Network Security Trends in the Era of Cloud and Mobile Computing

Size: px
Start display at page:

Download "Network Security Trends in the Era of Cloud and Mobile Computing"

Transcription

1 Research Reprt Abstract: Netwrk Security Trends in the Era f Clud and Mbile Cmputing By Jn Oltsik, Senir Principal Analyst and Bill Lundell, Senir Research Analyst With Jennifer Gahm, Senir Prject Manager and Kyle Prigmre, Assciate Analyst August by The Enterprise Strategy Grup, Inc. All Rights Reserved.

2 Intrductin Research Objectives Research Reprt: Netwrk Security Trends in the Era f Clud and Mbile Cmputing In rder t accurately assess rganizatins netwrk security plicies, prcesses, rganizatins, and technlgies, ESG recently surveyed 397 security prfessinals representing enterprise-class (1,000 emplyees r mre) rganizatins in Nrth America. All respndents were respnsible fr r directly invlved in the planning, implementatin, r peratins f their rganizatin s netwrk security plicies, prcesses, r technical safeguards. The survey was designed t answer questins abut: Netwrk security knwledge and pinins D IT rganizatins believe that netwrk security is getting mre difficult? If s, why? What is driving netwrk security strategy? What are the biggest netwrk security challenges fr enterprise rganizatins? The rganizatin respnsible fr netwrk security D rganizatins have the right skills and staff levels t address netwrk security? Which grup(s) are respnsible fr netwrk security tday? Are there any changes planned? Which grups are respnsible fr individual netwrk security tasks? Are there any day-t-day prblems with these grups? Netwrk security technlgies What types f security cntrls and technlgies are used tday? Hw are these changing? Hw are rganizatins adpting specific types f security technlgies such as netwrk access cntrls, next-generatin firewalls, and netwrk-based anti-malware technlgies? What are the mst cmpelling features and use cases fr these technlgies? Virtual netwrk security appliances and the use f sftware-defined netwrking (SDN) Are rganizatins using virtual security appliances? If nt, why? Are rganizatins deplying SDN? If s, what is the security grup s rle in this prcess? What are the mst cmpelling use cases fr SDN as it applies t netwrk security? Netwrk security strategies What d security prfessinals need frm netwrk security in the future? Hw are their netwrk security strategies impacting their current technlgy decisins? Survey participants represented a wide range f industries including financial services, manufacturing, business services, cmmunicatins and media, and gvernment. Fr mre details, please see the Research Methdlgy and Respndent Demgraphics sectins f this reprt by The Enterprise Strategy Grup, Inc. All Rights Reserved.

3 Research Methdlgy T gather data fr this reprt, ESG cnducted a cmprehensive nline survey f IT and infrmatin security prfessinals frm private- and public-sectr rganizatins in Nrth America (United States and Canada) between April 22, 2014 and May 5, T qualify fr this survey, respndents were required t be IT prfessinals directly invlved in the planning, implementatin, and/r peratins f their rganizatins netwrk security plicies, prcesses, r technical safeguards. All respndents were prvided an incentive t cmplete the survey in the frm f cash awards and/r cash equivalents. After filtering ut unqualified respndents, remving duplicate respnses, and screening the remaining cmpleted respnses (n a number f criteria) fr data integrity, we were left with a final ttal sample f 397 IT and infrmatin security prfessinals. Please see the Respndent Demgraphics sectin f this reprt fr mre infrmatin n these respndents. Nte: Ttals in figures and tables thrughut this reprt may nt add up t 100% due t runding.

4 Research Reprt: Netwrk Security Trends in the Era f Clud and Mbile Cmputing Respndent Demgraphics The data presented in this reprt is based n a survey f 397 qualified respndents. Figures 1 thrugh 4 detail the demgraphics f the respndent base, including individual respndents rles, as well as respndent rganizatins ttal number f emplyees, primary industry, and annual revenue. Respndents by Rle Respndents current rle with their rganizatin is shwn in Figure 1. Figure 1. Survey Respndents by Rle Which f the fllwing best describes yur current respnsibility within yur rganizatin? (Percent f respndents, N=397) IT staff, 11% IT management, 23% Respndents by Number f Emplyees The number f emplyees in respndents rganizatins is shwn in Figure 2. Figure 2. Survey Respndents by Number f Emplyees Senir IT management (e.g., CIO, VP f IT, Directr f IT, etc.), 65% Surce: Enterprise Strategy Grup, Hw many ttal emplyees des yur rganizatin have wrldwide? (Percent f respndents, N=397) 20,000 r mre, 25% 1,000 t 2,499, 16% 10,000 t 19,999, 12% 2,500 t 4,999, 26% 5,000 t 9,999, 21% Surce: Enterprise Strategy Grup, by The Enterprise Strategy Grup, Inc. All Rights Reserved.

5 Respndents by Industry Research Reprt: Netwrk Security Trends in the Era f Clud and Mbile Cmputing Respndents were asked t identify their rganizatins primary industry. In ttal, ESG received cmpleted, qualified respndents frm individuals in 19 distinct vertical industries, plus an Other categry. Respndents were then gruped int the brader categries shwn in Figure 3. Figure 3. Survey Respndents by Industry What is yur rganizatin s primary industry? (Percent f respndents, N=397) Cmmunicatins & Media, 7% Other, 16% Financial (banking, securities, insurance), 22% Gvernment (Federal/Natinal, State/Prvince/Lcal), 7% Business Services (accunting, cnsulting, legal, etc.), 7% Retail/Whlesale, 10% Health Care, 11% Manufacturing, 21% Surce: Enterprise Strategy Grup, Respndents by Annual Revenue Respndent rganizatins annual revenue is shwn in Figure 4. Figure 4. Survey Respndents by Annual Revenue 25% What is yur rganizatin s ttal annual revenue ($US)? (Percent f respndents, N=397) 22% 20% 15% 15% 14% 14% 13% 10% 5% 3% 6% 8% 4% 0% Less than $100 millin $100 millin t $ millin $250 millin t $ millin $500 millin t $ millin $1 billin t$5 billin t $4.999 $9.999 billin billin $10 billin $20 billin t $ r mre billin Nt applicable (e.g., public sectr, nnprfit) Surce: Enterprise Strategy Grup, by The Enterprise Strategy Grup, Inc. All Rights Reserved.

6 Research Reprt: Netwrk Security Trends in the Era f Clud and Mbile Cmputing Cntents List f Figures... 3 List f Tables... 4 Executive Summary... 5 Reprt Cnclusins... 5 Intrductin... 8 Research Objectives... 8 Research Findings... 9 ESG s Netwrk Security Segmentatin Mdel... 9 The Netwrk Security Landscape The State f Netwrk Security Netwrk and Security Staffing Netwrk Security Technlgy Use f Netwrk Access Cntrls Next-generatin Firewalls (NGFWs) Netwrk-based Anti-Malware Security, Virtualizatin, and Sftware-defined Netwrking (SDN) Cnclusin Research Implicatins fr Infrmatin Security Vendrs Research Implicatins fr IT and Infrmatin Security Prfessinals Research Methdlgy Respndent Demgraphics Respndents by Rle Respndents by Number f Emplyees Respndents by Industry Respndents by Annual Revenue by The Enterprise Strategy Grup, Inc. All Rights Reserved.

7 Research Reprt: Netwrk Security Trends in the Era f Clud and Mbile Cmputing List f Figures Figure 1. Netwrk Security Is the Mst Significant Netwrking Investment in Figure 2. ESG Netwrk Security Segmentatin Mdel Figure 3. Change in Netwrk Security Over the Last Tw Years Figure 4. Change in Netwrk Security Over the Last Tw Years, by Segmentatin Mdel Figure 5. Factrs That Have Made Netwrk Security Management and Operatins Mre Difficult Cmpared with Tw Years Ag Figure 6. Biggest Netwrk Security Challenges Figure 7. Factrs That Have the Mst Significant Impact n Shaping Organizatins Netwrk Security Strategy Figure 8. Primary Netwrk Security Strategy Objectives Figure 9. Security Organizatins Rate Their Netwrk Security Prficiency Figure 10. Hw Organizatins Manage and Operate Netwrk Security Prcesses and Technlgy Figure 11. Day-t-day Cllabratin n Netwrk Security Between IT Security and Netwrking Grups Figure 12. Divisin f Labr fr Netwrk Security Tasks Figure 13. Organizatinal Challenges Between IT Security and Netwrk Teams Specific t Netwrk Security Figure 14. Emplyment f a Netwrk Security Architect(s) Figure 15. Emplyment f a Netwrk Security Architect(s), by Segmentatin Mdel Figure 16. Organizatins Apprach t Netwrk Security Figure 17. Organizatins Apprach t Netwrk Security, by Segmentatin Mdel Figure 18. Hw Organizatins Learn Abut Netwrk Security Prduct and Technlgy Innvatin Figure 19. Organizatins Strategy fr Netwrk Security Investment Figure 20. Spending Change fr Perimeter and Internal Netwrk Security Defenses Figure 21. Technlgies and Hw They Are Used as Part f Organizatin s Netwrk Security Strategy Figure 22. Enfrcement f Netwrk Access Cntrls Figure 23. Enfrcement f Netwrk Access Cntrls, by Segmentatin Mdel Figure 24. Factrs Driving Organizatins t Use Netwrk Access Cntrls Figure 25. Netwrk Access Plicy Parameters Figure 26. Types f Netwrk Access Cntrls Enfrced/Planned t be Enfrced Figure 27. Respndents Familiarity with Next-generatin Firewalls Figure 28. Respndents Familiarity with Next-generatin Firewalls, by Segmentatin Mdel Figure 29. Deplyment f Next-generatin Firewalls Figure 30. Mst Apprpriate Use Case fr Next-generatin Firewalls Figure 31. Mst Cmpelling Features f Next-generatin Firewalls Figure 32. Mst Imprtant Requirements fr a Data Center Firewall Figure 33. Netwrk-based Anti-malware Deplyment Figure 34. Mst Cmpelling Features f Netwrk-based Anti-Malware Technlgy Figure 35. Anti-malware Technlgy and Analytics Integratin n Netwrks and Endpints Figure 36. Anti-malware Technlgy and Analytics Integratin n Netwrks and Endpints, by Segmentatin Mdel Figure 37. Use f Virtual Security Appliances Figure 38. Use f Virtual Security Appliances, by Segmentatin Mdel Figure 39. Factrs That Held Organizatins Back frm Mre Extensive Use f Virtual Security Appliances Figure 40. Respndents Familiarity with SDN Technlgies Figure 41. Respndents Familiarity with SDN Technlgies, by Segmentatin Mdel Figure 42. SDN Technlgy Usage Figure 43. SDN Technlgy Usage, by Segmentatin Mdel Figure 44. Hw Organizatins Evaluated SDN Technlgy Figure 45. Hw Netwrking and Security Teams Wuld Learn Abut SDN Figure 46. SDN Deplyment Strategy Figure 47. SDN Security Use Cases by The Enterprise Strategy Grup, Inc. All Rights Reserved.

8 Research Reprt: Netwrk Security Trends in the Era f Clud and Mbile Cmputing Figure 48. Vendr Services/Supprt Items That Wuld Be Mst Helpful in Mving Frward with a Net-new Netwrk Security Initiative Figure 49. Survey Respndents by Rle Figure 50. Survey Respndents by Number f Emplyees Figure 51. Survey Respndents by Industry Figure 52. Survey Respndents by Annual Revenue List f Tables Table 1. Primary Objectives fr Organizatins Netwrk Security Strategy, by Segmentatin Mdel Table 2. Hw Organizatins Manage and Operate Netwrk Security Prcesses and Technlgy, by Segmentatin Mdel Table 3. Primary Netwrk Security Strategy Objectives, by Segmentatin Mdel Table 4. Hw Organizatins Use Varius Technlgies as Part f Their Netwrk Security Strategy, by Segmentatin Mdel Table 5. Netwrk-based Anti-malware Deplyment, by Segmentatin Mdel Table 6. Mst Cmpelling Features f Netwrk-based Anti-Malware Technlgy, by Segmentatin Mdel All trademark names are prperty f their respective cmpanies. Infrmatin cntained in this publicatin has been btained by surces The Enterprise Strategy Grup (ESG) cnsiders t be reliable but is nt warranted by ESG. This publicatin may cntain pinins f ESG, which are subject t change frm time t time. This publicatin is cpyrighted by The Enterprise Strategy Grup, Inc. Any reprductin r redistributin f this publicatin, in whle r in part, whether in hard-cpy frmat, electrnically, r therwise t persns nt authrized t receive it, withut the express cnsent f The Enterprise Strategy Grup, Inc., is in vilatin f U.S. cpyright law and will be subject t an actin fr civil damages and, if applicable, criminal prsecutin. Shuld yu have any questins, please cntact ESG Client Relatins at by The Enterprise Strategy Grup, Inc. All Rights Reserved.

9 20 Asylum Street Milfrd, MA Tel: Fax:

Research Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013

Research Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013 Research Reprt Abstract: Advanced Malware Detectin and Prtectin Trends By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm, Senir Prject Manager September 2013 2013 by The Enterprise Strategy Grup,

More information

Research Report. Abstract: Security Management and Operations: Changes on the Horizon. July 2012

Research Report. Abstract: Security Management and Operations: Changes on the Horizon. July 2012 Research Reprt Abstract: Security Management and Operatins: Changes n the Hrizn By Jn Oltsik, Senir Principal Analyst With Kristine Ka and Jennifer Gahm July 2012 2012, The Enterprise Strategy Grup, Inc.

More information

Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012

Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012 Research Reprt Abstract: The Emerging Intersectin Between Big Data and Security Analytics By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm Nvember 2012 2012 by The Enterprise Strategy Grup, Inc.

More information

Research Report. Abstract: Data Center Networking Trends. January 2012. By Jon Oltsik With Bob Laliberte and Bill Lundell

Research Report. Abstract: Data Center Networking Trends. January 2012. By Jon Oltsik With Bob Laliberte and Bill Lundell Research Reprt Abstract: Data Center Netwrking Trends By Jn Oltsik With Bb Laliberte and Bill Lundell January 2012 2012 Enterprise Strategy Grup, Inc. All Rights Reserved. Intrductin Research Objective

More information

2010 AT&T Business Continuity Study CENTRAL REGION (Missouri) Results

2010 AT&T Business Continuity Study CENTRAL REGION (Missouri) Results 2010 Business Cntinuity Study: Missuri 2010 AT&T Business Cntinuity Study CENTRAL REGION (Missuri) Results Key Findings IT Plans fr 2010 IT budgets fr 2010 are abut the same r higher than thse f the previus

More information

2013 Small and Medium Businesses Mobile Solutions Study

2013 Small and Medium Businesses Mobile Solutions Study 2013 Small and Medium Businesses Mbile Slutins Study April, 2013 Sanjeev Aggarwal Laurie McCabe 4/15/2013 Cpyright SMB Grup 1 Why is Mbility Slutins Imprtant? In the next 3-4 years the mbile internet traffic

More information

2012 Global Business Intelligence Software Survey: Companies Desire Smaller, Better Targeted End-User Solutions

2012 Global Business Intelligence Software Survey: Companies Desire Smaller, Better Targeted End-User Solutions 2012 BizTechReprts Editrial Directr: Lane F. Cper Industry Relatins Directr: Carl J. Cper 2012 Glbal Business Intelligence Sftware Survey: Cmpanies Desire Smaller, Better Targeted End-User Slutins Bth

More information

Request for Resume (RFR) CATS II Master Contract. All Master Contract Provisions Apply

Request for Resume (RFR) CATS II Master Contract. All Master Contract Provisions Apply Sectin 1 General Infrmatin RFR Number: (Reference BPO Number) Functinal Area (Enter One Only) F50B3400026 7 Infrmatin System Security Labr Categry A single supprt resurce may be engaged fr a perid nt t

More information

Business Intelligence represents a fundamental shift in the purpose, objective and use of information

Business Intelligence represents a fundamental shift in the purpose, objective and use of information Overview f BI and rle f DW in BI Business Intelligence & Why is it ppular? Business Intelligence Steps Business Intelligence Cycle Example Scenaris State f Business Intelligence Business Intelligence Tls

More information

White. Paper. A Roadmap for BYOD Adoption. December 2014

White. Paper. A Roadmap for BYOD Adoption. December 2014 White Paper A Radmap fr BYOD Adptin By Jn Oltsik, Sr. Principal Analyst with Kyle Prigmre and Jhn McKnight December 2014 This ESG White Paper was cmmissined by Extreme Netwrks and is distributed under

More information

The Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future

The Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future The Imprtance Advanced Data Cllectin System Maintenance Berry Drijsen Glbal Service Business Manager WHITE PAPER knwledge t shape yur future The Imprtance Advanced Data Cllectin System Maintenance Cntents

More information

To achieve these objectives we will use a combination of lectures, cases, class discussion, and exercises.

To achieve these objectives we will use a combination of lectures, cases, class discussion, and exercises. 95-730 E-business Technlgy and Management Curse Descriptin The Internet, and assciated technlgies, are nw an established element f the IT prtfli f rganizatins in bth the public and private sectrs. Experiments

More information

Personal Data Security Breach Management Policy

Personal Data Security Breach Management Policy Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner

More information

2012 Small and Medium Businesses Routes to Market Study

2012 Small and Medium Businesses Routes to Market Study 2012 Small and Medium Businesses Rutes t Market Study September, 2012 Sanjeev Aggarwal Laurie McCabe Arjun Aggarwal July 2010 Cpyright 2010, SMB Grup, All rights reserved 1 Table f Cntents Executive Summary

More information

Key Steps for Organizations in Responding to Privacy Breaches

Key Steps for Organizations in Responding to Privacy Breaches Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins

More information

Succession Planning & Leadership Development: Your Utility s Bridge to the Future

Succession Planning & Leadership Development: Your Utility s Bridge to the Future Successin Planning & Leadership Develpment: Yur Utility s Bridge t the Future Richard L. Gerstberger, P.E. TAP Resurce Develpment Grup, Inc. 4625 West 32 nd Ave Denver, CO 80212 ABSTRACT A few years ag,

More information

A Quick Read on the State of Small Business and the Small Business Success Index 2009 Baseline Study of Small Business Success

A Quick Read on the State of Small Business and the Small Business Success Index 2009 Baseline Study of Small Business Success A Quick Read n the State f Small Business and the Small Business Success Index 2009 Baseline Study f Small Business Success March 12, 2009 Spnsred by: Netwrk Slutins, LLC and Rbert H. Smith Schl f Business,

More information

CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT

CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT Plicy Number: 2.20 1. Authrity Lcal Gvernment Act 2009 Lcal Gvernment Regulatin 2012 AS/NZS ISO 31000-2009 Risk Management Principles

More information

Business Intelligence and DataWarehouse workshop

Business Intelligence and DataWarehouse workshop Business Intelligence and DataWarehuse wrkshp Benefits: Enables the Final year BE student/ Junir IT prfessinals t get a perfect blend f thery and practice n Business Intelligence and Data warehuse s as

More information

2012 Small and Medium Businesses Mobile Solutions Study

2012 Small and Medium Businesses Mobile Solutions Study 2012 Small and Medium Businesses Mbile Slutins Study April, 2012 Sanjeev Aggarwal Laurie McCabe Brent Leary Arjun Aggarwal 4/10/2012 Cpyright SMB Grup 1 Why is Mbility Slutins Imprtant? In the next 3-4

More information

Better Practice Guide Financial Considerations for Government use of Cloud Computing

Better Practice Guide Financial Considerations for Government use of Cloud Computing Better Practice Guide Financial Cnsideratins fr Gvernment use f Clud Cmputing Nvember 2011 Intrductin Many Australian Gvernment agencies are in the prcess f cnsidering the adptin f clud-based slutins.

More information

Change Management Process

Change Management Process Change Management Prcess B1.10 Change Management Prcess 1. Intrductin This plicy utlines [Yur Cmpany] s apprach t managing change within the rganisatin. All changes in strategy, activities and prcesses

More information

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337 HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders

More information

Sources of Federal Government and Employee Information

Sources of Federal Government and Employee Information Inf Surce Surces f Federal Gvernment and Emplyee Infrmatin Ridley Terminals Inc. TABLE OF CONTENTS General Infrmatin Intrductin t Inf Surce Backgrund Respnsibilities Institutinal Functins, Prgram and Activities

More information

FINANCIAL SERVICES FLASH REPORT

FINANCIAL SERVICES FLASH REPORT FINANCIAL SERVICES FLASH REPORT Draft Regulatry Cmpliance Management Guideline Released by the Office f the Superintendent f Financial Institutins May 5, 2014 On April 30, 2014, the Office f the Superintendent

More information

Direct Marketing Production Printing & Value-Added Services: A strategy for growth

Direct Marketing Production Printing & Value-Added Services: A strategy for growth A Queste Cmpany Direct Marketing Prductin Printing & Value-Added Services: A strategy fr grwth Prductin Printing & Media A Multi-Client Study Direct Marketing Prductin Printing & Value-Added Services:

More information

Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021

Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021 Multi-Year Accessibility Plicy and Plan fr NSF Canada and NSF Internatinal Strategic Registratins Canada Cmpany, 2014-2021 This 2014-21 accessibility plan utlines the plicies and actins that NSF Canada

More information

Osterman Research User Guides

Osterman Research User Guides Osterman Research User Guides Hw t Evaluate and Chse a Messaging Archival Slutin 2006 Editin Osterman Research, Cntural and RITE Chice have published a user guide that will help rganizatins f all sizes

More information

2011 Small and Medium Businesses Routes to Market Study

2011 Small and Medium Businesses Routes to Market Study 2011 Small and Medium Businesses Rutes t Market Study September, 2011 Sanjeev Aggarwal Laurie McCabe Arjun Aggarwal July 2010 Cpyright 2010, SMB Grup, All rights reserved 1 Table f Cntents Executive Summary

More information

SERVICES BEST PRACTICES

SERVICES BEST PRACTICES SERVICES SERVICES SERVICES BEST PRACTICES WHEN TO ENGAGE US Nt every study requires advanced prgramming and executin. Nt every team needs skills that are called upn nly infrequently. That s why CfMC partners

More information

MSB FINANCIAL CORP. MILLINGTON BANK AUDIT COMMITTEE CHARTER

MSB FINANCIAL CORP. MILLINGTON BANK AUDIT COMMITTEE CHARTER MSB FINANCIAL CORP. MILLINGTON BANK AUDIT COMMITTEE CHARTER This Audit Cmmittee Charter has been amended as f July 17, 2015. The Audit Cmmittee shall review and reassess this Charter annually and recmmend

More information

BYOD and Cloud Computing

BYOD and Cloud Computing BYOD and Clud Cmputing AIIM First Canadian Chapter May 22, 2014 Susan Nickle, Lndn Health Sciences Centre Chuck Rthman, Wrtzmans Sheila Taylr, Erg Infrmatin Management Cnsulting Clud cmputing Agenda What

More information

CRT205: CRITICAL THINKING

CRT205: CRITICAL THINKING CRT205: CRITICAL THINKING COURSE SYLLABUS Curse Start Date: 7/23/12 Curse End Date: 9/23/12 Cpyright Cpyright 2012, 2009, 2007, 2006 by University f Phenix. All rights reserved. University f Phenix is

More information

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus

More information

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer RUTGERS POLICY Sectin: 70.1.1 Sectin Title: Infrmatin Technlgy Plicy Name: Acceptable Use Plicy fr Infrmatin Technlgy Resurces Frmerly Bk: N/A Apprval Authrity: Senir Vice President fr Administratin Respnsible

More information

Accident Investigation

Accident Investigation Accident Investigatin APPLICABLE STANDARD: 1960.29 EMPLOYEES AFFECTED: All emplyees WHAT IS IT? Accident investigatin is the prcess f determining the rt causes f accidents, n-the-jb injuries, prperty damage,

More information

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy.

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy. Privacy Plicy The Central Equity Grup understands hw highly peple value the prtectin f their privacy. Fr that reasn, the Central Equity Grup takes particular care in dealing with any persnal and sensitive

More information

Support Services. v1.19 / 2015-07-02

Support Services. v1.19 / 2015-07-02 Supprt Services v1.19 / 2015-07-02 Intrductin - Table f Cntents 1 Intrductin... 3 2 Definitins... 4 3 Supprt Prgram Feature Overview... 5 4 SLA fr the Supprt Services... 6 4.1 Standard Supprt... 6 4.2

More information

Training Efficiency: Optimizing Learning Technology

Training Efficiency: Optimizing Learning Technology Ideas & Insights frm 2008 Training Efficiency Masters Series Survey Results Training Efficiency: Optimizing Learning Technlgy trainingefficiency.cm Survey Results: Training Efficiency: Optimizing Learning

More information

Mapping the provision of mental health services for asylum seekers and refugees in London: a report

Mapping the provision of mental health services for asylum seekers and refugees in London: a report Mapping the prvisin f mental health services fr asylum seekers and refugees in Lndn: a reprt March 2005 Kim Ward & David Palmer Schl f Scial Science and Public Plicy King's Cllege Lndn Strand Lndn WC2R

More information

Service Request Form

Service Request Form New Prfessinal Services Order Frm Editable PDF Service Request Frm If yu have any questins while filling ut this frm, please cntact yur CDM, email Prfessinal Services at PS@swipeclck.cm, r call 888-223-3250

More information

ready. aiim. learn. 2-day BPM Specialist Training Class - Learn global best practices for improving business processes

ready. aiim. learn. 2-day BPM Specialist Training Class - Learn global best practices for improving business processes 2-day BPM Specialist Training Class - Learn glbal best practices fr imprving business prcesses Intrductin The Business Prcess Management (BPM) Certificate Prgram is designed frm glbal best practices amng

More information

Creating an Ethical Culture and Protecting Your Bottom Line:

Creating an Ethical Culture and Protecting Your Bottom Line: Creating an Ethical Culture and Prtecting Yur Bttm Line: Best Practices fr Crprate Cdes f Cnduct Nte: The infrmatin belw and all infrmatin n this website is nt meant t be taken as legal advice. Please

More information

Corporate Standards for data quality and the collation of data for external presentation

Corporate Standards for data quality and the collation of data for external presentation The University f Kent Crprate Standards fr data quality and the cllatin f data fr external presentatin This paper intrduces a set f standards with the aim f safeguarding the University s psitin in published

More information

The Cost Benefits of the Cloud are More About Real Estate Than IT

The Cost Benefits of the Cloud are More About Real Estate Than IT y The Cst Benefits f the Clud are Mre Abut Real Estate Than IT #$#%&'()*( An Osterman Research Executive Brief Published December 2010 "#$#%&'()*( Osterman Research, Inc. P.O. Bx 1058 Black Diamnd, Washingtn

More information

First Global Data Corp.

First Global Data Corp. First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First

More information

Course Syllabus PADM 6510 - Management of Health Care Agencies College of Public Service and Urban Affairs Tennessee State University

Course Syllabus PADM 6510 - Management of Health Care Agencies College of Public Service and Urban Affairs Tennessee State University Curse Syllabus PADM 6510 - Management f Health Care Agencies Cllege f Public Service and Urban Affairs Tennessee State University Chester A. Rbinsn, D.P.A. Spring, 2008 Office (615) 963-7242 Tuesdays,

More information

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network 2361/Page 1 f 6 Hillsbrugh Bard f Educatin Acceptable Use Plicy fr Using the Hillsbrugh Twnship Public Schls Netwrk It is the gal f the HTPS (Hillsbrugh Twnship Public Schls) Netwrk t prmte educatinal

More information

HIPAA Notice of Privacy Practices. Central Ohio Surgical Associates, Inc.

HIPAA Notice of Privacy Practices. Central Ohio Surgical Associates, Inc. HIPAA Ntice f Privacy Practices Central Ohi Surgical Assciates, Inc. THIS NOTICE OF PRIVACY PRACTICES (THE NOTICE ) DESCRIBES HOW HEALTH INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN

More information

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1 Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues

More information

Cisco Innovation 2005 Study. Select Findings. August 2005

Cisco Innovation 2005 Study. Select Findings. August 2005 Select Findings August 2005 1 Objectives & Methdlgy Data Cllectin Timeframe: July 8-18, 2005 Respndent Prfile: Cmpany Prfile: Key Gegraphies: 635 ttal respndents 542 business decisin makers 93 IT decisin

More information

Enhanced Enterprise Mobility Assessment Program Description

Enhanced Enterprise Mobility Assessment Program Description Enhanced Enterprise Mbility Assessment Prgram Descriptin NOTE: This dcument is prvided fr infrmatinal purpses nly, and des nt in itself cnstitute a binding legal dcument. BlackBerry assumes n respnsibility

More information

HUMAN RESOURCE DEVELOPMENT FOR ADJUSTMENT AT THE ENTERPRISE LEVEL

HUMAN RESOURCE DEVELOPMENT FOR ADJUSTMENT AT THE ENTERPRISE LEVEL INTERNATIONAL LABOUR ORGANISATION ACT/EMP PUBLICATIONS [Tp] HUMAN RESOURCE DEVELOPMENT FOR ADJUSTMENT AT THE ENTERPRISE LEVEL Training Prgramme (Edited by C.S. Venkata Ratnam) [Next] Table f Cntents Intrductin

More information

SALARY CONSIDERATIONS FOR CANCER REGISTRARS

SALARY CONSIDERATIONS FOR CANCER REGISTRARS SALARY CONSIDERATIONS FOR CANCER REGISTRARS UPDATED 2012 SURVEY DATA SALARY CONSIDERATIONS FOR CANCER REGISTRARS UPDATED 2012 SURVEY DATA Natinal Cancer Registrars Assciatin 1340 Braddck Place, Suite 203

More information

Professional Leaders/Specialists

Professional Leaders/Specialists Psitin Prfile Psitin Lcatin Reprting t Jb family Band BI/Infrmatin Manager Wellingtn Prfessinal Leaders/Specialists Band I Date February 2013 1. POSITION PURPOSE The purpse f this psitin is t: Lead and

More information

Projects Director Report Guidelines. IPMA Level A

Projects Director Report Guidelines. IPMA Level A Prjects Directr Reprt Guidelines IPMA Level A Cntents 1. GENERAL PROVISIONS.. 2 2. PROJECT PORTFOLIO / PROGRAMME DESCRIPTION...2 3. PROJECTS DIRECTOR REPORT 5 4. ANNEXES..7 Authr Classificatin Status Electrnic

More information

Small Business Fraud Custom Study among Small Business Owners Conducted for SunTrust Banks/National Small Business Association/Edelman

Small Business Fraud Custom Study among Small Business Owners Conducted for SunTrust Banks/National Small Business Association/Edelman Small Business Fraud Custm Study amng Small Business Owners Cnducted fr SunTrust Banks/Natinal Small Business Assciatin/Edelman Octber 17, 2007 Objective & Methdlgy Objective In cllabratin with SunTrust

More information

Audit Committee Charter

Audit Committee Charter Audit Cmmittee Charter Membership The Audit Cmmittee (the "Cmmittee") f the Bard f Directrs (the "Bard") f Philip Mrris Internatinal Inc. (the "Cmpany") shall cnsist f at least three directrs all f whm

More information

Equal Pay Audit 2014 Summary

Equal Pay Audit 2014 Summary Equal Pay Audit 2014 Summary Abut the dcument The fllwing summary is an abridged versin f Ofcm s equal pay audit 2014. In the full versin f the reprt we set ut ur key findings, cmment n any issues arising

More information

GUIDELINE INFORMATION MANAGEMENT (IM) PROGRAM PLAN

GUIDELINE INFORMATION MANAGEMENT (IM) PROGRAM PLAN Gvernment f Newfundland and Labradr Office f the Chief Infrmatin Officer Infrmatin Management Branch GUIDELINE INFORMATION MANAGEMENT (IM) PROGRAM PLAN Guideline (Definitin): OCIO Guidelines derive frm

More information

The Importance of Market Research

The Importance of Market Research The Imprtance f Market Research 1. What is market research? Successful businesses have extensive knwledge f their custmers and their cmpetitrs. Market research is the prcess f gathering infrmatin which

More information

Job Profile Data & Reporting Analyst (Grant Fund)

Job Profile Data & Reporting Analyst (Grant Fund) Jb Prfile Data & Reprting Analyst (Grant Fund) Directrate Lcatin Reprts t Hurs Finance Slihull Finance Directr Nminally 37 hurs but peratinally available at all times t meet Cmpany requirements Cntract

More information

Captive outsourcing models

Captive outsourcing models Captive utsurcing mdels India TP hygiene wrkshp Presenter: Vishnu Bagri Octber 23, 2013 2013 Transfer Pricing Assciates Hlding B.V. BACKDROP + India has evlved as a premier utsurcing hub fr IT, ITES, engineering

More information

WHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy

WHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy WHAT YOU NEED TO KNOW ABOUT Prtecting yur Privacy YOUR PRIVACY IS OUR PRIORITY Credit unins have a histry f respecting the privacy f ur members and custmers. Yur Bard f Directrs has adpted the Credit Unin

More information

Systems Support - Extended

Systems Support - Extended 1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windws Services t dcument: The technlgy services the Enterprise Windws Services prvides t the custmer. The targets

More information

Online Learning Portal best practices guide

Online Learning Portal best practices guide Online Learning Prtal Best Practices Guide best practices guide This dcument prvides Micrsft Sftware Assurance Benefit Administratrs with best practices fr implementing e-learning thrugh the Micrsft Online

More information

CONTENTS UNDERSTANDING PPACA. Implications of PPACA Relative to Student Athletes. Institution Level Discussion/Decisions.

CONTENTS UNDERSTANDING PPACA. Implications of PPACA Relative to Student Athletes. Institution Level Discussion/Decisions. This dcument is intended t prvide NCAA member institutins with an infrmatinal guide regarding the ptential implicatins f the Patient Prtectin and Affrdable Care Act f 2010 (PPACA) when fully implemented

More information

INTRODUCTION TO PORTAL GROUP STUDIO

INTRODUCTION TO PORTAL GROUP STUDIO Mntana State University Luminis Prtal Prject INTRODUCTION TO PORTAL GROUP STUDIO Grup Studi With the Grup Studi sftware, yu can request the creatin f nline grups fr clubs, affiliatins, r interests and

More information

How To Ensure That The Internet Is Safe For A Health Care Worker

How To Ensure That The Internet Is Safe For A Health Care Worker POLICY Dc. Cde: IS I5 INTERNET - ACCEPTABLE USE Applicable t: MidCentral DHB Including MidCentral Health & Enable NZ Issued by: Infrmatin Systems Cntact: Manager Service Delivery 1. PURPOSE This plicy

More information

Standards and Procedures for Approved Master's Seminar Paper or Educational Project University of Wisconsin-Platteville Requirements

Standards and Procedures for Approved Master's Seminar Paper or Educational Project University of Wisconsin-Platteville Requirements Standards and Prcedures fr Apprved Master's Seminar Paper r Educatinal Prject University f Wiscnsin-Platteville Requirements Guidelines Apprved by the Graduate Cuncil University f Wiscnsin-Platteville

More information

Conversations of Performance Management

Conversations of Performance Management Cnversatins f Perfrmance Management Perfrmance Management at Ohi State The Secnd Cnversatin ~ Develpment 2011 The Ohi State University Office f Human Resurces Cntents Intrductin Welcme t Develping Emplyees...

More information

Data Warehouse Scope Recommendations

Data Warehouse Scope Recommendations Rensselaer Data Warehuse Prject http://www.rpi.edu/datawarehuse Financial Analysis Scpe and Data Audits This dcument describes the scpe f the Financial Analysis data mart scheduled fr delivery in July

More information

IN-HOUSE OR OUTSOURCED BILLING

IN-HOUSE OR OUTSOURCED BILLING IN-HOUSE OR OUTSOURCED BILLING Medical billing is ne f the mst cmplicated aspects f running a medical practice. With thusands f pssible cdes fr diagnses and prcedures, and multiple payers, the ability

More information

A.M. BEST RATING SERVICES, INC. RATING DIVISION INTERNAL POLICY AND PROCEDURE. Subject: Dissemination Number: CRPC Policy 5

A.M. BEST RATING SERVICES, INC. RATING DIVISION INTERNAL POLICY AND PROCEDURE. Subject: Dissemination Number: CRPC Policy 5 A.M. BEST RATING SERVICES, INC. RATING DIVISION INTERNAL POLICY AND PROCEDURE Subject: Disseminatin Number: CRPC Plicy 5 Effective Date: Nvember 29, 2006 Revisin Date: January 04, 2016 Purpse: The purpse

More information

Qualification Specification Level 3 Award in Effective Auditing and Inspection Skills

Qualification Specification Level 3 Award in Effective Auditing and Inspection Skills www.highfieldabc.cm Qualificatin Specificatin Level 3 Award in Effective Auditing and Inspectin Skills Highfield Place Unit 15 Shaw Wd Business Park Shaw Wd Way Wheatley Hills Dncaster Suth Yrkshire DN2

More information

2008 BA Insurance Systems Pty Ltd

2008 BA Insurance Systems Pty Ltd 2008 BA Insurance Systems Pty Ltd BAIS have been delivering insurance systems since 1993. Over the last 15 years, technlgy has mved at breakneck speed. BAIS has flurished in this here tday, gne tmrrw sftware

More information

CSAT Account Management

CSAT Account Management CSAT Accunt Management User Guide March 2011 Versin 2.1 U.S. Department f Hmeland Security 1 CSAT Accunt Management User Guide Table f Cntents 1. Overview... 1 1.1 CSAT User Rles... 1 1.2 When t Update

More information

Internet and E-Mail Policy User s Guide

Internet and E-Mail Policy User s Guide Internet and E-Mail Plicy User s Guide Versin 2.2 supprting partnership in mental health Internet and E-Mail Plicy User s Guide Ver. 2.2-1/5 Intrductin Health and Scial Care requires a great deal f cmmunicatin

More information

COMPREHENSIVE SAFETY ASSESSMENT INSTRUCTIONS for STUDY ABROAD PROGRAMS

COMPREHENSIVE SAFETY ASSESSMENT INSTRUCTIONS for STUDY ABROAD PROGRAMS COMPREHENSIVE SAFETY ASSESSMENT INSTRUCTIONS fr STUDY ABROAD PROGRAMS Belw is a list f items t address and questins that need t be addressed in the cmprehensive safety assessment. In additin t the safety

More information

MigrationWiz HIPAA Compliant Migration. Focus on data migration, not regulation. BitTitan Global Headquarters: 3933 Lake Washington Blvd NE Suite 200

MigrationWiz HIPAA Compliant Migration. Focus on data migration, not regulation. BitTitan Global Headquarters: 3933 Lake Washington Blvd NE Suite 200 MigratinWiz HIPAA Cmpliant Migratin Fcus n data migratin, nt regulatin. BitTitan Glbal Headquarters: 3933 Lake Washingtn Blvd NE Suite 200 Table f Cntents Kirkland, WA 98033 www.bittitan.cm sales@bittitan.cm

More information

SECTION J QUALITY ASSURANCE AND IMPROVEMENT PROGRAM

SECTION J QUALITY ASSURANCE AND IMPROVEMENT PROGRAM Audit Manual Sectin J SECTION J QUALITY ASSURANCE AND IMPROVEMENT PROGRAM Ref. Plicy and Practice Requirements IIA Standards and Other references J 1 Plicy: The Head f Internal Audit shall develp and maintain

More information

Financial advisr & Consultant Surveys - A Review

Financial advisr & Consultant Surveys - A Review INVESTOR PREFERENCES IN SELECTING A FINANCIAL ADVISOR December 1, 2014 1 Table f Cntents Page Objectives & Methdlgy. 3 Executive Summary 4 Detailed Findings... 6 Questinnaire. 14 2 Objectives & Methdlgy

More information

CMS Eligibility Requirements Checklist for MSSP ACO Participation

CMS Eligibility Requirements Checklist for MSSP ACO Participation ATTACHMENT 1 CMS Eligibility Requirements Checklist fr MSSP ACO Participatin 1. General Eligibility Requirements ACO participants wrk tgether t manage and crdinate care fr Medicare fee-fr-service beneficiaries.

More information

Fast Forward Your Talent Management Approach: A Guide to Succession and Talent Review

Fast Forward Your Talent Management Approach: A Guide to Succession and Talent Review Fast Frward Yur Talent Management Apprach: A Guide t Successin and Talent Review Sue Plaster, M.Ed. Sue Plaster Cnsulting plaster.sue @gmail.cm Agenda: Accelerating Talent Management 1. Setting the Stage:

More information

HIPAA HITECH ACT Compliance, Review and Training Services

HIPAA HITECH ACT Compliance, Review and Training Services Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical

More information

Organisational self-migration guide an overview V1-5 April 2014

Organisational self-migration guide an overview V1-5 April 2014 Organisatinal self-migratin guide an verview V1-5 April 2014 Cpyright 2013, Health and Scial Care Infrmatin Centre. 1 Self Migratin t NHSmail an verview fr rganisatins Cntents Intrductin 3 1. Initial preparatins

More information

HarePoint HelpDesk for SharePoint. For SharePoint Server 2010, SharePoint Foundation 2010. User Guide

HarePoint HelpDesk for SharePoint. For SharePoint Server 2010, SharePoint Foundation 2010. User Guide HarePint HelpDesk fr SharePint Fr SharePint Server 2010, SharePint Fundatin 2010 User Guide Prduct versin: 14.1.0 04/10/2013 2 Intrductin HarePint.Cm (This Page Intentinally Left Blank ) Table f Cntents

More information

ITIL Release Control & Validation (RCV) Certification Program - 5 Days

ITIL Release Control & Validation (RCV) Certification Program - 5 Days ITIL Release Cntrl & Validatin (RCV) Certificatin Prgram - 5 Days Prgram Overview ITIL is a set f best practices guidance that has becme a wrldwide-adpted framewrk fr Infrmatin Technlgy Services Management

More information

CCHIIM ICD-10 Continuing Education Requirements for AHIMA Certified Professionals (& Frequently Asked Questions for Recertification)

CCHIIM ICD-10 Continuing Education Requirements for AHIMA Certified Professionals (& Frequently Asked Questions for Recertification) CCHIIM ICD-10 Cntinuing Educatin Requirements fr AHIMA Certified Prfessinals (& Frequently Asked Questins fr Recertificatin) The transitin t ICD-10-CM and ICD-10-PCS is anticipated t imprve the capture

More information

Small Business, Enterprise and Employment Bill: Insolvency fact sheets Contents

Small Business, Enterprise and Employment Bill: Insolvency fact sheets Contents 1 Small Business, Enterprise and Emplyment Bill: Inslvency fact sheets Cntents Directr Disqualificatin and Inslvency General Aims... 2 Administratin: sales t cnnected persns (prepack administratins)...

More information

A. Early Case Assessment

A. Early Case Assessment Electrnic Discvery Reference Mdel Standards fr the identificatin f electrnically stred infrmatin in discvery http://www.edrm.net/resurces/standards/identificatin A. Early Case Assessment Once a triggering

More information

Addressing Mobile Device Security and Management Requirements in the Enterprise

Addressing Mobile Device Security and Management Requirements in the Enterprise White Paper Addressing Mbile Device Security and Management Requirements in the Enterprise By Jn Oltsik Octber, 2010 This ESG White Paper was cmmissined by Juniper Netwrks and is distributed under license

More information

Request for Proposal. Saskatchewan Arts Board. Database Development. RFP Reference Number S AB-ADMIN001. Release Date Februar y 9, 2016

Request for Proposal. Saskatchewan Arts Board. Database Development. RFP Reference Number S AB-ADMIN001. Release Date Februar y 9, 2016 Request fr Prpsal Saskatchewan Arts Bard Database Develpment RFP Reference Number S AB-ADMIN001 Release Date Februar y 9, 2016 Clsing Date March 1, 2016 Clsing Time 2:00 pm, Lcal Sask. Time Page 2 f 7

More information

Customer Service Description

Customer Service Description Page: 1 f 10 Hewlett-Packard Cmpany HP Services Slutin Center Custm Prjects Prgram http://www.hp.cm/hps/ perfrmance & availability sftware services per event supprt & cnsulting Custmer Service Descriptin

More information

Privacy Breach and Complaint Protocol

Privacy Breach and Complaint Protocol Privacy Breach and Cmplaint Prtcl Effective: December 31, 2012 Apprved by: Le McKenna, CFO 1.0 General Privacy breaches and privacy cmplaints will be handled in accrdance with this prtcl. This prtcl is

More information

This report provides Members with an update on of the financial performance of the Corporation s managed IS service contract with Agilisys Ltd.

This report provides Members with an update on of the financial performance of the Corporation s managed IS service contract with Agilisys Ltd. Cmmittee: Date(s): Infrmatin Systems Sub Cmmittee 11 th March 2015 Subject: Agilisys Managed Service Financial Reprt Reprt f: Chamberlain Summary Public Fr Infrmatin This reprt prvides Members with an

More information

DIVISION OF INFORMATION TECHNOLOGY

DIVISION OF INFORMATION TECHNOLOGY DIVISION OF INFORMATION TECHNOLOGY Cellphne/Tablet Repairs Overview Flrida Internatinal University s Divisin f Infrmatin Technlgy is seeking submissins frm prpsed Licensees wh are interested in perating

More information

White. Paper. HP Ethernet Virtual Interconnect: Extending the Benefits of Virtualized Environments Across Geographically Dispersed Data Centers

White. Paper. HP Ethernet Virtual Interconnect: Extending the Benefits of Virtualized Environments Across Geographically Dispersed Data Centers White Paper HP Ethernet Virtual Intercnnect: Extending the Benefits f Virtualized Envirnments Acrss Gegraphically Dispersed Data Centers By Bb Laliberte, Senir Analyst August 2012 This ESG White Paper

More information

Organization Design Specialist

Organization Design Specialist Organizatin Design Specialist Suthern Africa Regin BACKGROUND One f the key challenges t implementing the new strategic directin and especially the cmmitment t face the custmer (the child and the cmmunity)

More information