORMATION WITH AMDOCS CONSULTANCY We wanted a partner that would talk straight with us, and that s exactly the Amdocs approach.

More information

MATTHEWS INTERNATIONAL CORPORATION

MATTHEWS INTERNATIONAL CORPORATION MATTHEWS INTERNATIONAL CORPORATION U.S. FOREIGN CORRUPT PRACTICES ACT COMPLIANCE POLICY INTRODUCTION Principles Underlying the United States Foreign Corrupt Practices Act ( FCPA ). The FCPA s Anti-Bribery

More information

{>> Foreign Corrupt Practices Act //]

{>> Foreign Corrupt Practices Act //] {>> Foreign Corrupt Practices Act //] FCPA Defintion FCPA Definition FOREIGN CORRUPT PRACTICES ACT - The risk of doing business abroad has just increased dramatically as non compliance with the Foreign

More information

Top 5 reasons to choose HP Information Archiving

Top 5 reasons to choose HP Information Archiving Technical white paper Top 5 reasons to choose HP Information Archiving Proven, market-leading archiving solutions The value of intelligent archiving The requirements around managing information are becoming

More information

M&A in 2015: Successor Liability Under the FCPA. Norton Rose Fulbright US LLP Thursday, February 26, 2015

M&A in 2015: Successor Liability Under the FCPA. Norton Rose Fulbright US LLP Thursday, February 26, 2015 M&A in 2015: Successor Liability Under the FCPA Norton Rose Fulbright US LLP Thursday, February 26, 2015 Speaker Marsha Z. Gerber Partner Norton Rose Fulbright US LLP Marsha Gerber is a partner in the

More information

PROTIVITI FLASH REPORT

PROTIVITI FLASH REPORT PROTIVITI FLASH REPORT Is Department of Justice Dismissal of Morgan Stanley Case a Litmus Test for Corruption Risk Compliance? November 1, 2012 In April 2012, a former Morgan Stanley managing director

More information

Strategies for Developing a Document Imaging & Electronic Retention Program

Strategies for Developing a Document Imaging & Electronic Retention Program Is it okay to destroy the paper source records? Are there any exceptions? Strategies for Developing a Document Imaging & Electronic Retention Program How do we ensure the program will stand up in court?

More information

EXAMPLES OF FUNCTIONAL COMPETENCIES

EXAMPLES OF FUNCTIONAL COMPETENCIES EXAMPLES OF FUNCTIONAL COMPETENCIES Functional competencies are specific to a specific department or type of job. Functional competencies describe the knowledge, skill, and/or abilities required to fulfill

More information

TERMS and CONDITIONS OF USE - NextSTEPS TM

TERMS and CONDITIONS OF USE - NextSTEPS TM TERMS and CONDITIONS OF USE - NextSTEPS TM DATED MARCH 24, 2014. These terms and conditions of use (the Terms and Conditions ) govern your use of the website known as NextSTEPS TM, https://www.stepsonline.ca/

More information

Achieving & Maintaining E-discovery Fitness

Achieving & Maintaining E-discovery Fitness E-DISCOVERY W HITE PAPER Advice from Fortune 1000 E-discovery Experts: Achieving & Maintaining E-discovery Fitness By Ari Kaplan, Principal, Ari Kaplan Advisors Introduction Introduction Fitness is an

More information

Application Programming Interface (API) Application (app) - The API app is the connector between epages and the developers service.

Application Programming Interface (API) Application (app) - The API app is the connector between epages and the developers service. Developer Program 0. Preamble epages is the owner and vendor of the online shop software epages which enables merchants to run their online shop in the cloud. epages provides a developer program for third

More information

A Best Practice Guide

A Best Practice Guide A Best Practice Guide Contents Introduction [2] The Benefits of Implementing a Privacy Management Programme [3] Developing a Comprehensive Privacy Management Programme [3] Part A Baseline Fundamentals

More information

Our Vendor Code of Conduct

Our Vendor Code of Conduct Our Vendor Code of Conduct Jones Lang LaSalle and LaSalle Investment Management Vendor Code of Conduct Copyright Jones Lang LaSalle IP, Inc. Ethics Everywhere Where we stand Jones Lang LaSalle stands for

More information

PROTIVITI FLASH REPORT

PROTIVITI FLASH REPORT PROTIVITI FLASH REPORT Even Retailers and Consumer Products Manufacturers Must Manage Compliance with the U.S. Foreign Corrupt Practices Act and Other Anti-Bribery Laws May 3, 2012 Recent reports of alleged

More information

Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud

Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud Deploying and Managing Private Clouds The Essentials Series Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud sponsored by Managing for the Long Term: Keys to

More information

Customer Cloud Adoption: From Development To The Data Center

Customer Cloud Adoption: From Development To The Data Center A Custom Technology Adoption Profile Commissioned By Dell Customer Cloud Adoption: From Development To The Data Center September 2013 Introduction Where are customers today on their cloud journeys, and

More information

How To Evaluate Saas And Cloud Solutions

How To Evaluate Saas And Cloud Solutions Written in collaboration with SaaS Marketing Strategy Advisors Evaluating SaaS and Cloud Solutions: Effective Solution Overview Organizations of all sizes and across all industries have been rapidly adopting

More information

Video conferencing just became clearer NEC conferencing & collaboration

Video conferencing just became clearer NEC conferencing & collaboration Video conferencing just became clearer NEC conferencing & collaboration NEC Australia nec.com.au Maximise your business communications with NEC s conferencing & collaboration solution. Communicate, collaborate

More information

Chapter 1. Getting to Know Email Archiving Systems

Chapter 1. Getting to Know Email Archiving Systems Chapter 1 Email Archiving Basics In This Chapter Understanding basic email archiving systems Choosing between on-premise, hosted, and hybrid solutions Understanding the storage benefits of email archiving

More information

SELECTED LEGAL ISSUES

SELECTED LEGAL ISSUES SELECTED LEGAL ISSUES OF CLOUD COMPUTING Geneva, June 26, 2014 Internet Law Summer School Michel Jaccard Juliette Ancelle id est avocats, Lausanne www.idest.pro @idestavocats 1 What is «cloud computing»?

More information

Global Privacy and Data Security in the Cloud September 14, 2011 Miriam Wugmeister

Global Privacy and Data Security in the Cloud September 14, 2011 Miriam Wugmeister 2011 Morrison & Foerster LLP All Rights Reserved mofo.com Global Privacy and Data Security in the Cloud September 14, 2011 Miriam Wugmeister Presenter Miriam Wugmeister Morrison & Foerster LLP New York

More information

INTELLECTUAL ASSET MANAGEMENT DATA SECURITY IN THE CLOUD. Protecting the assets that protect your business

INTELLECTUAL ASSET MANAGEMENT DATA SECURITY IN THE CLOUD. Protecting the assets that protect your business INTELLECTUAL ASSET MANAGEMENT DATA SECURITY IN THE CLOUD Protecting the assets that protect your business Data privacy and security is a huge issue that even precedes Big Data; we at Thomson Reuters have

More information

Meeting E-Discovery Challenges with Confidence

Meeting E-Discovery Challenges with Confidence Meeting E-Discovery Challenges with Confidence Meeting today s e-discovery and information governance challenges while setting the foundation for tomorrow s requirements is the goal of every legal team.

More information

How to Manage Costs and Expectations for Successful E-Discovery: Best Practices

How to Manage Costs and Expectations for Successful E-Discovery: Best Practices How to Manage Costs and Expectations for Successful E-Discovery: Best Practices Mukesh Advani, Esq., Advisory Board Member, UBIC North America, Inc. UBIC North America, Inc. 3 Lagoon Dr., Ste. 180, Redwood

More information

Title: Number: Responsible Office: Last Revision:

Title: Number: Responsible Office: Last Revision: Title: Number: Responsible Office: Last Revision: Cloud Computing: Opportunities Used Safely G4 004D Information Security and Privacy Office July 2011 The following guidance was developed and published

More information

Cloud Computing: Legal Risks and Best Practices

Cloud Computing: Legal Risks and Best Practices Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent

More information

HILLENBRAND, INC. AND SUBSIDIARIES. Global Anti-Corruption Policy Statement and Compliance Guide

HILLENBRAND, INC. AND SUBSIDIARIES. Global Anti-Corruption Policy Statement and Compliance Guide HILLENBRAND, INC. AND SUBSIDIARIES Global Anti-Corruption Policy Statement and Compliance Guide Hillenbrand, Inc., including all of its subsidiaries (referred to collectively as the Company ), maintains

More information

Value of a Purpose-Built Third-Party Compliance Solution

Value of a Purpose-Built Third-Party Compliance Solution Value of a Purpose-Built Third-Party Compliance Solution Introduction Multinational corporations routinely engage third parties such as sales agents, consultants, brokers, distributors, resellers, suppliers,

More information

WHITE PAPER. Steps to select the right Outsourcing Vendor

WHITE PAPER. Steps to select the right Outsourcing Vendor WHITE PAPER Steps to select the right Outsourcing Vendor INTRODUCTION The process of selecting an outsourcing vendor implies a complex multistage process to evaluate not only what the provider can do,

More information

EADS-NA Code of Ethics

EADS-NA Code of Ethics Page: 1 of 7 EADS-NA Code of Ethics Introduction The Company demands high ethical standards of conduct from its directors, employees, and agents and will conduct its business with honesty, integrity, and

More information

Electronic Discovery How can I be prepared? September 2010

Electronic Discovery How can I be prepared? September 2010 Electronic Discovery How can I be prepared? September 2010 Presented by Brian Wilkinson, Director of ediscovery & Computer Forensics brian.wilkinson@us.pwc.com 410-659-3473 Table of Contents Page 1 Electronic

More information

BELGIUM S LEADING MULTI-PLAY SERVICE PROVIDER IMPROVES THE CUSTOMER EXPERIENCE AND AGENT EFFICIENCY WITH AMDOCS

BELGIUM S LEADING MULTI-PLAY SERVICE PROVIDER IMPROVES THE CUSTOMER EXPERIENCE AND AGENT EFFICIENCY WITH AMDOCS AMDOCS CUSTOMER success story BELGIUM S LEADING MULTI-PLAY SERVICE PROVIDER IMPROVES THE CUSTOMER EXPERIENCE AND AGENT EFFICIENCY WITH AMDOCS Amdocs OPS is a very powerful and useful tool and has had a

More information