SDA-Asia: Enterprise Content Management is emerging as a key set of technologies used to tackle compliance projects, as well as other strategic initiatives such as continuous process improvement and collaboration. ECM proposes to unify business content, processes and connectivity to facilitate information exchange and quickened response and decision time. ECM creates relationships between documents, Web pages, folders and the operations connected to them. This leads to better decision-making; it is this element that generates ROI and competitive advantage for organizations. ECM also helps with regulatory compliance by promoting accountability and reducing risk. Sponsor: VoIP Business Case Resource Kit | | Understand, Quantify and Explain the VoIP Opportunity Save 20 hours or more of your valuable time with our background research, pro forma financial calculations, and ready-to-use PowerPoint presentation. Make the right decision on this critical technology and back it up! > Get more info. | News.com: Mike Castle (R.-Del.) says that he plans to introduce a revised version of a bill that he has been working on since February. The federal legislation would require all companies handling sensitive and personal information to secure the data, investigate breaches promptly, notify partners and law enforcement immediately in the event of a compromise, and offer free credit monitoring services to affected consumers. Rep. Castle's bill joins several efforts in the Senate, including a sweeping measure proposed by Senators Specter and Leahy which is thought to be heading for a vote in October. Castle says he will hold a hearing on his bill by the end of October. Computerworld: IT executives are increasingly being asked to build business cases for their IT initiatives. To develop an effective business case, the IT organization must understand business goals. A business case must forecast costs and savings, describe expected benefits and risks, and demonstrate how the project fits with the organization's strategic vision. The business case should be heavily laden with numbers, discussing project costs, maintenance expenses and returns on investments. It should also present alternative scenarios. The business case should also discuss nonfinancial factors, such as meeting compliance requirements. This may be at the core of the business case and the facts surrounding such factors must be fully explained. | Special Offer: Free White Paper Understanding the Total Cost of Ownership of IP Telephony Solutions In this study conducted by an independent research and consulting group, the often-hidden costs associated with IP telephony ownership are revealed. Discover this analysis methodology for determining TCO based on six cost categories. It's highly flexible and can be used to generate similar benchmarking for many different sizes and types of deployment comparisons. Check it out today! | | | | Washington Times: Former New York City Mayor Rudolph Giuliani says the financial industry should protect consumers from identity theft in ways similar to cities preparing for terrorist attacks. The key is to anticipate as much as possible, he advises. When Giuliani arrived at ground zero on Sept. 11, 2001, he realized that the city had no plans for what occurred. Instead, officials improvised with parts of other disaster plans to figure out a response. The lesson for the financial industry is to proactively prepare for security breaches, he says. Other presenters at the conference where Giuliani spoke noted that consumers who entrust financial information to strangers are the industry's biggest security risk. Wired: Two consumer privacy rights advocates have authored a book, "Spychips: How Major Corporations and Government Plan to Track Your Every Move with RFID," claiming that government and private business are colluding to install radio transmitters on many consumer products. If radio tags replace barcode labels, they say, consumers could be tracked anywhere. Companies like Philips, Procter and Gamble, Gillette, NCR and IBM, all at the core of the RFID industry, are conspiring with each other and with the federal government to follow consumers from their refrigerators to their medicine cabinets, according to these groups. Companies counter that RFID will be used only for purposes of supply chain management. The authors hope their book will galvanize support for new privacy laws covering RFID, much as Ralph Nader's "Unsafe at Any Speed" heralded safety requirements for automobile manufacturers. IT Marketplace | | | Tell the IT Business Edge audience of technology decision makers about your product, service, event, or job. Click here to list it in the IT Marketplace! | | 3 QUESTIONS: Whipping Marketing into Shape With Chetan Saiya, founder, chairman and CEO of Assetlink, a provider of Marketing Operations Management solutions. Prior to starting Assetlink, Saiya was CEO of MediaWay, a multimedia database management company that he founded, and Tandem Computers. Question: What problems do marketing operations present to compliance efforts? Saiya: With regard to Sarbanes-Oxley compliance, the first thing everyone talks about is the audit process. When auditors come into a company, the first thing they do is to ask for an inventory of processes. That's fine when it comes to finance, manufacturing, human resources or sales. But marketing usually does not have processes. The term "marketing process" is an oxymoron. Without formal processes, the auditors can't examine them or suggest any changes. At the end of the auditing process, the auditors pronounce the company compliant, without having examined a significant component of the company, i.e. marketing. The rest of the company, such as payroll or raw materials, has well defined expenses. In marketing, 80 percent to 90 percent [of expenses] are ad hoc and there are no standard pricing or procurement processes. Question: How large of a problem could this be? Saiya: In Global 2000 companies, the marketing budget can vary from around 10 percent of expenses to about 40 percent of expenses in areas like pharmaceuticals. The way marketing operations are managed, companies have no idea of the marketing costs accrued in a given month. There is a likely variance of 20 percent and, when you look at the overall expenses of a corporation, this can result in a 3 percent to 8 percent variance in the accuracy of overall financial results. So you have CEOs and CFOs signing in blood that the financial results are accurate. But shareholders and stakeholders may sue them when they have to restate their financial statements. A 5 percent variance can easily gobble up the net profits of many a corporation. I know of one case in which the CFO was examining the results of a Sarbanes-Oxley audit and noticed there were no suggested changes at marketing. He asked the auditors, "Does this mean they're doing a great job?" The response was that the auditors didn't even look at marketing because they had no processes to review. Meanwhile, the company had to rush to get compliant and start putting systems in place because they were about to make a secondary stock offering. Question: What's the solution to this problem? Saiya: The first step is to mandate that marketing is not an ad hoc, creative activity but is a form of corporate activity that needs institutionalized processes in terms of how you plan, how you budget, how you expense and how you execute marketing programs. Once you set up those processes, you need to put systems in place to manage those processes. Just as accounting uses ERP systems and human resources has its systems, marketing needs marketing operations management systems that implement processes, integrate with the rest of the enterprise and provide a more accurate picture of forecasts, activities, liabilities and spends. Besides helping with compliance issues, these systems can help streamline marketing operations, dramatically reduce error rates, and promote efficiency by eliminating duplication and spreading marketing campaigns out in a proper fashion. By having plans and budgets in the system, you can calculate the ROI for different marketing campaigns and determine whether or not to repeat such a campaign in the future. Having well-defined marketing processes allows for the automation of those processes. Marketing information can be aggregated in one place and an audit trail can be established. This is important from a compliance point of view but can also provide information by which course corrections can be effected. It also expedites the pace at which can you do things and enables more effective marketing campaigns. | Also from IT Business Edge: Voice & Data Convergence Voice & Data Convergence examines the strategic and tactical implications of emerging IP telephony technologies, from VoIP services to advanced CRM systems to security considerations. Find out what every IT decision maker should know. Click here to sign up! | By the Numbers 20 percent Proportion of U.S. employers that have had e-mail subpoenaed in lawsuits or by regulators. 75 percent Proportion of companies making technology changes targeted at the control environment and compliance processes, according to a PricewaterhouseCoopers study. $500,000 Civil penalty per instance of identity theft that could be levied against ISPs and Web hosting services under California's new anti-phishing law. Breaking Headlines BusinessWeek: Costs and privacy concerns are preventing U.S. banks from implementing iris scanning technology at ATMs, although the technology is being used elsewhere. In Colombia, biometrics is used in lieu of ATM cards at the fifth-largest bank in that country. The technology has matured to the point where instances of undetectable fingerprints have fallen from 30 percent to 2 percent. A Gartner analyst says biometrics is the most secure form of authentication because it is the hardest to imitate and duplicate. The ultimate utility of biometrics, according to an industry official, is to eliminate the PIN so that criminals no longer have anything to steal. Law.com: A local politician who sought the name of anonymous bloggers who trashed him has been shot down by the Delaware Supreme Court. The decision came as part of a defamation case brought by a town councilman against the bloggers. The court overturned a lower court ruling which ordered an Internet service provider to provide the identities of four anonymous posters to a blog. The court found anonymous Internet speech similar to anonymous political pamphleteering, a practice protected under the free speech provisions of the First Amendment to the U.S. Constitution. A claimant must offer strong proof of defamation in order to unmask an anonymous Internet poster, the Delaware Supreme Court ruled, and the lower court set that bar too low. NewsFactor Network: Banks and other companies taking advantage of the online channel are becoming more proactive in protecting their customers, according to a Canadian business executive. This comes as companies realize that law enforcement has assigned a low priority to fighting online fraud. When notified that a phishing attack is occurring, these businesses use private sources to locate the originating server and shut down the illegal Web site. In addition, counter-phishing consultants set up fake accounts to track the final use of stolen data, and provide law enforcement with evidence for prosecution. Emerging Trends Sarbanes-Oxley Compliance Journal: Small- and mid-sized publicly traded companies are having difficulty complying with Sarbanes-Oxley, largely because they have fewer in-house resources to bring to bear on compliance activities and therefore must spend more on compliance efforts. The complexity of Sarbanes-Oxley compliance has also caused auditing costs to increase. Companies with market capitalization of $5 billion or more spend an average of .03 percent of revenue on compliance, while companies with market capitalization of $100 million or less are spending an average of 1.3 percent. Some small companies are complaining that the burden of compliance will force them go private. Within a year after Sarbanes-Oxley went on the books, de-listing activity increased by 30 percent. The implications of these difficulties mean that fewer companies will seek to go public in the future. Since companies generally go public when they are seeking a capital infusion to fuel growth, the trend could result in stifled innovation. CIO.com Asia: Smart CIOs are beginning to get their heads above the drudgery of specific compliance details and are taking a more holistic approach. Experts say executives charged with keeping their companies compliant should take a macro view to make sure that the enterprise stays in line with company policies and procedures. At Chartered Semiconductor Manufacturing, the CIO shares the chief responsibility for Sarbanes-Oxley compliance with the CFO. This reflects the recognition of the interrelationship between IT and financial reporting and the pervasive effect IT has on company processes. Chartered Semiconductor boasts a dedicated team of IT and business process specialists who have been awarded adequate resources as well as management oversight and a well-defined project plan. The starting point of a holistic compliance plan is to align compliance needs with business objectives and priorities. Enterprise IT Planet: Instant messaging is expected to continue to grow as a substantial business collaboration application, according to IDC research. IDC expects the enterprise IM market to grow from $315 million in 2005 to $736 million in 2009. Sales of EIM applications jumped 37 percent in 2004 over 2003. If companies are recognizing the utility of IM, then compliance and security considerations provide a major countervailing headache. Regulations such as HIPAA, Sarbanes-Oxley and SEC regulation 17A-4 require businesses to store digital information, prompting strong growth in the security and management software end of the EIM market. Viruses spreading through instant messaging are also a worry, and vendors such as FaceTime, IMLogic and Akonix are integrating their products with those of EIM market leaders to defend against an increase in IM threats. IT Business Edge: Managing Compliance Standards | Issue 42, Vol. 2 | DISCLAIMER: At the time of publication, all links in this e-mail functioned properly. However, since many links point to sites other than itbusinessedge.com, some links may become invalid as time passes. | This e-mail is sent by: NarrowCast Group, LLC, 124 N.First St., Louisville, KY 40202 | Copyright ©2003-2005 NarrowCast Group, LLC. All Rights Reserved. | | Research Consultant Rates Free for Subscribers! | Don't budget IT projects in the dark! Find out what contractors are charging for the skills you need by querying our database of more than 12,000 consultants and firms. Click here to begin your research now! | Find Related Technology Solutions | | About the Editor Peter Buxbaum has been writing about business, technology, and law for 12 years. He has published over 1,000 articles in publications such as Fortune, Forbes, Chief Executive, Computerworld, InformationWeek, and dozens of others. He earned a law degree from Temple University, studied economics at Columbia University, and taught seminars in international business at Penn State University. He can be reached at editorial@itbusinessedge.com. | | |
0 Comments:
Post a Comment
<< Home