|
|
|
- Lynette Cook
- 10 years ago
- Views:
Transcription
1 The Software Quality Certication Triangle Jerey Voas Reliable Software Technologies Abstract The problem of certifying software's quality is being attacked in three distinct ways: (1) accrediting personnel, (2) certifying the development organization, and (3) assessing the goodness of the software. Here, we will discuss these approaches and briey discuss how hybrid approaches can be derived from them depending on the type of software that needs certication. 1 Introduction Quality software is often considered elusive. It is hard to achieve, and even harder to determine whether it was achieved. That is, it is more dicult to condently know that you have developed good software than it is to build good software. In the physical sciences, the reverse is true: it is easier to measure the degree of perfection than it is to achieve perfection. One reason why it is so hard to measure software quality stems from the many practical and theoretical deciencies of software testing. For example, consider that to be 99% condent that a program has a probability offailure of less than one in a million, you must test the software over 5 million times without ever observing a failure. Testing 5 million times requires that you have an oracle that is correct (an oracle is the person or other software program that knows what the correct software output is for each of those 5 million test cases). Rarely does a perfect oracle exist, and creating 5 million test cases could prove intractable. And even if you have the oracle and test cases, you still must test using them. Problems such as these have made many in the community decide that quality assessment of a software product is impractical. This has lead toward alternate approaches to software quality assessment. The key two competing approaches are: (1) process maturity assessment, and (2) accreditation of software professionals. The remainder of this article will look at the pros and cons of these three approaches (certifying the Product, Process, and Personnel). All of these approaches are aimed at predicting the quality of software. 1
2 Product Process Personnel Figure 1: The Software Quality Certication Triangle 2 Accrediting Personnel There are various ways to accredit (i.e., certify) personnel. The rigor with which personnel are certied will depend on the criticality of the services that the person will oer. Professional licensing examinations, practical experience, and earned degrees are dierent ways in which professionals can be accredited. For example, graduating from law school says something about a person's ability to practice law. It says, less, however than had the person also passed the bar. If this were not true, there would be no need for state bar exams. The intuition behind certifying \people skills" is simple: it should not be left up to the untrained consumer to be responsible for determining whether a candidate is qualied to perform the services that the person claims to be. For example, how can Joe Public be expected to determine whether a dentist is truly qualied? Only if Joe Public were a dentist would he have any hope of making such a determination. By forcing dental school graduates to pass an examination prepared by dentists, the state takes the responsibility away from Joe Public. Further, if a certied professional does not live up to the expectations of his or her peers, the professional could be found liable and could lose their certication. Like the more traditional professions (accounting, medicine, lawyers, pilots), the software industry is beginning to standardize on core principles that each professional should know. Microsoft claims that there are greater than 160,000 individuals that have become Microsoft certied as either product specialists, solution developers, trainers, and systems engineers [2]. This type of certication is voluntary and expensive however the costs of attaining it 2
3 can be made up in the rst year of working from the extra income that the certicate will enable. For example, to become a Microsoft Certied Systems Engineer (MCSE), you can expect to spend around $8,000 to $12,000 taking classes (and the total time it will take to get certied is around 6 months) [2]. And a person can expect to make about that much in additional income over a person that does not have the MCSE certicate. Like doctors, lawyers, and CPAs, rumblings are also being heard concerning mandatory software engineering personnel certication. A vote by the Texas Board of Professional Engineers on February 18, 1998 stated the Board's intention to recognize software engineering as a legitimate engineering discipline with plans to license professional engineers in that area. (A complete position statement from the Texas Board can be found at On June 17, 1998, the Texas Board gave unanimous approval to all proposals in this statement. In July, 1999, the Texas Board will begin licensing software engineers that can satisfy the following [1]: 1. Possession of an engineering degree, a computer science degree or some other high-level math or science degree that the Board will evaluate for adequacy 2. At least 16 years of creditable experience performing engineering work (12 years for those holding a degree approved by the Engineering Accreditation Commission of the Accreditation Board for Engineering Technology, Inc. (EAC/ABET) 3. References from at least 9 people, 5 of whom must be licensed engineers 4. Submission of documented credentials as required After the Texas Board releases a professional software engineering exam in 1999, individuals with less experience will be allowed to apply for a Texas P.E. license by taking that exam. 3 Assessing the Software Product Generally speaking, there are two approaches to product-based assessment of quality: whitebox and black-box. White-box assessment techniques would include activities such as collecting static code metrics or measuring the degree of coverage achieved during unit testing. Black-box techniques would include reliability testing. White-box and black-box techniques are not panaceas, however. For example, it is unclear as to what relationship a code complexity metric has to do with the reliability of the software. And reliability is based on logical correctness and the operational environment, not structural properties. Further, we cannot even exhaustively test a simple program that reads in two 32-bit integers [4]. 3
4 For today's push toward COTS software, white-box certication techniques are not even applicable by COTS consumers. Naturally white-box techniques can be applied by vendors if they volunteer to. This means that those COTS software consumers that are genuinely concerned about what lurks in the software they purchase need to decompile back to source in order to apply white-box analyses (such as coverage testing or inspections). Most licenses for COTS software deem this act as a violation of the licensing agreement. Further, pending global legislation is about to weaken the ability of consumers to get such analysis done by independent corporations or consultants. There is a global treaty up for US approval called the World Intellectual Property Organization (WIPO) Treaty. The treaty includes language that makes it illegal to reverse-engineer software to expose security vulnerabilities. The treaty will make it illegal for corporations and consulting services to conduct real-world testing of security software. Supposedly, research organizations will still be allowed to do so, however. President Clinton has announced his intentions to sign it and it is expected to pass in the House. The US Senate has already passed this measure by a score of This legislation is part of a global attempt to produce treaties that reduce the amount of copyright infringement on information technology. But the downside is that it disallows a consumer the right to independently certify the security of the software they purchase (without the vendor's permission). 4 Certifying Processes Because of the limitations associated with dierent forms of product assessment (testing as well as techniques such as formal verication), the notion of \directly assessing software quality" became dismissed as being implausible in the mid 80s. This opened the door to ideas such as using \process maturity assessment" and other indirect approaches. The most famous process assessment model is the SEI's CMM. This model and other manufacturinglike standards rely on one premise: good processes deliver good software. This premise has also lead to government regulatory standards for software certication in areas of avionics, medical devices, and electric power generation. The premise here is plausible. All that a developer need do is to score themselves using a pre-dened ranking scheme (for what is and is not good software development procedures) and then apply that score to their software. So for example, if development organization A is ranked higher than organization B, then software from A will be labeled as having more quality than software from B. The problem is that good processes cannot 'guarantee' good software [6]. If performed properly, good processes simply increase the likelihood. When processes are not performed 4
5 properly, the likelihood is reduced. However given a xed set of development processes, it is still possible that organization A, who improperly applies the set, produces better software than organization B, who properly applies the set. And this does not account for the issues relating to which processes are the \best." These facts, taken together, diminish the notion that process assessment will ever be a satisfactory substitute for product assessment. Ask yourself this: would you buy a car without test driving it? Few would, but this is precisely what we do when we employ process assessments in lieu of product assessment. Process assessments are analogous to having the car manufacturer telling you what the phases were that were undertaken during manufacturing, but that is certainly no substitute for taking a test drive. 5 Summary The hypothesis that certied personnel equates to higher quality software is easy to disprove. The hypothesis that a more mature process equates to higher quality software can also be easily debunked. True product assessment that studies the dynamic behavior of software is clearly the best approach to certifying software quality, but problems relating to feasibility often reduce our ability to perform it with any degree or thoroughness. The best approach will be to create a variety of dierent certication schemes based on: (1) the dierent types of exams or processes used from each of our three categories, and (2) the criticality of the software (safety-critical, games, etc.). That is, aspects of each of these three broad approaches can be combined into a single standard. For example, knowing that: (1) an organization has a certain process maturity, (2) the personnel that developed and tested the software were licensed, and (3) the software received certain forms of quality assessment should result in greater condence in the software's quality than if only one of these facts were known. The problem, naturally, is how to quantify subjective characteristics such as personnel accreditation. Nonetheless, it is plausible to develop dierent software quality certication schemes that weigh dierent techniques within our three approach groups appropriately with respect to the criticality of the software. Before we end, let's examine what role quality certication can play with respect to software insurability. Software insurability refers to the software-induced risk that an insurer is willing to take in exchange for an insurance premium. The insurer is not actually insuring the software, but is instead insuring the object that the software controls. But before oering insurance for that object, the insurer must understand the worst-case scenarios that can result if the software is defective. Consider the fact that Swedish insurer Trugg-Hansa made the following exclusion eective May 1, 1998 in the general conditions of their business insurance policies: 5
6 \The policy will not cover damage, cost, legal or other liability caused directly or indirectly or connected to time-related disturbance in computer functionality." This demonstrates the extreme, defensive posturing being seen as a result of the Y2000 problem. But of equal signicance, it opens the door for non-time{related exclusions for other anomalous software behaviors. For example, exclusions might someday read like: \The policy will not cover damage, cost, legal or other liability caused directly or indirectly or connected to disturbances in computer functionality." Such a waiver enables an insurer to dump responsibility for all computer-related problems. The onus is placed on consumers to know the quality of the computer systems that they employ. The consumer now bears his or her own liability, without access to an insurer to step in as their surrogate in case of a mishap. This represents a rst in our industry: where insurers are so concerned about software failures that they start including exclusions in their policies. When you couple situations such as this with the WIPO Treaty, the disregard for consumer protection that exists in the current version of the Uniform Commercial Code Article 2B [5, 3], you immediately see that the need for independent third-party certication concerning the processes, product, and personnel could not be greater. Interestingly enough, a business has been formed to address this problem: the Software Testing Assurance Corporation (Stamford, CT). This company was founded up in 1998 to provide independent certication. Their rst certication oering will assess the testing processes used on converted Y2000 software. Their current oering is eectively all process assessment with a small degree of product assessment included (See their standard at This independent certication is available only to corporations that seek business disruption insurance in the event that their computer systems were to fail as a result of Y2000 software problems. The founding of this organization opens up the door for additional software quality certication standards for information systems when business risks are directly tied to software quality and insurance protection is sought. 5.1 Acknowledgements I appreciate the eorts of Don Bagert who has kept me up to date with Texas's certication plans. References [1] 6
7 [2] J. AYALA. Training the Microsoft Way. Windows NT Magazine, 4(3):122{129, March [3] C. KANER. Article 2B is Fundamentally Unfair to Mass-Market Software Customers, October Submitted to the American Law Institute for its Article 2B review. [4] J. C. HUANG. An Approach to Testing. ACM Computing Surveys, 17(3):113{128, September [5] THE AMERICAN LAW INSTITUTE AND NATIONAL CONFERENCE OF COMMISSIONERS ON UNIFORM LAWS. Uniform Commercial Code Article 2B (DRAFT), November [6] J. VOAS. Can Clean Pipes Produce Dirty Water? IEEE Software, 14(4):93{95, July
What to Do If You Fail the PMP Exam
What to Do If You Fail the PMP Exam What s in the ebook? This guide will teach you everything you need to know about what to do if you fail the PMP exam, including strategy, identifying your weaknesses
A Model for Assessing the Liability of Seemingly Correct Software Jerey M. Voas Larry K. Voas y Keith W. Miller z Abstract Current research on software reliability does not lend itself to quantitatively
Software development process
OpenStax-CNX module: m14619 1 Software development process Trung Hung VO This work is produced by OpenStax-CNX and licensed under the Creative Commons Attribution License 2.0 Abstract A software development
Report: An Analysis of US Government Proposed Cyber Incentives. Author: Joe Stuntz, MBA EP 14, McDonough School of Business
S 2 ERC Project: Cyber Threat Intelligence Exchange Ecosystem: Economic Analysis Report: An Analysis of US Government Proposed Cyber Incentives Author: Joe Stuntz, MBA EP 14, McDonough School of Business
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today s session Understand different types of application assessments and how they differ Be
Why COTS Software Increases Security Risks Gary McGraw and John Viega Reliable Software Technologies 21515 Ridgetop Circle, Suite 250, Sterling, VA 20166 phone: (703) 404-9293, fax: (703) 404-9295 email:
Learning objectives for today s session
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today s session Understand what a black box and white box assessment is and how they differ Identify
An introduction to insurance cover for businesses
An introduction to insurance cover for businesses All businesses need to be insured against potential risks such as contractual disputes, accidental damage, fire, flood or theft and claims for negligence.
Software Copyright. 1. Introduction. Last update: July 2009
- 1. Introduction...1-1.1. The scope of this briefing paper...1-1.2. "Software" defined...1-2. What is software copyright?...2-3. The Community Directive on software copyright...3-3.1. What does software
Frequently Asked Questions about SOHA Graduate Comps As of August 2013
Frequently Asked Questions about SOHA Graduate Comps As of August 2013 1) What is the comprehensive exam? The comprehensive exam is one of several integrative experiences that occurs in the last long semester
Sample Exam. 2011 Syllabus
ISTQ Foundation Level 2011 Syllabus Version 2.3 Qualifications oard Release ate: 13 June 2015 ertified Tester Foundation Level Qualifications oard opyright 2015 Qualifications oard (hereinafter called
Procurement Transformation Division. Procurement guidance. Engaging and managing consultants. Includes definitions for consultants and contractors
Procurement guidance Engaging and managing consultants Includes definitions for consultants and contractors Procurement guidance: Engaging and managing consultants Page 2 of 17 Table of contents Table
Programme Specification (Postgraduate)
Programme Specification (Postgraduate) 1. Programme Title(s): MSc/PGDip*/PGCert* Data Analysis for Business Intelligence *Exit awards only 2. Awarding body or institution: University of Leicester 3. a)
Professional Practice 544
February 15, 2016 Professional Practice 544 Tort Law and Insurance Michael J. Hanahan Schiff Hardin LLP 233 S. Wacker, Ste. 6600 Chicago, IL 60606 312-258-5701 [email protected] Schiff Hardin LLP.
Investment Advisor Brochure and Supplement Form ADV Parts 2A and 2B. Financial Advisor For You, LLC A Registered Investment Advisor
Investment Advisor Brochure and Supplement Form ADV Parts 2A and 2B Financial Advisor For You, LLC A Registered Investment Advisor Michael S Wroblewski, CFP, Managing Member 1820 Wyoming Avenue, NW Washington,
Direct Payments Becoming an Employer Guide
Direct Payments Becoming an Employer Guide Becoming an Employer (April 2015) Page 1 of 13 Contents 1. Introduction 1.1. Getting the right advice and help 1.2. Employer responsibility 2. General: Becoming
CISM ITEM DEVELOPMENT GUIDE
CISM ITEM DEVELOPMENT GUIDE Updated January 2015 TABLE OF CONTENTS Content Page Purpose of the CISM Item Development Guide 3 CISM Exam Structure 3 Writing Quality Items 3 Multiple-Choice Items 4 Steps
Leveraging Network and Vulnerability metrics Using RedSeal
SOLUTION BRIEF Transforming IT Security Management Via Outcome-Oriented Metrics Leveraging Network and Vulnerability metrics Using RedSeal november 2011 WHITE PAPER RedSeal Networks, Inc. 3965 Freedom
Managing the Risks of Running Windows Server 2003 After July 2015
G00263054 Managing the Risks of Running Windows Server 2003 After July 2015 Published: 1 April 2014 Analyst(s): Carl Claunch Windows Server 2003 and Windows Server 2003 R2 reach the end of their extended
Cyber-insurance: Understanding Your Risks
Cyber-insurance: Understanding Your Risks Cyber-insurance represents a complete paradigm shift. The assessment of real risks becomes a critical part of the analysis. This article will seek to provide some
REGULATIONS ON THE EXECUTIVE PHD PROGRAM AT IEDC - BLED SCHOOL OF MANAGEMENT, POSTGRADUATE STUDIES
Pursuant to the Higher Education Act (Official Gazette of the RS, no. 67/1993 and amendments) and the Statute of the IEDC Bled School of Management, Postgraduate Studies, (Official Gazette of the RS, no.
Verification and Validation of Software Components and Component Based Software Systems
Chapter 5 29 Verification and Validation of Software Components and Component Based Christina Wallin Industrial Information Technology Software Engineering Processes ABB Corporate Research [email protected]
Standard 1. Governance for Safety and Quality in Health Service Organisations. Safety and Quality Improvement Guide
Standard 1 Governance for Safety and Quality in Health Service Organisations Safety and Quality Improvement Guide 1 1 1October 1 2012 ISBN: Print: 978-1-921983-27-6 Electronic: 978-1-921983-28-3 Suggested
CMMI 100 Success Secrets
CMMI 100 Success Secrets Capability Maturity Model Integration 100 Success Secrets - 100 Most Asked Questions: The Missing CMMI-DEV, CMMI-ACQ Project Management and Process Guide Lance Batten CMMI 100
Accounting Student Views on Ethics
Accounting Student Views on Ethics Vincent C. Brenner Stetson University Ann L. Watkins Texas State University Patrick Flynn Baldwin Wallace College Ethics is part of the continuing assessment efforts
Specialty Certification Standards Federal Taxation Law Attorney Information
Specialty Certification Standards Federal Taxation Law Attorney Information Accredited by the Supreme Court Commission on Certification of Attorneys as Specialists 1 ATTORNEY INFORMATION AND STANDARDS
Ontario s Amended Rules of Professional Conduct
Ontario s Amended Rules of Professional Conduct Bruce Blain Toronto Symposium June 5, 2014 FLSC Model Code of Professional Conduct 2004 - initiative to create uniform ethical and professional conduct standards
CISM ITEM DEVELOPMENT GUIDE
CISM ITEM DEVELOPMENT GUIDE TABLE OF CONTENTS CISM ITEM DEVELOPMENT GUIDE Content Page Purpose of the CISM Item Development Guide 2 CISM Exam Structure 2 Item Writing Campaigns 2 Why Participate as a CISM
Law Governing Framework Conditions for Electronic Signatures and Amending Other Regulations
Law Governing Framework Conditions for Electronic Signatures and Amending Other Regulations inofficial version for industry consultation for official German text please refer to the Official Journal (Bundesgesetzblatt
Small business guide to trade practices compliance programs. April 2006
Small business guide to trade practices compliance programs April 2006 Commonwealth of Australia 2006 ISBN 1 920702 93 8 This work is copyright. Apart from any use permitted under the Copyright Act 1968
C.M. Haughey Solicitors Compensation Guide
C.M. Haughey Solicitors Compensation Guide www.cmhaugheysolicitors.ie Athena Goddess of Wisdom, Strength and Strategy. When your experience needs our experience About Us C. M. Haughey Solicitors, located
Public Act No. 10-38
1 of 8 8/27/2010 10:34 AM Substitute House Bill No. 5286 Public Act No. 10-38 AN ACT CONCERNING LICENSURE OF MASTER AND CLINICAL SOCIAL WORKERS. Be it enacted by the Senate and House of Representatives
Continuous Third-Party Security Monitoring Powers Business Objectives And Vendor Accountability
A Custom Technology Adoption Profile Commissioned By BitSight Technologies Continuous Third-Party Security Monitoring Powers Business Objectives And Vendor Accountability Introduction As concerns around
The dental profession s peer review program is a process to resolve disputes between a
HOW THE DENTAL PEER REVIEW SYSTEM WORKS AND WHAT YOU EXPECT FROM IT Introduction The dental profession s peer review program is a process to resolve disputes between a patient and a dentist or a third
Invitation to Tender
Invitation to Tender Provision of Training in Technology Transfer and Related Areas for The Southern Africa Innovation Support Programme 1. Drawing up the tender The tender must be submitted in writing
Platform as a Service and PCI www.engineyard.com
Engine Yard White Paper Platform as a Service and PCI www.engineyard.com Purpose Achieving PCI compliance can be a complex, time-consuming, and expensive undertaking, but the right approach can make it
WORKERS COMPENSATION QUICK FACTS
The Workers' Compensation Handbook // 1 WORKERS COMPENSATION QUICK FACTS Workers Compensation Quick Facts contains general information about the workers compensation system in New Mexico, to provide employers
INSURANCE FOR VOLUNTARY ORGANIZATIONS ARE YOUR VOLUNTEERS AND CLIENTS COVERED?
INSURANCE FOR VOLUNTARY ORGANIZATIONS ARE YOUR VOLUNTEERS AND CLIENTS COVERED? BUSINESS INSURANCE VISIT IBC.CA Nearly 12 million Canadians or 45% of the population volunteer time through a group or organization,
Department of Justice Revises Policies Regarding Waiver of Privilege. Gabriel L. Imperato, Esq.*
Department of Justice Revises Policies Regarding Waiver of Privilege Gabriel L. Imperato, Esq.* The Department of Justice recently modified its Principles for Federal Prosecution of Business Organizations,
CIPS Chartered Status Assessment Terms and Conditions (v1.0 12.01.15)
CIPS Chartered Status Assessment Terms and Conditions (v1.0 12.01.15) This page (together with the documents referred to on it) tells you ( you means the party contracting with CIPS) the terms and conditions
Main Page Search August 25, 2010
1 of 6 8/25/2010 5:22 PM Main Page Search August 25, 2010 Association News Features/Substantive Law Spotlight/Profiles Departments Classifieds The Hennepin Lawyer Kenneth Ross August 24, 2010 Headlines
Preventing Liability for Foreign Products A PLP Primer By Kenneth Ross
Preventing Liability for Foreign Products A PLP Primer By Kenneth Ross Recently, there have been news stories almost every day about new and continuing safety issues with Chinese made products, including
CLINICAL INDEMNITY SCHEME. Draft Scope of Coverage
- 1 - CLINICAL INDEMNITY SCHEME Draft Scope of Coverage 1. General Principles The Clinical Indemnity Scheme has been established on the basis of enterprise liability. The fundamental principle underlying
Regulation and the direct marketing industry
OFFICE OF REGULATION REVIEW Regulation and the direct marketing industry A submission to the Working Group on Direct Marketing SUBMISSION MAY 1995 The Office of Regulation Review The Office of Regulation
DRAFT GUIDANCE. This guidance document is being distributed for comment purposes only. Document issued on: July 2015
Third-Party Auditor/Certification Body Accreditation for Food Safety Audits: Model Accreditation Standards Draft Guidance for Industry and Food and Drug Administration Staff DRAFT GUIDANCE This guidance
Disposable Information Systems: The Future of Software Maintenance? J. Voas ([email protected]) Reliable Software Technologies, Sterling VA USA Abstract This paper is a summary of Voas's keynote address
Procuring Penetration Testing Services
Procuring Penetration Testing Services Introduction Organisations like yours have the evolving task of securing complex IT environments whilst delivering their business and brand objectives. The threat
A Practical Guide to. Hiring a LAWYER
A Practical Guide to Hiring a LAWYER A PRACTIAL GUIDE TO HIRING A LAWYER I. Introduction 3 II. When do you Need a Lawyer? 3 III. How to Find a Lawyer 4 A. Referrals 4 B. Lawyer Referral Service 5 C. Unauthorized
How to pick ediscovery software
How to pick ediscovery software WWW.CSDISCO.COM How to pick ediscovery software Here, from most important to least, are the factors you should consider in picking ediscovery software: 1 SPEED The most
The NREMT Certification Eligibility, Discipline and Appeals Policy
The NREMT Certification Eligibility, Discipline and Appeals Policy A. Purpose of Certification/Registry The National Registry of Emergency Medical Technicians (NREMT) is the National EMS Certification
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
Dental Contractor Loss Analysis Exercise
Dental Contractor Loss Analysis Exercise A report summarising the results of a loss analysis exercise aimed at measuring the prevalence of suspected fraud in contractor claims within NHS dental services.
PERSONAL FINANCIAL PLANNING
PERSONAL FINANCIAL PLANNING A GUIDE TO STARTING YOUR PERSONAL FINANCIAL PLAN THE CERTIFICATION TRADEMARK ABOVE IS OWNED BY CERTIFIED FINANCIAL PLANNER BOARD OF STANDARDS, INC. IN THE UNITED STATES AND
The Basics of Sexual Harassment
The Basics of Sexual Harassment Sexual Harassment is a violation both of Federal Law and the laws of most states. For employers, it is fairly easy to take steps to prevent sexual harassment and to defeat
in the ALRC Discussion Paper relating to solicitors rules (Question 7-2) and consumer protection (Question 11-1) 1).
RESPONSE TO THE EQUITY, CAPACITY AND DISABILITY IN COMMONWEALTH LAWS DISCUSSION PAPER 81 Legal Aid NSW submission to the Australian Law Reform Commission July 2014 Legal Aid NSW welcomes the opportunity
Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age
Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: August 2013
WHITE PAPER. The 5 Critical Steps for an Effective Disaster Recovery Plan
WHITE PAPER The 5 Critical Steps for an Effective Disaster Recovery Plan 2 WHITE PAPER The 5 Critical Planning Steps For An Effective Disaster Recovery Plan Introduction In today s climate, most enterprises
Client Contracts: Business Risk, Professional Liability & Insurance Coverage
Hanover Architects & Engineers Advantage Client Contracts: Business Risk, Professional Liability & Insurance Coverage Many client-drafted contracts endeavor to transfer unreasonable risk to the design
Data controllers and data processors: what the difference is and what the governance implications are
ICO lo : what the difference is and what the governance implications are Data Protection Act Contents Introduction... 3 Overview... 3 Section 1 - What is the difference between a data controller and a
ACOT WEBSITE PRIVACY POLICY
ACOT WEBSITE PRIVACY POLICY Our commitment to privacy acot.ca (the Website ) is a website owned and operated by The Alberta College of Occupational Therapists ( ACOT ), also referred to as we, us, or our
CLHIA - GROUP LIFE AND GROUP ACCIDENT AND SICKNESS INSURANCE GUIDELINES
CLHIA - GROUP LIFE AND GROUP ACCIDENT AND SICKNESS INSURANCE GUIDELINES FOREWARD The following CLHIA Guidelines replace the former Guidelines of the Superintendents of Insurance. They maintain the spirit
Defendant has a duty to act as a reasonable person would in like or similar circumstances to avoid causing unreasonable risk of harm to others.
NEGLIGENCE (Heavily Tested) (Write On the Bar): In order for Plaintiff to recover in Negligence, she or he must plead and prove: DUTY, BREACH OF DUTY, ACTUAL CAUSATION, PROXIMATE CAUSATION, AND DAMAGES.
code of Business Conduct and ethics
code of Business Conduct and ethics Introduction This document provides information about our Code of Business Conduct and Ethics. All directors, officers and employees are individually and collectively
Ministry of Labour and Social Policy LAW ON VOLUNTARY FULLY FUNDED PENSION INSURANCE (189347.11)
Ministry of Labour and Social Policy LAW ON VOLUNTARY FULLY FUNDED PENSION INSURANCE 1 Table of Contents CHAPTER 1 GENERAL PROVISIONS... 3 CHAPTER 2 VOLUNTARY PENSION FUNDS... 7 CHAPTER 3 PENSION COMPANIES
Customer Data and Reputational Risk in the Pharmaceutical Industry
1 Customer Data and Reputational Risk in the Pharmaceutical Industry Sensitive Data: A Chain of Trust Organizations of all types, from banks to government agencies to healthcare providers, are taking steps
Independent Contracting
Independent Contracting USED BY PERMISSION From AAPA: 950 North Washington Street, Alexandria, VA 22314 www.aapa.org Deciding to practice as an independent contractor requires consideration of many factors.
Protecting Your Ideas: An Introduction to Intellectual Property Rights. By Sasha G. Rao and Andrew J. Koning
Protecting Your Ideas: An Introduction to Intellectual Property Rights By Sasha G. Rao and Andrew J. Koning You have an idea. Something that s going to revolutionize the industry. You re excited, but before
What are the main liability policies you should consider for your commercial business?
A PUBLICATION BY: GODFREY MORROW GODFREY INSURANCE MORROW AND INSURANCE FINANCIAL AND SERVICES FINANCIAL LTD. SERVICES LTD. 2012 What are the main liability policies you should consider for your commercial
The Software Development Life Cycle: An Overview. Last Time. Session 8: Security and Evaluation. Information Systems Security Engineering
The Software Development Life Cycle: An Overview Presented by Maxwell Drew and Dan Kaiser Southwest State University Computer Science Program Last Time Brief review of the testing process Dynamic Testing
Asbestos Management Policy
Central Bedfordshire Council www.centralbedfordshire.gov.uk Asbestos Management Policy The Housing Service Version 1.0 Directorate Social Care Health and Housing Service Housing Service Approved by Director
Athletic Trainer s: What Are They All About?
Athletic Trainer s 1 Athletic Trainer s: What Are They All About? Student Two Writing 50 Professor Dean September 4, 2006 Athletic Trainer s 2 Athletic Trainer s: What Are They All About? Sports have been
Freedom of Information Act 2000 (FOIA) Decision notice
Freedom of Information Act 2000 (FOIA) Decision notice Date: 18 January 2016 Public Authority: Address: Gambling Commission Victoria Square House Victoria Square Birmingham B2 4BP Decision (including any
