Comments on CIRC Administrative Regulations on the Informatization of Insurance Institutions (draft for comments) October 30, 2015
|
|
|
- Dora Preston
- 10 years ago
- Views:
Transcription
1 Comments on CIRC Administrative Regulations on the Informatization of Insurance Institutions (draft for comments) Introduction October 30, 2015 The American Chamber of Commerce in the People s Republic of China, The American Chamber of Commerce in Shanghai, The American Chamber of Commerce in South China, American Council of Life Insurers (ACLI), American Insurance Association (AIA), BSA The Software Alliance, Canada China Business Council (CCBC), Canadian Life and Health Insurance Association Inc. (CLHIA), Coalition of Services Industries (CSI), Communications and Information Network Association of Japan (CIAJ), Council of Insurance Agents & Brokers (CIAB), DIGITALEUROPE, European Services Forum (ESF), Information Technology Industry Council (ITI), Insurance Europe, Japan Business Machine and Information System Industries Association (JBMIA), Japan Electronics and Information Technology Industries Association (JEITA), Japan Chamber of Commerce and Industry in China (JCCIC), National Foreign Trade Council (NFTC), Property Casualty Insurers Association of America (PCI), Reinsurance Association of America (RAA), Semiconductor Industry Association (SIA), Software and Information Industry Association (SIIA), Telecommunications Industry Association (TIA), US-China Business Council (USCBC), US Chamber of Commerce (USCC), United States Council for International Business (USCIB), and United States Information Technology Office (USITO) and their member companies appreciate the opportunity to comment on the Regulations on the Informatization of Insurance Institutions (draft for comments) (the Draft Informatization Regulations ) affecting insurance institutions operating and/or engaging in business with China. We welcome the release by the China Insurance Regulatory Commission (CIRC) of the Draft Informatization Regulations for comments. Our organizations represent companies from North America, Europe and Asia and engage in insurance and other industry sectors in China, including the provision of informatization hardware and software to the insurance industry (both domestically- and foreign-invested insurance institutions). Among our members are both financial institutions and global technology and innovation leaders. These companies have made significant investments in China that have contributed greatly to China s economic and technological development over the past three decades. Chinese companies have developed world class technologies and Chinese policymakers have an important role to play in informatization. Our organizations support China s desire to create a secure and reliable operating environment for insurance institutions, which should include efforts to employ secure products and solutions without interrupting the reliability of insurance products and services provided by insurance institutions to their customers. Events that disrupt the integrity of China s insurance infrastructure or impair the efficiency of insurance business operations not only impact the affected insurance institutions, but also undermine the confidence of consumers and investors, and threaten the stability of global financial systems. As a consequence, effectively addressing informatization concerns in the insurance sector is critical to maintaining public confidence in this industry which is essential to the financial security of the populace and the management of risks by businesses. While the focus of the Draft Informatization Regulations is on China, the growing size of Chinese insurance institutions, as reflected in the designation of Ping An Insurance (Group) Company of China, Ltd. by the Financial Stability Board (FSB) as one of only nine global systemically important insurers (G-SIIs), makes China s Draft Informatization Regulations a matter of global concern. We trust that this submission will help achieve those shared goals for secure
2 and reliable insurance products and services. We therefore encourage CIRC and other relevant Chinese government departments to substantially revise the Draft Informatization Regulations to enable all insurance institutions operating in or doing business with China, or considering entry into China s insurance market, to choose secure and reliable informatization solutions from vendors anywhere in the world. We believe that any regulatory effort to restrict such choice in the name of national security is overbroad when applied to financial institutions, and that any effort to favor domestic vendors of hardware, software or encryption technology will risk compromising the security and reliability of the information systems. On a related note, the Chinese Government committed at the 2015 U.S.-China Strategic and Economic Dialogue to ensure that such bank regulations [governing the commercial banking sector] will be nondiscriminatory, are not to impose nationality-based requirements, and are to be developed in a transparent manner. 1 Our members believe that this commitment with respect to commercial banking should be equally applicable to commercial insurance. Indeed, consistent with our comments, President Xi Jinping and President Barack Obama during their meeting last month committed that generally applicable measures to enhance information and communication technology cybersecurity in commercial sector (ICT cybersecurity regulations) should be consistent with WTO agreements, be narrowly tailored, take into account international norms, be nondiscriminatory, and not impose nationality-based conditions or restrictions, on the purchase, sale, or use of ICT products by commercial enterprises unnecessarily. 2 This issue has also been raised on many occasions in recent weeks with European leaders and EU senior officials calling for deeper dialogues and close cooperation in areas of ICT. 3 Global Informatization Environment We believe that several crucial issues should be recognized at the outset before a decision is made to elevate the current Guidelines for the Management of the Informatization Work of Insurance Companies (for trial implementation) to the status of administrative regulations and the Draft Informatization Regulations are finalized. First, informatization generally and cybersecurity in particular are global issues which require globally consistent and interoperable solutions to be truly effective. Insurance institutions need information technology systems that are widely available and interoperable with other international system to provide their products and services to a broad range of customers. Such systems tend to be the most secure and reliable because they are the most used and most widely tested. Cybersecurity risks transcend national borders, so countries through their governments, multilateral associations of supervisors, and private sector institutions need to work together to develop safeguards that protect the integrity of domestic as well as global markets in an integrated global economy EU-China Summit recommendations on 29 June 2015 ( 9 & 11) and EU-China High Level Economic and Trade Dialogue in September 2005 in Beijing dedicated to Digital economy. See as well 2
3 To that end, we urge CIRC to avoid the risks associated with exclusive reliance on localized solutions, prescriptive technologies and restrictions on data flows. In particular, the Draft Informatization Regulations indicate that insurance institutions should give priority to the procurement of indigenous hardware and software in Article 53 and to domestic encryption technologies in Article 54. By excluding foreign technology that may be the most secure, this approach is likely to result in less secure digitalized operations. Moreover, focusing only on domestic technologies raises interoperability issues, putting Chinese insurance companies at a disadvantage as they increasingly compete globally. Leveraging internationally accepted approaches to encryption as in the United Kingdom and many other countries - minimizes conflicts across systems in different countries and ensures that client data is as well protected as possible. Such approach is consistent with the Encryption Best Practices developed by the World Semiconductor Council (WSC) adopted by China and five other countries on September 27, The WSC Best Practices allow regulation of commercial encryption technologies only in narrow and justifiable circumstances and where such regulation is based on international standards, is nondiscriminatory, and does not favor specific technologies or create unnecessary burdens. In the same vein, we see no need for the proposed requirement in Article 21 para. 2 of the Draft Informatization Regulations for use or ownership rights to source code with respect to outsourced development of information systems as few if any technology providers will be prepared to share their source code lest their own security be compromised. So long as insurance institutions are allowed the latitude to devise their own solutions and negotiate their own technology contracts without being required to comply with mandatory provisions, they will be able to negotiate adequate protections for the security of their information. Such negotiations take place worldwide in the insurance industry. Cybersecurity risks and the technologies that mitigate such risks shift faster than regulations and standards can respond. As a consequence, policies that mandate specific technology requirements, detailed technical reviews or other procedures by regulators will be reactive to the environment and to adversaries that seek to take advantage of vulnerabilities. In addition, written regulations and prescriptive standards (notably the requirements in Articles 22, 41 and 54) become quickly outdated as cyber risks and the technology to address them evolve and create an obstacle to protecting insurance institutions and their clients. As recognized by the approaches taken by policymakers in a number of markets, effective regulations go beyond assessing whether an institution is compliant with a particular standard and instead ensure that sufficient people, processes, and technology are in place to manage risks. Second, because insurance institutions, both Chinese and non-chinese, are increasingly international in nature with business interests, including reinsurance for example, and investors in different parts of the world, data localization policies are increasingly incompatible with the growth of the industry. We believe that mandatory data localization is both expensive and impractical. So long as data security measures are taken, we believe that the data localization requirement specified in Articles 8(8) and 31 of the Draft Informatization Regulations is unnecessary and unwise. General Principles for Enhancing IT Security in the Insurance Sector Given the global and constantly evolving nature of technology in the insurance industry, we encourage China to base its regulations on the following high-level principles for workable and effective informatization regulations. 3
4 Transparency in the policymaking process together with sufficient time for consultation with industry on proposed approaches will help address and resolve complex and challenging policy issues. We encourage CIRC to release its revised regulations in draft form in sufficient time prior to implementation so that insurance institutions, technology companies, their member associations and other interested parties will have an opportunity to provide formal feedback. Given the growing and evolving nature of cyber threats, regulations need to be flexible and adaptable to confront emerging threats while enabling companies to continue to innovate. It is important for regulators to avoid a one size fits all approach in developing IT security guidelines in the insurance industry. Policies should be flexible to accommodate different approaches to address cybersecurity risks. Insurance institutions face unique risks and cybersecurity threats as well as risks and threats common to the financial services sector as a whole, so regulations, guidelines and standards should allow insurance institution to choose specific technology solutions to meet their unique needs and ensure the integrity of global financial networks. Regulations that call for specific technologies will never be able to keep pace with innovation and the creation of new solutions driven by the needs of the market and the evolution of threats to security faced by the insurance industry. Regulators should not limit the options that are available for insurance institutions to protect themselves and their clients. Take a risk-based approach to examining whole systems for cyber threats to foster a prudential regulatory framework that can be more efficient and more effective than focusing on individual functions or processes. Insurance institutions make significant investments to protect client data and to limit disruption and preserve the integrity of data processing from those who seek to attack corporate networks. To do so, international insurance institutions leverage global platforms to limit the number of attack surfaces to ensure the highest level of security possible for their customers. This enables them to maximize system security, efficiency and interoperability across their operations around the world. In policy terms, for example, requiring the use of specific localized technologies or processes - without regard to industry best practices and already established global platforms and investments - runs counter to international norms, which base technology decisions on holistic assessments of risk. This approach applies to Chinese insurance institutions as well as they go out to engage in business in other parts of the world. Reliance on global information security standards based on consensus industry processes will ensure that the best practices from around the world are incorporated and that security requirements will be regularly updated to respond to evolving threats. Foster market-based approaches that achieve desirable outcomes. Regulators in major economies work closely with insurance institutions, vendors, and their counterparts in other markets to help achieve those goals sustainably and mindful of both the local and international context. To do so, they use a successful approach of empowering insurance institutions to implement risk-based cybersecurity policies and protections that are specific to their individual circumstances. Network security is an ongoing process, so effective informatization policies should enable insurance institutions to respond rapidly to constantly changing threats and use the most 4
5 appropriate and innovative technologies for their unique business circumstances. Coordination between regulators and insurance institutions creates an environment that meets the needs of all sides. Several regulatory authorities around the world have incorporated these principles in their domestic insurance technology requirements. Conclusion The best approach for developing technology policies is open and transparent formulation and implementation, which allows stakeholders to provide helpful input to regulators. This helps ensure that the resulting regulations are effective, compatible with global norms, and unlikely to cause unintended consequences. In particular, effective prudential frameworks and policies must allow companies to conduct their own risk assessments and determine what technology best meets their security needs. As a consequence, we respectfully urge CIRC to reconsider the Draft Informatization Regulations in accordance with internationally accepted principles that insurance regulators elsewhere have used as described above to ensure that information systems in the insurance industry in China and elsewhere are as secure as possible. Local Contacts: END American Chamber of Commerce in the People s Republic of China, The Contact Person: Ian Curtiss, Senior Manager for Policy Initiatives Phone: [email protected] American Chamber of Commerce in Shanghai, The Contact Person: Veomayoury Baccam, Director, Government Relations Phone: [email protected] American Chamber of Commerce in South China, The Contact Person: Harley Seyedin, President, Government Relations Phone: [email protected] American Council of Life Insurers (ACLI) Contact Person: Lester Ross, Counsel Phone: [email protected] American Insurance Association (AIA) Contact Person: Stephen Simchak, Director of International Affairs Phone: [email protected] 5
6 BSA The Software Alliance Contact Person: Jared Ragland, Director, Policy - APAC Phone: [email protected] Canada China Business Council (CCBC) Contact Person: Travis Joern, Managing Director Phone: x [email protected] Canadian Life and Health Insurance Association Inc. (CLHIA) Contact Person: Susan Murray, Vice-President, Government and International Relations Phone: [email protected] Coalition of Services Industries (CSI) Contact Person: Peter Allgeier, President Phone: [email protected] Communications and Information Network Association of Japan (CIAJ) Contact Person: Toshiharu Kiyomoto, Vice President, International Affairs Phone: [email protected] Council of Insurance Agents & Brokers (CIAB) Contact Person: Joel Kopperud, Vice President of Government Affairs Phone: [email protected] DIGITALEUROPE Contact Person: Diane Mievis, Senior Policy Manager Phone: [email protected] European Services Forum (ESF) Contact Person: Pascal Kerneis, Managing Director Phone: Fax: [email protected] Insurance Europe Contact Person: Jesus Cisneros, Policy Advisor, International Affairs & Reinsurance Phone: [email protected] Japan Business Machine and Information System Industries Association (JBMIA) Contact Person: Naoki Shibuya, Director Phone: [email protected] 6
7 Japan Electronics and Information Technology Industries Association (JEITA) Contact Person: Akiko Harada, Deputy Manager, International Affairs Department Phone: Japan Chamber of Commerce and Industry in China, The (JCCIC) Contact Person: Katsuya Igarashi, Secretary General Phone: National Foreign Trade Council (NFTC) Contact: Bill Reinsch, President Phone: Property Casualty Insurers Association of America (PCI) Contact Person: David Snyder, Vice President, International Policy Phone: Reinsurance Association of America (RAA) Contact Person: Karalee Morell, Vice President and Assistant General Counsel Phone: US-China Business Council (USCBC) Contact Person: Jake Laband, Manager, Business Advisory Services Phone: Fax: US Chamber of Commerce (USCC) Contact Person: Jocelyn Chan, Director for China Phone: United States Council for International Business (USCIB) Contact Person: Rob Mulligan, Senior Vice President, Policy and Government Affairs Phone: USITO Associations (ITI, SIA, SIIA, TIA, USITO) Contact Person: Xiyun Gu, Policy Manager Phone: Fax:
DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations
DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations Brussels, October 2015 INTRODUCTION On behalf of the European
China s Regulations on Software Procurement
Prepared Testimony of Mark Bohannon General Counsel & Senior Vice President, Public Policy Software & Information Industry Association (SIIA) on China s Regulations on Software Procurement Before the Committee
National Security & Homeland Security Councils Review of National Cyber Security Policy. Submission of the Business Software Alliance March 19, 2009
National Security & Homeland Security Councils Review of National Cyber Security Policy Submission of the Business Software Alliance March 19, 2009 Question # 1: What is the federal government s role in
Dean C. Garfield President & CEO, Information Technology Industry Council (ITI) Committee on Energy and Commerce
Written Testimony of Dean C. Garfield President & CEO, Information Technology Industry Council (ITI) Before the Committee on Energy and Commerce Subcommittee on Communications and Technology U.S. House
BSA GLOBAL CYBERSECURITY FRAMEWORK
2010 BSA GLOBAL CYBERSECURITY FRAMEWORK BSA GLOBAL CYBERSECURITY FRAMEWORK Over the last 20 years, consumers, businesses and governments 1 around the world have moved online to conduct business, and access
Viewpoint: Implementing Japan s New Cyber Security Strategy*
Presented by: The ACCJ s Internet Economy Task Force Valid Through November 2014 The 2013 Cyber Security Strategy, released in June 2013, and the International Strategy on Cybersecurity Cooperation, released
10 September 2013. The Honorable Karel de Gucht Commissioner for Trade European Commission Brussels, Belgium. Dear Commissioner de Gucht:
The Honorable Karel de Gucht Commissioner for Trade European Commission Brussels, Belgium 10 September 2013 Dear Commissioner de Gucht: It has been almost twenty years since the GATS has taken effect.
REFORM OF STATUTORY AUDIT
EU BRIEFING 14 MARCH 2012 REFORM OF STATUTORY AUDIT Assessing the legislative proposals This briefing sets out our initial assessment of the legislative proposals to reform statutory audit published by
Cyber Security and the Impact on Banks in China
Cyber Security and the Impact on Banks in China Regulatory Policy Development and Updates March 015 kpmg.com/cn Executive Summary The China Banking Regulatory Commission (CBRC) issued two circulars (Circulars
Promoting Cross Border Data Flows Priorities for the Business Community
Promoting Cross Border Data Flows Priorities for the Business Community The movement of electronic information across borders is critical to businesses around the world, but the international rules governing
TESTIMONY ALLAN E. O BRYANT EXECUTIVE VICE PRESIDENT HEAD OF INTERNATIONAL MARKETS AND OPERATIONS REINSURANCE GROUP OF AMERICA, INCORPORATED
TESTIMONY OF ALLAN E. O BRYANT EXECUTIVE VICE PRESIDENT HEAD OF INTERNATIONAL MARKETS AND OPERATIONS REINSURANCE GROUP OF AMERICA, INCORPORATED HEARING ON U.S. INSURANCE SECTOR: INTERNATIONAL COMPETITIVENESS
How To Respond To The Nti'S Request For Comment On Big Data And Privacy
Submission to the National Telecommunications and Information Administration (NTIA), U.S. Department of Commerce Docket No. 140514424 4424 01 RIN 0660 XC010 Comments of the Information Technology Industry
Cyber Security Recommendations October 29, 2002
Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown
Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security
Testimony of Dr. Phyllis Schneck Deputy Under Secretary for Cybersecurity and Communications National Protection and Programs Directorate United States Department of Homeland Security Before the United
I. The Proposed Interpretation of Intrusion Software Inappropriately Fails to Exclude Software for Defensive Activities
July 20, 2015 Ms. Hillary Hess Director, Regulatory Policy Division Room 2099B Bureau of Industry and Security U.S. Department of Commerce 14th Street & Pennsylvania Ave., N.W. Washington, D.C. 20230 Re:
Docket No. DHS-2015-0017, Notice of Request for Public Comment Regarding Information Sharing and Analysis Organizations
Submitted via [email protected] and www.regulations.gov July 10, 2015 Mr. Michael Echols Director, JPMO-ISAO Coordinator NPPD, Department of Homeland Security 245 Murray Lane, Mail Stop 0615 Arlington VA
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information
Infocomm Security Masterplan 2
INFOCOMM DEVELOPMENT AUTHORITY OF SINGAPORE 8 Temasek Boulevard #14-00 Suntec Tower 3 Singapore 038988 Tel : 65-62110888 Fax : 65-62112222 www.ida.gov.sg April 2009 Infocomm Security Masterplan 2 The Infocomm
THE DIGITAL TRADE IMBALANCE AND ITS IMPLICATIONS FOR INTERNET GOVERNANCE
THE DIGITAL TRADE IMBALANCE AND ITS IMPLICATIONS FOR INTERNET GOVERNANCE Susan Ariel Aaronson, George Washington University Cavalho Fellow, Government Accountability Project PAPER FINDINGS Trade agreements
May 10, 2013. Office of the United States Trade Representative 600 17 th Street NW Washington, D.C. 20508
Office of the United States Trade Representative 600 17 th Street NW Washington, D.C. 20508 May 10, 2013 Submitted electronically via www.regulations.gov Attn: Docket: USTR-2013-0019 Re: Trans-Atlantic
UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD)
UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD) Contribution to the CSTD ten-year review of the implementation of WSIS outcomes Submitted by INTEL DISCLAIMER: The views presented
Healthcare Coalition on Data Protection
Healthcare Coalition on Data Protection Recommendations and joint statement supporting citizens interests in the benefits of data driven healthcare in a secure environment Representing leading actors in
Re: Request for Comments on the Preliminary Cybersecurity Framework
Submitted Electronically Patrick Gallagher, Ph.D. Under Secretary of Commerce for Standards and Technology U.S. Department of Commerce 1401 Constitution Avenue, NW Washington, DC 20227 Re: Request for
Honourable members of the National Parliaments of the EU member states and candidate countries,
Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National
CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES
POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response
The promise and pitfalls of cyber insurance January 2016
www.pwc.com/us/insurance The promise and pitfalls of cyber insurance January 2016 2 top issues The promise and pitfalls of cyber insurance Cyber insurance is a potentially huge but still largely untapped
Final Report High Level Working Group on Jobs and Growth
Final Report High Level Working Group on Jobs and Growth February 11, 2013 INTRODUCTION As the United States-European Union High Level Working Group on Jobs and Growth (HLWG) noted in its June 19, 2012
Some Specific Parawise Suggestinons. 2. An application which collects and analyzes this data for further consolidation and,
Comments by Amcham India on draft Internet of Things (IoT) Policy released by the Department of Electronics & Information Technology (DeitY), on October 16, 2014 Standards The Draft IoT Policy already
Testimony of Peter Allgeier President Coalition of Services Industries (CSI)
Testimony of Peter Allgeier President Coalition of Services Industries (CSI) Hearing On International Data Flows: Promoting Digital Trade in the 21st Century House Committee on the Judiciary Subcommittee
ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report
ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012 Co-Chair s Summary Report 1. Pursuant to the 18 th ASEAN Regional Forum (ARF) Ministerial meeting in Bali,
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement
COMMUNIQUÉ ON PRINCIPLES FOR INTERNET POLICY-MAKING OECD HIGH LEVEL MEETING ON THE INTERNET ECONOMY,
COMMUNIQUÉ ON PRINCIPLES FOR INTERNET POLICY-MAKING OECD HIGH LEVEL MEETING ON THE INTERNET ECONOMY, 28-29 JUNE 2011 The Seoul Declaration on the Future of the Internet Economy adopted at the 2008 OECD
JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.
JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President
The Rationale for Harmonizing Accounting Standards Globally
The EU and the Global Convergence in Accounting Standards Since 2000, Europe has led a global movement towards the creation of a single set of accounting standards for companies whose shares are listed
RE: Transatlantic Business Concerns about Indian Government IP Policies
The Honorable Michael Froman Assistant to the President and Deputy National Security Adviser for International Economic Affairs The White House Washington, DC 20504 USA Ambassador Ron Kirk U.S. Trade Representative
14 December 2006 GUIDELINES ON OUTSOURCING
14 December 2006 GUIDELINES ON OUTSOURCING CEBS presents its Guidelines on Outsourcing. The proposed guidelines are based on current practices and also take into account international, such as the Joint
Promoting Economic Growth through Smart Global Information Technology Policy. The Growing Threat of Local Data Server Requirements
Promoting Economic Growth through Smart Global Information Technology Policy The Growing Threat of Local Data Server Requirements June 2012 Business Roundtable (BRT) is an association of chief executive
FRAMEWORK FOR ADVANCING TRANSATLANTIC ECONOMIC INTEGRATION BETWEEN THE EUROPEAN UNION AND THE UNITED STATES OF AMERICA
FRAMEWORK FOR ADVANCING TRANSATLANTIC ECONOMIC INTEGRATION BETWEEN THE EUROPEAN UNION AND THE UNITED STATES OF AMERICA We, leaders of the European Union and the United States of America: Believing that
Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
Lith Networking and Network Marketing Safety
DIRECTION TO SUCCESS. PUBLIC AND PRIVATE SECTORS PARTNERSHIP WSIS Action Line Facilitation Meeting: Building confidence and security in the use of ICTs (C5) Partnerships for Global Cybersecurity ITU Geneva,
Solving for the Future: Addressing Major Societal Challenges Through Innovative Technology and Cloud Computing
Solving for the Future: Addressing Major Societal Challenges Through Innovative Technology and Cloud Computing As economic challenges persist in communities, nations, and regions around the world, the
January 28, 2011. Re: Commercial Data Privacy and Innovation in the Internet Economy: A Dynamic Policy Framework Comment, Docket No.
475 Anton Boulevard Costa Mesa, CA 92626 www.experian.com January 28, 2011 Via Email: [email protected] National Telecommunications and Information Administration U.S. Department of Commerce
A Dual Vision for the Canadian Payments System
Remarks by Lawrence Schembri Deputy Governor of the Bank of Canada Canadian Payments Association Charlottetown, Prince Edward Island 27 June 2014 A Dual Vision for the Canadian Payments System Introduction
22 ND ANNUAL MEETING OF THE ASIA-PACIFIC PARLIAMENTARY FORUM RESOLUTION APPF22/RES 01
22 ND ANNUAL MEETING OF THE ASIA-PACIFIC PARLIAMENTARY FORUM RESOLUTION APPF22/RES 01 POLITICAL AND SECURITY MATTERS IN ASIA PACIFIC (Sponsored by Australia, Indonesia, the Republic of Korea and the Russian
2101 L Street.NW Suite 400 Washington,DC 20037 202-828-7100 Fax 202-293-1219 www.aiadc.org. April 30, 2013 BY ELECTRONIC MAIL
American Insurance Association April 30, 2013 2101 L Street.NW Suite 400 Washington,DC 20037 202-828-7100 Fax 202-293-1219 www.aiadc.org BY ELECTRONIC MAIL Board of Governors of the Federal Reserve System
UNESCO S CONTRIBUTIONS TO THE DRAFT OUTCOME STATEMENT OF THE NETMUNDIAL CONFERENCE. Introduction
UNESCO S CONTRIBUTIONS TO THE DRAFT OUTCOME STATEMENT OF THE NETMUNDIAL CONFERENCE 16 April 2014 (Highlighted in yellow below) Introduction 1. The Global Multistakeholder Meeting on the Future of Internet
RE: ITI Comments on Korea s Proposed Bill for the Development of Cloud Computing and Protection of Users
August 19, 2012 Korean Communications Commission Via e-mail to: [email protected] RE: ITI Comments on Korea s Proposed Bill for the Development of Cloud Computing and Protection of Users Dear Director Yang:
CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
building and sustaining productive working relationships p u b l i c r e l a t i o n s a n d p r o c u r e m e n t
building and sustaining productive working relationships p u b l i c r e l a t i o n s a n d p r o c u r e m e n t INTRODUCTION 1 1 THE GROWING INFLUENCE OF PROCUREMENT PROFESSIONALS 2 2 GUIDELINES FOR
Terms of Reference for the Review of the OECD Guidelines for the Security of Information Systems and Networks
Please cite this paper as: OECD (2012), Terms of Reference for the Review of the OECD Guidelines for the Security of Information Systems and Networks, OECD Digital Economy Papers, No. 210, OECD Publishing.
Why you should adopt the NIST Cybersecurity Framework
www.pwc.com/cybersecurity Why you should adopt the NIST Cybersecurity Framework May 2014 The National Institute of Standards and Technology Cybersecurity Framework may be voluntary, but it offers potential
Corporate Real Estate Service Delivery Model at Prudential Financial
Corporate Real Estate Service Delivery Model at Prudential Financial CoreNet Global Chicago Discovery Forum May 1, 2011 Kathy Winkler - Vice President, CRE Agenda Overview Prudential Financial Company
White Paper on Financial Institution Vendor Management
White Paper on Financial Institution Vendor Management Virtually every organization in the modern economy relies to some extent on third-party vendors that facilitate business operations in a wide variety
Diane Honeycutt National Institute of Standards and Technology (NIST) 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899
Submitted via email: [email protected] April 8, 2013 Diane Honeycutt National Institute of Standards and Technology (NIST) 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 Re: Developing a Framework
Research Project RM 01-01-08. Assumed role of India in the international community in the short and medium
Assumed role of India in the international community in the short and medium Daniel Novotný Alice Rezková SUMMARY AND CONCLUSION: RECOMMENDATIONS FOR FUTURE STRATEGIC APPROACH OF THE EU TOWARDS INDIA Assessment
Major Economies Business Forum: Enhancing the Role of Business in Climate Change and Energy Security Policymaking
Major Economies Business Forum: Enhancing the Role of Business in Climate Change and Energy Security Policymaking KEY MESSAGES Greater substantive engagement of business in international energy and climate
Managing cyber risks with insurance
www.pwc.com.tr/cybersecurity Managing cyber risks with insurance Key factors to consider when evaluating how cyber insurance can enhance your security program June 2014 Managing cyber risks to sensitive
The Taxation of Corporate Groups Consultation Paper November 2010
April 15 th, 2011 Department of Finance L Esplanade Laurier 17 th Floor, East Tower 140 O Connor Street Ottawa, ON K1A 0G5 Attention: Mr. Geoff Trueman, Business Income Tax Division Dear Sirs and Mesdames,
Turning disruption to advantage
www.pwc.ie/insurance Turning disruption to advantage 85% are confident about growth < Page 1 > 72% see more opportunities than threats < Page 4 > 87% believe regulation is the greatest industry disruptor
Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives
Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Foreign Affairs Subcommittee on Asia and the Pacific Reviewing President
Re: Docket No. FDA 2014 N 0339: Proposed Risk-Based Regulatory Framework and Strategy for Health Information Technology Report; Request for Comments
Leslie Kux Assistant Commissioner for Policy Food and Drug Administration Division of Docket Management (HFA 305) Food and Drug Administration 5630 Fishers Lane, Rm. 1061 Rockville, MD 20852 Re: Docket
Why Join BSA? A Vital Resource for Software Companies. The many reasons why software companies join BSA OUR VALUE PROPOSITION
Why Join BSA? The many reasons why software companies join BSA OUR VALUE PROPOSITION A membership in BSA The Software Alliance provides you a seat at the table with the world s leading software companies.
A New Chapter in Life Insurance Capital Requirements
A New Chapter in Life Insurance Capital Requirements Remarks by Mark Zelmer Deputy Superintendent Office of the Superintendent of Financial Institutions Canada (OSFI) to the CFA Society Toronto Toronto,
ACE GPS. Navigating the World With You
ACE GPS SM Navigating the World With You ACE Group delivers client-focused solutions to multinational companies through our ACE GPS SM global platform. Introducing ACE Global Program Solutions (ACE GPS
