BUILDING DATA CENTERS: UNDERSTANDING THE RISKS. Managing Risk Maximising Opportunity.
|
|
- Loreen Thomas
- 8 years ago
- Views:
Transcription
1 BUILDING DATA CENTERS: UNDERSTANDING THE RISKS Managing Risk Maximising Opportunity
2 Building Data Centers: UNDERSTANDING THE RISKS The world is inundated in new information. Ninety percent of all data ever created has been generated in the past two years, and the amount of data worldwide is expected to increase 40-fold in the next decade, according to a recent IDC/EMC Digital Universe study. With this amount of growth, it s not surprising that the number of data centers around the world is also increasing exponentially. For more and more companies both in the United States and abroad data centers have become critical to successful business operations, both domestically and internationally. Once exclusive to the technology world, data centers started popping up more and more during the dotcom boom. Today, every mid- and large-size company must have at least one well-established and efficiently functioning data center to house its massive quantities of data. Some companies choose to build and house their own data center, others share data center space and functionality with other companies in a co-located facility, and those with more limited needs may make due with cloud services. Setting up a data center requires careful consideration. Depending on the size of the data center and the jurisdiction in which a company decides to build it, various complex considerations, from technical performance to risk tolerance, are at play. With each of those considerations comes risk. Regulatory issues, such as data privacy concerns, as well as intellectual property and e-discovery issues, are all factors that companies must consider as they start assessing their options. Corporate legal departments must be involved in these projects from day one. This report discusses best practices for companies building data centers both in the US and abroad, the risks associated with the process, and the legal department s role. Six Steps for Setting Up an Efficient Data Center or Co-location When a company realizes that it has amassed so much data that it needs a dedicated data center, there are several steps it can take to ensure a smooth and efficient set-up process. From the initial decision to set up the data center until the first file upload and beyond, the corporate legal department is a critical player. Step 1: Evaluate the need. The decision to build a data center typically arises out of growing demand for technological resources. Determining a company s technology needs and how those needs will change in the coming years will inform many of the logistical decisions that go into creating a data center. Understanding security and backup needs will also inform this process. Legal department s role: In-house lawyers must look at the data retention requirements and decide how much data the company needs to retain and for how long. This information is essential for the IT team to understand what requirements its data center facility must be able to fulfill. Step 2: Align the data center requirements with the corporate risk threshold. No matter where the data center is built, its location poses some level of legal risk. Different jurisdictions have different data privacy regulations, litigation hold requirements, and e-discovery concerns. Companies that understand these risks can select a location that is consistent with their risk tolerance. Legal department s role: Lawyers must first assess specific jurisdictional risks. Then they must work with the IT team and corporate management to determine how those risks fit into the data center business plan. Step 3: Obtain stakeholder buy-in. Data center deployments usually involve many departments, including facilities, security, IT, sales, marketing, risk management, finance, and legal. Involving all stakeholders early in the planning process will help ensure the success of the data center deployment. 1
3 Legal department s role: Like all other departments, the legal department s role at this stage is to participate in planning meetings and provide input, helping to clear the path to move forward. Step 4: Choose a site. Site selection should take into account all the stakeholder requirements and risk considerations identified in steps 2 and 3. For companies that opt for a co-located data center, these factors also inform the selection of a hosting service provider. Legal department s role: In choosing a site and hosting provider, the legal department should flag any regulatory issues or contractual terms that could present problems. Step 5: Plan for systems deployment. Building out a data center requires attention to a host of technical details that will ensure adequate performance. But some of these choices have non-technical ramifications, such as incorporating renewable energy, hiring local vendors and integrating disaster protection into the design. Legal department s role: In this step, the company must be aware particularly with data centers abroad of the risk that facilitation payments will be demanded during the building process. These can sometimes be considered bribes and may violate various anti-bribery laws. The legal department may also assist in finding tax credits for the company during the building of a data center. Step 6: Deploy systems. Ensure sufficient time to properly equip and set up the data center. Often, companies rush this critical part of the deployment. The consequences of actions taken in the deployment phase will persist for years, sometimes causing problems that will be difficult to diagnose. That is, equipment must be installed properly and take long-term considerations into account at this stage so that the data center can continue to function well for a long time to come. Legal department s role: With the deployment plan set, in this step, the legal department primarily serves as counselor if and when potential legal issues arise. Data Center Risks and Challenges United States With each step in building a data center either from the ground up or a co-location there are challenges and risks. In the US, the biggest challenge is choosing the right location. Because data centers are getting bigger and more complex, space is a concern. A common mistake many companies make is planning to build a data center on their own sites. While this can work for organizations with a lot of land in remote locations, it is impossible for those in big, dense cities. Most office buildings and high rises simply don t have the infrastructure or the space needed to support a data center. Some US companies especially those that manage large volumes of data have established data centers, or even moved parts of their operations, to more remote locations where land is less expensive and they have the space to build large campuses and sophisticated facilities. In addition to space concerns, companies need to factor in access to inexpensive electricity, or electricity generation capacity, when choosing a data center site. Budget is another major concern for most companies building a data center or co-locating. Step 2 is critical to avoid going over budget: aligning the data center requirements with the corporate risk threshold prevents the scope of the project from getting too big. Once a site is chosen, communication among the various stakeholders the leaders of the corporate departments involved is crucial to the success of the building process, particularly between IT and the legal department. While IT is working to get the data center up and running, the legal department must stay informed of what decisions are being made and implemented to avoid inadvertently violating any laws or regulations. In the US, regulatory concerns vary greatly from state to state, but the most common regulatory issue that arises is data privacy particularly with regard to litigation hold notices, data retention policies, IT infrastructure and human resources databases. For the legal department, this means safeguarding the company against any wrongdoing by staying well educated about any regulations within the given state and industry. Legal must continually audit, revisit, revise, update and oversee the implementation of its data privacy policy. In this respect, the legal department s job never ends. International Not surprisingly, regulatory issues are also a concern when building a data center abroad. In fact, they are by far the biggest challenge for companies with data privacy issues, again, at the top of the list. 2
4 Regulations differ dramatically from country to country. Particularly challenging are the strict and sometimes ambiguous data protection and movement laws in China. Europe is also challenging, particularly France and Germany, where data privacy laws are especially sensitive. In international locations, companies must assess the risk and interpret the various regulations and their requirements, then make decisions on how to proceed based on their own risk tolerance. Other local laws and cultural considerations can affect the project. In India, for example, the country s laws do not allow companies to use foreign legal counsel. So a company must first find, vet, and hire a local firm often one that doesn t know its client s business very well to help cut through the legal red tape. In Brazil, data center building projects are sometimes stalled because of corruption. Officials have been known to charge companies certain taxes often just bribes in disguise to move forward with the project, raising the risk that a company may violate the Foreign Corrupt Practices Act (FCPA). In Japan, the business culture dictates that it is impolite to say no to colleagues and clients so companies may find that a step they believe had been agreed to has not been taken. Conclusion While it may not seem obvious at first glance, the legal department is an integral player in the process of finding a data center solution. It must ensure that the departments involved are communicating and keep the company on the straight and narrow with regard to laws and regulations, both in the US and abroad. During each step of the project, the legal department has a specific role to play from reviewing contracts and understanding jurisdictional laws and regulations to assessing the company s risk appetite and ensuring its client doesn t run afoul of anti-bribery laws, such as the FCPA and UK Bribery Act. Data centers can certainly be built efficiently and effectively, with minimal risk and within budget. Success requires a solid set of best practices, as well as the expertise and continual support of the corporate legal department. Published by Control Risks Group Limited ( the Company ), Cottons Centre, Cottons Lane, London SE1 2QG. The Company endeavours to ensure the accuracy of all information supplied. Advice and opinions given represent the best judgement of the Company, but subject to Section 2 (1) Unfair Contract Terms Act 1977, the Company shall in no case be liable for any claims, or special, incidental or consequential damages, whether caused by the Company s negligence (or that of any member of its staff) or in any other way. Copyright: Control Risks Group Limited All rights reserved. Reproduction in whole or in part prohibited without the prior consent of the Company. 3
5 Control Risks offices
BRING YOUR OWN DEVICE
BRING YOUR OWN DEVICE TEN GOOD PRACTICES FOR EMPLOYERS AND THEIR DATA Managing Risk Maximising Opportunity www.controlrisks.com TEN GOOD PRACTICES FOR EMPLOYERS AND THEIR DATA The concept of employees
More informationFRANCHISORS AND FRANCHISEES: UNDERSTANDING COMPLIANCE RISKS
FRANCHISORS AND FRANCHISEES: UNDERSTANDING COMPLIANCE RISKS Franchisors and Franchisees: Understanding Compliance Risks What do KFC, Liberty Tax Service, Fatburger, and Orkin have in common? In addition
More informationCHARTER FOR THE THE REGULATORY, COMPLIANCE & GOVERNMENT AFFAIRS COMMITTEE CHARTER THE BOARD OF DIRECTORS
CHARTER FOR THE THE REGULATORY, COMPLIANCE & GOVERNMENT AFFAIRS COMMITTEE CHARTER OF THE BOARD OF DIRECTORS OF Copyright/permission to reproduce Materials in this document were produced or compiled by
More informationCutting-Edge Third Party Risk Management
Cutting-Edge Third Party Risk Management SCCE Utilities & Energy Compliance & Ethics Conference Flora A. Francis Compliance Counsel Flow & Process Technologies GE Oil & Gas Houston, Texas February 25,
More informationPEPs and the FCPA. Presented to 10 th Puerto Rican Symposium of Anti Money Laundering. February 28 March 1, 2013
PEPs and the FCPA Presented to 10 th Puerto Rican Symposium of Anti Money Laundering February 28 March 1, 2013 by Jay Perlman, Director Global Investigations & Compliance, Navigant Table of Contents I.
More informationE-discovery and Legal Outsourcing New Trends and Services Offered in Litigation Support
E-discovery and Legal Outsourcing New Trends and Services Offered in Litigation Support www.connect-goal.com 28 Jan 2013 Speakers Michael Lew Director & Head - Digital Forensics Chio Lim Stone Forest Singapore
More informationBeyond Compliance: Building a Robust Ethics and Compliance Program
Beyond Compliance: Building a Robust Ethics and Compliance Program Overview Risks are increasing and organizations are called to develop effective compliance risk mitigation programs Today, the explosion
More informationEarning Your Security Trustmark+
QUICK START GUIDE Earning Your Security Trustmark+ CompTIA.org www.comptia.org/communities Introduction One of the biggest challenges for solution providers is protecting their clients networks and information
More informationFOREIGN CORRUPT PRACTICES ACT POLICY for PROJECT PROFESSIONALS GROUP PTY. LTD.
FOREIGN CORRUPT PRACTICES ACT POLICY for PROJECT PROFESSIONALS GROUP PTY. LTD. 1.0 Purpose and Scope of this Manual The purpose of this Policy is to ensure compliance by Project Professionals Group Pty.
More information( and how to fix them )
THE 5 BIGGEST MISTAKES LAWYERS MAKE WHEN CHOOSING A CLOUD SERVICE PROVIDER ( and how to fix them ) In recent years, an increasingly large number of law firms have moved their software and data to the cloud.
More informationMeeting Changing Information Management Needs with Next-Generation Email Archiving
Whitepaper Sponsored by Written by Info-Tech Research Group Meeting Changing Information Management Needs with Next-Generation Email Archiving Introduction Email archiving is evolving beyond pure storage
More informationIT Insights. Managing Third Party Technology Risk
IT Insights Managing Third Party Technology Risk According to a recent study by the Institute of Internal Auditors, more than 65 percent of organizations rely heavily on third parties, yet most allocate
More informationHillary Clinton Email Incident: Five Lessons Learned for Information Governance
Hillary Clinton Email Incident: Five Lessons Learned for Information Governance Soo Y Kang, IGP, CIPP/US General Counsel / Director, Consulting Division Zasio Enterprises, Inc. March 2015 June 2015 Article
More informationIntroduction to the Foreign Corrupt Practices Act (a training presentation for employees)
Introduction to the Foreign Corrupt Practices Act (a training presentation for employees) Introduction Thank you for participating in our Foreign Corrupt Practices Act (FCPA) training program. [Our Company]
More informationTHIRD PARTY. T i m L i e t z R e g i o n a l P r a c t i c e L e a d e r R i s k A d v i s o r y S e r v i c e s
MANAGING THIRD PARTY RISK T i m L i e t z R e g i o n a l P r a c t i c e L e a d e r R i s k A d v i s o r y S e r v i c e s Experis -- a different kind of talent company. Experis Tuesday, January 08,
More informationSEMGROUP CORPORATION. Anti-Corruption Compliance Policy August, 2011
SEMGROUP CORPORATION Anti-Corruption Compliance Policy August, 2011 SCOPE This is a global policy (the Policy ) applicable to the worldwide operations of SemGroup Corporation ("SemGroup") and all of its
More informationHow To Be A Successful Company
177 Hitachi s Approach As a global company, upholding the laws and regulations of the countries and regions where we do business is a basic premise of our operations. We have enhanced our compliance framework
More informationDRAFT. Anti-Bribery and Anti-Corruption Policy. Introduction. Scope. 1. Definitions
DRAFT Change History: Anti-Bribery and Anti-Corruption Policy Control Risks Group Ltd Commercial in confidence Introduction This document defines Control Risks policy on the avoidance of bribery and corruption.
More informationBBC. Anti-Bribery Policy. June 2011
BBC Anti-Bribery Policy June 2011 CONTENTS CLAUSE 1. Anti-Bribery Policy statement... 1 2. Who is covered by the policy?... 2 3. What is bribery?... 2 4. Gifts and hospitality... 3 5. Gifts and hospitality
More informationANTI-BRIBERY AND FOREIGN CORRUPT PRACTICES ACT COMPLIANCE POLICY
Issued: November 12, 2013 ANTI-BRIBERY AND FOREIGN CORRUPT PRACTICES ACT COMPLIANCE POLICY SCOPE This policy applies to all Magnetek, Inc. ( Magnetek ) employees, its subsidiaries and affiliates worldwide,
More informationRISK AND COMPLIANCE COMMITTEE CHARTER
1. GENERAL SCOPE AND AUTHORITY 1.1 Introduction This charter governs the operations of the Risk & Compliance Committee of Redflex Holdings Limited (RHL or Company). 1.2 Purpose The Risk & Compliance Committee
More informationAPEC General Elements of Effective Voluntary Corporate Compliance Programs
2014/CSOM/041 Agenda Item: 3 APEC General Elements of Effective Voluntary Corporate Compliance Programs Purpose: Consideration Submitted by: United States Concluding Senior Officials Meeting Beijing, China
More information360 o View of. Global Immigration
360 o View of Global Immigration In a fast moving global economy, remaining compliant with immigration laws, being informed and in control is more challenging than ever before. We are a globally linked
More informationDIGITAL RIVER, INC. FOREIGN CORRUPT PRACTICES ACT AND ANTI-BRIBERY POLICY. (Adopted by resolution of the Board of Directors on December 1, 2011)
DIGITAL RIVER, INC. FOREIGN CORRUPT PRACTICES ACT AND ANTI-BRIBERY POLICY (Adopted by resolution of the Board of Directors on December 1, 2011) Digital River, Inc. and our affiliates ( DR ) must comply
More informationPractical Lessons Learned: An Overview of Cybersecurity Law & Information Governance
Baltimore Chapter Practical Lessons Learned: An Overview of Cybersecurity Law & Information Governance presented by Howard R. Feldman S. Keith Moulsdale hfeldman@wtplaw.com kmoulsdale@wtplaw.com 410.347.8793
More informationVIOLENCE IN THE WORKPLACE
VIOLENCE IN THE WORKPLACE A KEY BUSINESS CONTINUITY RISK Managing Risk Maximising Opportunity www.controlrisks.com Violence in the Workplace A Key Business Continuity Risk John Lane and Rebecca Scorzato
More informationCorporate Compliance: A Global Perspective
Corporate Compliance: A Global Perspective 6/27/2012 37 Offices in 18 Countries Current Compliance Environment Ever-intensifying regulatory burden new areas of regulation existing regulations becoming
More informationModel Anti-Bribery Policy/FCPA Version
Model Anti-Bribery Policy/FCPA Version Model Anti-Bribery Policy/FCPA Version This model anti-bribery policy template is intended to assist organizations in creating a values-based anti-bribery and anti-corruption
More informationANTI BRIBERY AND FOREIGN CORRUPT PRACTICES ACT COMPLIANCE POLICY
ANTI BRIBERY AND FOREIGN CORRUPT PRACTICES ACT COMPLIANCE POLICY THIS POLICY DOES NOT CREATE A CONTRACT OF EMPLOYMENT OR ALTER THE AT WILL NATURE OF ANY EMPLOYEE S EMPLOYMENT IN ANY WAY. 1. Statement of
More informationForeign Corrupt Practices Act:
Foreign Corrupt Practices Act: A Guide to U.S. Anti-Bribery Law Roger J. Magnuson 1 1 Guide to U.S. Anti-Bribery Law Foreign Corrupt Practices Act Three Components to this Presentation: Overview of the
More informationSAFETY FIRST. Emerging Trends in IT Disaster Recovery. By Cindy LaChapelle, Principal Consultant. www.isg-one.com
SAFETY FIRST Emerging Trends in IT Disaster Recovery By Cindy LaChapelle, Principal Consultant www.isg-one.com INTRODUCTION Against a backdrop of increasingly integrated and interdependent global service
More informationAnti-Money Laundering controls in Mergers & Acquisitions
White Paper Anti-Money Laundering controls in Mergers & Acquisitions June 2014 Anti-Money Laundering controls in Mergers & Acquisitions Authors: Ana L. Pereira and Ana Maria H. de Alba Caveat emptor let
More informationSupplier Code of Conduct
Delta Air Lines Supplier Code of Conduct Delta Air Lines 3/11/13 [Type the author name] Table of Contents A Legal Compliance 2 B Labor and Human Rights 3 C Health and Safety 3 D Environment 3 E Supplier
More informationWhat does it mean for Non-US Companies?
White Paper FCPA Enforcement What does it mean for Non-US Companies? September 2012 Last updated July 2014 Table of Contents FCPA enforcement: What does it mean for Non-US Companies? 3 International scope
More informationDNS Server Security Survey
EXECUTIVE BRIEF DNS Server Security Survey Sponsored by: EfficientIP Romain Fouchereau June 2014 INTRODUCTION With most organizations having some business linked to and more importantly relying on an online
More informationThis Webcast Will Begin Shortly
This Webcast Will Begin Shortly If you have any technical problems with the Webcast or the streaming audio, please contact us via email at: customercare@smartpros.com Thank You! It s a Small World and
More informationMaking Leaders Successful Every Day
Making Leaders Successful Every Day Succeeding In Global ecommerce Forrester Research Benjamin Ensor Research Director, ebusiness & Channel Strategy March 13, 2013 For internal use only Agenda What s the
More informationIntroduction. More time to run their business, Less HR cost to reinvest back to their organization and
Introduction The Barbelo Group is a one stop Human Resources Outsourcing, Staffing and Consulting firm. It is the only outsource and consulting HR organization in the industry to apply Six Sigma methodologies
More informationStrategically Source Your Next Data Centre Data Centre Purchasing Drivers, Priorities, and Barriers for Asia-Pacific Firms
A Forrester Consulting Thought Leadership Paper Commissioned By Digital Realty July 2014 Strategically Source Your Next Data Centre Data Centre Purchasing Drivers, Priorities, and Barriers for Asia-Pacific
More informationComplying with the U.S. Foreign Corrupt Practices Act
Complying with the U.S. Foreign Corrupt Practices Act 1. About This Manual This Manual describes the Foreign Corrupt Practices Act ( FCPA ), 15 U.S.C. 78m, 78dd, 78ff (collectively, FCPA ), anti-corruption
More informationGlobal Cloud Storage Market. More Info: hitesh@researchfox.com. Contact: 080-61341600/500 Visit: www.researchfox.com. saran@researchfox.
Global Cloud Storage Market Technology, Education, Training and Infrastructure are key areas which are rapidly developing in emerging Tier II and Tier III cities across the Globe. For IT and ITeS industries,
More informationEAGLE PARENT, INC EPICOR SOFTWARE CORPORATION ACTIVANT SOLUTIONS, INC. UK ANTI-BRIBERY AND CORRUPTION POLICY. (As Adopted July 2011)
EAGLE PARENT, INC EPICOR SOFTWARE CORPORATION ACTIVANT SOLUTIONS, INC. UK ANTI-BRIBERY AND CORRUPTION POLICY (As Adopted July 2011) Introduction This UK Anti-Bribery and Corruption Policy ( Policy ) is
More informationDeveloping a Data Governance System
UNIVERSITY BUSINESS EXECUTIVE ROUNDTABLE Developing a Data Governance System Custom Research Brief October 22, 2010 RESEARCH ASSOCIATE Jeff Durkin TABLE OF CONTENTS I. Research Methodology II. Executive
More informationGUIDANCE FOR MANAGING THIRD-PARTY RISK
GUIDANCE FOR MANAGING THIRD-PARTY RISK Introduction An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships,
More informationGlobal Compliance Audit
WHITE PAPER Global Compliance Audit Understanding the Critical Importance of FCPA and Export Management Compliance 333 Route 46 West Suite 200 Mountain Lakes, NJ 07046 1.866.611.7874 973.808.3366 fax 973.227.1873
More informationBDO NORDIC. Investigation, fraud prevention and computer forensics. You can guess. You can assume. Or you can know. And knowing is always better.
BDO NORDIC Investigation, fraud prevention and computer forensics You can guess. You can assume. Or you can know. And knowing is always better. CONTENT OUR SERVICES 3 Investigation - Identifying the facts
More informationWhite Paper on Financial Institution Vendor Management
White Paper on Financial Institution Vendor Management Virtually every organization in the modern economy relies to some extent on third-party vendors that facilitate business operations in a wide variety
More informationAvoiding The Hidden Costs
Avoiding The Hidden Costs of the Cloud Germany Enterprise Results 2013 CONTENTS 4 5 6 7 8 9 10 INTRODUCTION ROGUE CLOUD IMPLEMENTATIONS CLOUD BACK UP AND RECOVERY INEFFICIENT CLOUD STORAGE COMPLIANCE AND
More informationLegal exchange. Total Legal Spend Management Solution for Insurance Companies
TM Legal exchange Total Legal Spend Management Solution for Insurance Companies Legal exchange Helps Leading Insurance Companies Drive Strategic Thinking Delivering Unprecedented Insight into Litigation
More informationENN: SAP Access Control helps ENN to build Regular Role and Authority Risk Management Mechanism
2013 SAP AG or an SAP affiliate company. All rights reserved. ENN: SAP Access Control helps ENN to build Regular Role and Authority Risk Management Mechanism ENN Group Industry Energy Products and Services
More information12 Considerations for Managing Foreign Supplier Risk
12 Considerations for Managing Foreign Supplier Risk November 2014 Lockton Companies A growing number of manufacturers over the past VINCE GAFFIGAN, CPA EVP, Director, Risk Consulting Risk Management Services
More informationUser Agreement. Quality. Value. Efficiency.
User Agreement Quality. Value. Efficiency. Welcome to QVuE, the Leaders Network on Quality, Value and Efficiency website sponsored by The Medicines Company. The information provided in this Webinar Series
More informationAvoiding The Hidden Costs. of the Cloud
Avoiding The Hidden Costs of the Cloud 2013 CONTENTS 4 5 6 7 8 9 10 INTRODUCTION ROGUE CLOUD IMPLEMENTATIONS CLOUD BACK UP AND RECOVERY INEFFICIENT CLOUD STORAGE COMPLIANCE AND ediscovery SSL CERTIFICATE
More informationEthical hotlines and whistleblowing ensuring businesses are not in conflict with local laws
Ethical hotlines and whistleblowing ensuring businesses are not in conflict with local laws 16 January 2014 Robert Bond, CCEP Partner and Notary Public Our Team Speechly Bircham is an ambitious, full-service
More informationWhat You Need to Know about the U.S. Foreign Corrupt Practices Act
What You Need to Know about the U.S. Foreign Corrupt Practices Act Angella Castille Faegre Baker Daniels LLP Presentation to Indiana University October 9, 2012 Overview Introduction Enforcement Trends
More informationWhat s the Path? Information Life-cycle part of Vendor Management
Disclaimer The materials provided in this presentation and any comments or information provided by the presenter are for educational purposes only and nothing conveyed or provided should be considered
More informationCARDINAL RESOURCES LLC INTRODUCTION
CARDINAL RESOURCES LLC ANTI- BRIBERY AND ANTI- CORRUPTION POLICY INTRODUCTION The purpose of this Anti- bribery and Anti- corruption Policy (the "Policy") is to ensure compliance by the Red Bird Group
More informationRISK MANAGEMENt AND INtERNAL CONtROL
RISK MANAGEMENt AND INtERNAL CONtROL Overview 02-09 Internal control the Board meets regularly throughout the year and has adopted a schedule of matters which are required to be brought to it for decision.
More informationSecurity in Fax: Minimizing Breaches and Compliance Risks
Security in Fax: Minimizing Breaches and Compliance Risks Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information
More informationOMNI TECHNICAL SOLUTIONS. Business Ethics, Compliance, Anti-Corruption and Anti-Money Laundering Policy
OMNI TECHNICAL SOLUTIONS Business Ethics, Compliance, Anti-Corruption and Anti-Money Laundering Policy Updated: September 2015 Table of Contents 1. Introduction... 2 2. Business Ethics... 3 2.1 Compliance...
More informationOverview. What are operational policies? Development, adoption, implementation
Practical Geospatial Policies: Resolving Operational Issues to Optimize Your SDI Ed Kennedy Hickling Arthurs Low Corporation and Cynthia Mitchell and Simon Riopel Division, Natural Resources Canada Overview
More information2,000,000 files on 240 computers in 3 countries. By Monday. How?*
e-discovery Services 2,000,000 files on 240 computers in 3 countries. By Monday. How?* *connectedthinking With dedicated forensic labs in Zurich and Lausanne, our Swiss team of skilled professionals have
More informationHow To Know If You Can Get A Job At A Company
What Maritime Lawyers Need to Know about the Foreign Corrupt Practices Act (FCPA) and other anti-corruption laws? Presented by Evelyn M. Suarez & Jim Barratt 2015 Port Administration & Legal Issues Seminar
More informationRight-Sizing Electronic Discovery: The Case For Managed Services. A White Paper
Right-Sizing Electronic Discovery: The Case For Managed Services A White Paper 1 2 Table of Contents Introduction....4 An Overview of the Options...4 Insourcing: Bringing E-Discovery Processes In-House....4
More informationManaged Security in the Enterprise (U.S. Enterprise)
MANAGED SECURITY IN THE ENTERPRISE Managed Security in the Enterprise (U.S. Enterprise) March 2009 CONTENTS Executive overview... 3 Methodology... 4 Demographics... 5 Finding 1: Cyber Risk a Big Problem...
More informationCloud Computing: Contracting and Compliance Issues for In-House Counsel
International In-house Counsel Journal Vol. 6, No. 23, Spring 2013, 1 Cloud Computing: Contracting and Compliance Issues for In-House Counsel SHAHAB AHMED Director Legal and Corporate Affairs, Microsoft,
More informationSamsung Engineering Co., Ltd.
Introduction to Our Compliance Program Samsung Engineering Co., Ltd. 500 Samsung GEC, Sangil-dong, Gangdong-gu, Seoul, Korea 134-090 +82-2-2053-3000 www.samsungengineering.com 03 Since its establishment
More informationCustomers have noticed that we are very responsive, meet our service level agreements, and are more cost conscious. MIKE ROBINSON
AMDOCS CUSTOMER success story AMDOCS HELPS VIRGIN MEDIA IMPROVE WORKFLOW AND INCREASE EFFICIENCY BY MORE THAN 10% Customers have noticed that we are very responsive, meet our service level agreements,
More informationOPENREACH SET TO DELIVER CUSTOMER SERVICE TRANSFORMATION WITH AMDOCS CONSULTANCY
AMDOCS CUSTOMER success story OPENREACH SET TO DELIVER CUSTOMER SERVICE TRANSFORMATION WITH AMDOCS CONSULTANCY We wanted a partner that would talk straight with us, and that s exactly the Amdocs approach.
More informationMATTHEWS INTERNATIONAL CORPORATION
MATTHEWS INTERNATIONAL CORPORATION U.S. FOREIGN CORRUPT PRACTICES ACT COMPLIANCE POLICY INTRODUCTION Principles Underlying the United States Foreign Corrupt Practices Act ( FCPA ). The FCPA s Anti-Bribery
More information{>> Foreign Corrupt Practices Act //]
{>> Foreign Corrupt Practices Act //] FCPA Defintion FCPA Definition FOREIGN CORRUPT PRACTICES ACT - The risk of doing business abroad has just increased dramatically as non compliance with the Foreign
More informationTop 5 reasons to choose HP Information Archiving
Technical white paper Top 5 reasons to choose HP Information Archiving Proven, market-leading archiving solutions The value of intelligent archiving The requirements around managing information are becoming
More informationM&A in 2015: Successor Liability Under the FCPA. Norton Rose Fulbright US LLP Thursday, February 26, 2015
M&A in 2015: Successor Liability Under the FCPA Norton Rose Fulbright US LLP Thursday, February 26, 2015 Speaker Marsha Z. Gerber Partner Norton Rose Fulbright US LLP Marsha Gerber is a partner in the
More informationPROTIVITI FLASH REPORT
PROTIVITI FLASH REPORT Is Department of Justice Dismissal of Morgan Stanley Case a Litmus Test for Corruption Risk Compliance? November 1, 2012 In April 2012, a former Morgan Stanley managing director
More informationStrategies for Developing a Document Imaging & Electronic Retention Program
Is it okay to destroy the paper source records? Are there any exceptions? Strategies for Developing a Document Imaging & Electronic Retention Program How do we ensure the program will stand up in court?
More informationEXAMPLES OF FUNCTIONAL COMPETENCIES
EXAMPLES OF FUNCTIONAL COMPETENCIES Functional competencies are specific to a specific department or type of job. Functional competencies describe the knowledge, skill, and/or abilities required to fulfill
More informationTERMS and CONDITIONS OF USE - NextSTEPS TM
TERMS and CONDITIONS OF USE - NextSTEPS TM DATED MARCH 24, 2014. These terms and conditions of use (the Terms and Conditions ) govern your use of the website known as NextSTEPS TM, https://www.stepsonline.ca/
More informationAchieving & Maintaining E-discovery Fitness
E-DISCOVERY W HITE PAPER Advice from Fortune 1000 E-discovery Experts: Achieving & Maintaining E-discovery Fitness By Ari Kaplan, Principal, Ari Kaplan Advisors Introduction Introduction Fitness is an
More informationApplication Programming Interface (API) Application (app) - The API app is the connector between epages and the developers service.
Developer Program 0. Preamble epages is the owner and vendor of the online shop software epages which enables merchants to run their online shop in the cloud. epages provides a developer program for third
More informationA Best Practice Guide
A Best Practice Guide Contents Introduction [2] The Benefits of Implementing a Privacy Management Programme [3] Developing a Comprehensive Privacy Management Programme [3] Part A Baseline Fundamentals
More informationOur Vendor Code of Conduct
Our Vendor Code of Conduct Jones Lang LaSalle and LaSalle Investment Management Vendor Code of Conduct Copyright Jones Lang LaSalle IP, Inc. Ethics Everywhere Where we stand Jones Lang LaSalle stands for
More informationPROTIVITI FLASH REPORT
PROTIVITI FLASH REPORT Even Retailers and Consumer Products Manufacturers Must Manage Compliance with the U.S. Foreign Corrupt Practices Act and Other Anti-Bribery Laws May 3, 2012 Recent reports of alleged
More informationManaging for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud sponsored by Managing for the Long Term: Keys to
More informationCustomer Cloud Adoption: From Development To The Data Center
A Custom Technology Adoption Profile Commissioned By Dell Customer Cloud Adoption: From Development To The Data Center September 2013 Introduction Where are customers today on their cloud journeys, and
More informationHow To Evaluate Saas And Cloud Solutions
Written in collaboration with SaaS Marketing Strategy Advisors Evaluating SaaS and Cloud Solutions: Effective Solution Overview Organizations of all sizes and across all industries have been rapidly adopting
More informationVideo conferencing just became clearer NEC conferencing & collaboration
Video conferencing just became clearer NEC conferencing & collaboration NEC Australia nec.com.au Maximise your business communications with NEC s conferencing & collaboration solution. Communicate, collaborate
More informationChapter 1. Getting to Know Email Archiving Systems
Chapter 1 Email Archiving Basics In This Chapter Understanding basic email archiving systems Choosing between on-premise, hosted, and hybrid solutions Understanding the storage benefits of email archiving
More informationSELECTED LEGAL ISSUES
SELECTED LEGAL ISSUES OF CLOUD COMPUTING Geneva, June 26, 2014 Internet Law Summer School Michel Jaccard Juliette Ancelle id est avocats, Lausanne www.idest.pro @idestavocats 1 What is «cloud computing»?
More informationGlobal Privacy and Data Security in the Cloud September 14, 2011 Miriam Wugmeister
2011 Morrison & Foerster LLP All Rights Reserved mofo.com Global Privacy and Data Security in the Cloud September 14, 2011 Miriam Wugmeister Presenter Miriam Wugmeister Morrison & Foerster LLP New York
More informationINTELLECTUAL ASSET MANAGEMENT DATA SECURITY IN THE CLOUD. Protecting the assets that protect your business
INTELLECTUAL ASSET MANAGEMENT DATA SECURITY IN THE CLOUD Protecting the assets that protect your business Data privacy and security is a huge issue that even precedes Big Data; we at Thomson Reuters have
More informationMeeting E-Discovery Challenges with Confidence
Meeting E-Discovery Challenges with Confidence Meeting today s e-discovery and information governance challenges while setting the foundation for tomorrow s requirements is the goal of every legal team.
More informationHow to Manage Costs and Expectations for Successful E-Discovery: Best Practices
How to Manage Costs and Expectations for Successful E-Discovery: Best Practices Mukesh Advani, Esq., Advisory Board Member, UBIC North America, Inc. UBIC North America, Inc. 3 Lagoon Dr., Ste. 180, Redwood
More informationTitle: Number: Responsible Office: Last Revision:
Title: Number: Responsible Office: Last Revision: Cloud Computing: Opportunities Used Safely G4 004D Information Security and Privacy Office July 2011 The following guidance was developed and published
More informationCloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
More informationHILLENBRAND, INC. AND SUBSIDIARIES. Global Anti-Corruption Policy Statement and Compliance Guide
HILLENBRAND, INC. AND SUBSIDIARIES Global Anti-Corruption Policy Statement and Compliance Guide Hillenbrand, Inc., including all of its subsidiaries (referred to collectively as the Company ), maintains
More informationValue of a Purpose-Built Third-Party Compliance Solution
Value of a Purpose-Built Third-Party Compliance Solution Introduction Multinational corporations routinely engage third parties such as sales agents, consultants, brokers, distributors, resellers, suppliers,
More informationWHITE PAPER. Steps to select the right Outsourcing Vendor
WHITE PAPER Steps to select the right Outsourcing Vendor INTRODUCTION The process of selecting an outsourcing vendor implies a complex multistage process to evaluate not only what the provider can do,
More informationEADS-NA Code of Ethics
Page: 1 of 7 EADS-NA Code of Ethics Introduction The Company demands high ethical standards of conduct from its directors, employees, and agents and will conduct its business with honesty, integrity, and
More informationElectronic Discovery How can I be prepared? September 2010
Electronic Discovery How can I be prepared? September 2010 Presented by Brian Wilkinson, Director of ediscovery & Computer Forensics brian.wilkinson@us.pwc.com 410-659-3473 Table of Contents Page 1 Electronic
More informationBELGIUM S LEADING MULTI-PLAY SERVICE PROVIDER IMPROVES THE CUSTOMER EXPERIENCE AND AGENT EFFICIENCY WITH AMDOCS
AMDOCS CUSTOMER success story BELGIUM S LEADING MULTI-PLAY SERVICE PROVIDER IMPROVES THE CUSTOMER EXPERIENCE AND AGENT EFFICIENCY WITH AMDOCS Amdocs OPS is a very powerful and useful tool and has had a
More information