Thursday, October 20, 2005

Does Sarbox Compliance Yield Business Improvement?

View in your Web browser.
MANAGING COMPLIANCE STANDARDS

Sponsor: Nortel Networks
Discover an analysis methodology for determining IP telephony TCO based on six cost categories. It's a highly flexible way to uncover the hidden costs of telephony solutions and it can be used to generate similar benchmarking for many different sizes and types of deployment comparisons. Read the free white paper today!

Hot White Papers
View entire Research Library

 

Oct. 20, 2005
Implementing compliance software provides greater performance insight and improves business processes, most large companies believe.
Also in this Issue
Giuliani Offers Strategy on Identity Theft
Delaware Supreme Court Rules in Favor of Anonymous Blogger in Defamation Claim
Will Sarbanes-Oxley Force Small Companies to Privatize?
 
Top Insights

DMReview: Rohm and Haas, a large chemicals producer, is using financial management software to assign financial reporting sign-off and responsibilities to appropriate organizational levels. The fact that financial data is well reviewed has helped make the company Sarbanes-Oxley compliant. An IDC study indicated that a large majority of companies, 88 percent, were anticipating improvements in financial management activities as well as overall business process performance as a result of Sarbox efforts.
SPONSOR

 
ADDITIONAL READING:
SDA-Asia: Enterprise Content Management is emerging as a key set of technologies used to tackle compliance projects, as well as other strategic initiatives such as continuous process improvement and collaboration. ECM proposes to unify business content, processes and connectivity to facilitate information exchange and quickened response and decision time. ECM creates relationships between documents, Web pages, folders and the operations connected to them. This leads to better decision-making; it is this element that generates ROI and competitive advantage for organizations. ECM also helps with regulatory compliance by promoting accountability and reducing risk.
 
ADDITIONAL READING:
Sponsor: VoIP Business Case Resource Kit

Understand, Quantify and Explain the VoIP Opportunity
Save 20 hours or more of your valuable time with our background research, pro forma financial calculations, and ready-to-use PowerPoint presentation. Make the right decision on this critical technology and back it up!

> Get more info.

News.com: Mike Castle (R.-Del.) says that he plans to introduce a revised version of a bill that he has been working on since February. The federal legislation would require all companies handling sensitive and personal information to secure the data, investigate breaches promptly, notify partners and law enforcement immediately in the event of a compromise, and offer free credit monitoring services to affected consumers. Rep. Castle's bill joins several efforts in the Senate, including a sweeping measure proposed by Senators Specter and Leahy which is thought to be heading for a vote in October. Castle says he will hold a hearing on his bill by the end of October.
 
ADDITIONAL READING:
Computerworld: IT executives are increasingly being asked to build business cases for their IT initiatives. To develop an effective business case, the IT organization must understand business goals. A business case must forecast costs and savings, describe expected benefits and risks, and demonstrate how the project fits with the organization's strategic vision. The business case should be heavily laden with numbers, discussing project costs, maintenance expenses and returns on investments. It should also present alternative scenarios. The business case should also discuss nonfinancial factors, such as meeting compliance requirements. This may be at the core of the business case and the facts surrounding such factors must be fully explained.

Special Offer: Free White Paper

Understanding the Total Cost of Ownership of IP Telephony Solutions
In this study conducted by an independent research and consulting group, the often-hidden costs associated with IP telephony ownership are revealed. Discover this analysis methodology for determining TCO based on six cost categories. It's highly flexible and can be used to generate similar benchmarking for many different sizes and types of deployment comparisons. Check it out today!

Washington Times: Former New York City Mayor Rudolph Giuliani says the financial industry should protect consumers from identity theft in ways similar to cities preparing for terrorist attacks. The key is to anticipate as much as possible, he advises. When Giuliani arrived at ground zero on Sept. 11, 2001, he realized that the city had no plans for what occurred. Instead, officials improvised with parts of other disaster plans to figure out a response. The lesson for the financial industry is to proactively prepare for security breaches, he says. Other presenters at the conference where Giuliani spoke noted that consumers who entrust financial information to strangers are the industry's biggest security risk.

Wired: Two consumer privacy rights advocates have authored a book, "Spychips: How Major Corporations and Government Plan to Track Your Every Move with RFID," claiming that government and private business are colluding to install radio transmitters on many consumer products. If radio tags replace barcode labels, they say, consumers could be tracked anywhere. Companies like Philips, Procter and Gamble, Gillette, NCR and IBM, all at the core of the RFID industry, are conspiring with each other and with the federal government to follow consumers from their refrigerators to their medicine cabinets, according to these groups. Companies counter that RFID will be used only for purposes of supply chain management. The authors hope their book will galvanize support for new privacy laws covering RFID, much as Ralph Nader's "Unsafe at Any Speed" heralded safety requirements for automobile manufacturers.

IT Marketplace
Hardware
Data Privacy/Data Encryption Solutions
Dominion Series - Digital KVM Console Access and Connectivity Solutions
Software
WebFOCUS Query and Analysis Solutions (OLAP and Ad Hoc Reporting Tools)
TransactionVision - Business Process Monitoring
Events
The Business Case for Business Rules
Publications
Implement Your Outsourcing Initiatives with These Process Templates
All the Basics of IT Management
 
White Papers
Your E-Mail System: Liability or Asset?
Choosing the Right Disk-based Backup Solution
VoIP: Creating a Strategy That Enables Future Voice Applications
Training & Tools
Best Practices Guide Walks You Through IT Strategic Planning
IT Operations Guide Perfect for IT and non-IT Managers
Be Ready for a Disaster with this Best Practices Guide
IT Services (listings available)
Jobs (listings available)
Tell the IT Business Edge audience of technology decision makers about your product, service, event, or job. Click here to list it in the IT Marketplace!

3 QUESTIONS:
Whipping Marketing into Shape

With Chetan Saiya, founder, chairman and CEO of Assetlink, a provider of Marketing Operations Management solutions. Prior to starting Assetlink, Saiya was CEO of MediaWay, a multimedia database management company that he founded, and Tandem Computers.

Question: What problems do marketing operations present to compliance efforts?
Saiya: With regard to Sarbanes-Oxley compliance, the first thing everyone talks about is the audit process. When auditors come into a company, the first thing they do is to ask for an inventory of processes. That's fine when it comes to finance, manufacturing, human resources or sales. But marketing usually does not have processes. The term "marketing process" is an oxymoron. Without formal processes, the auditors can't examine them or suggest any changes. At the end of the auditing process, the auditors pronounce the company compliant, without having examined a significant component of the company, i.e. marketing. The rest of the company, such as payroll or raw materials, has well defined expenses. In marketing, 80 percent to 90 percent [of expenses] are ad hoc and there are no standard pricing or procurement processes.

Question: How large of a problem could this be?
Saiya: In Global 2000 companies, the marketing budget can vary from around 10 percent of expenses to about 40 percent of expenses in areas like pharmaceuticals. The way marketing operations are managed, companies have no idea of the marketing costs accrued in a given month. There is a likely variance of 20 percent and, when you look at the overall expenses of a corporation, this can result in a 3 percent to 8 percent variance in the accuracy of overall financial results. So you have CEOs and CFOs signing in blood that the financial results are accurate. But shareholders and stakeholders may sue them when they have to restate their financial statements. A 5 percent variance can easily gobble up the net profits of many a corporation.
     I know of one case in which the CFO was examining the results of a Sarbanes-Oxley audit and noticed there were no suggested changes at marketing. He asked the auditors, "Does this mean they're doing a great job?" The response was that the auditors didn't even look at marketing because they had no processes to review. Meanwhile, the company had to rush to get compliant and start putting systems in place because they were about to make a secondary stock offering.

Question: What's the solution to this problem?
Saiya: The first step is to mandate that marketing is not an ad hoc, creative activity but is a form of corporate activity that needs institutionalized processes in terms of how you plan, how you budget, how you expense and how you execute marketing programs. Once you set up those processes, you need to put systems in place to manage those processes. Just as accounting uses ERP systems and human resources has its systems, marketing needs marketing operations management systems that implement processes, integrate with the rest of the enterprise and provide a more accurate picture of forecasts, activities, liabilities and spends. Besides helping with compliance issues, these systems can help streamline marketing operations, dramatically reduce error rates, and promote efficiency by eliminating duplication and spreading marketing campaigns out in a proper fashion.
     By having plans and budgets in the system, you can calculate the ROI for different marketing campaigns and determine whether or not to repeat such a campaign in the future. Having well-defined marketing processes allows for the automation of those processes. Marketing information can be aggregated in one place and an audit trail can be established. This is important from a compliance point of view but can also provide information by which course corrections can be effected. It also expedites the pace at which can you do things and enables more effective marketing campaigns.

 
Also from IT Business Edge: Voice & Data Convergence
Voice & Data Convergence examines the strategic and tactical implications of emerging IP telephony technologies, from VoIP services to advanced CRM systems to security considerations. Find out what every IT decision maker should know. Click here to sign up!

By the Numbers

20 percent
Proportion of U.S. employers that have had e-mail subpoenaed in lawsuits or by regulators.

75 percent
Proportion of companies making technology changes targeted at the control environment and compliance processes, according to a PricewaterhouseCoopers study.
Source: Finextra.com

$500,000
Civil penalty per instance of identity theft that could be levied against ISPs and Web hosting services under California's new anti-phishing law.
Source: eWEEK

Breaking Headlines

BusinessWeek: Costs and privacy concerns are preventing U.S. banks from implementing iris scanning technology at ATMs, although the technology is being used elsewhere. In Colombia, biometrics is used in lieu of ATM cards at the fifth-largest bank in that country. The technology has matured to the point where instances of undetectable fingerprints have fallen from 30 percent to 2 percent. A Gartner analyst says biometrics is the most secure form of authentication because it is the hardest to imitate and duplicate. The ultimate utility of biometrics, according to an industry official, is to eliminate the PIN so that criminals no longer have anything to steal.

Law.com: A local politician who sought the name of anonymous bloggers who trashed him has been shot down by the Delaware Supreme Court. The decision came as part of a defamation case brought by a town councilman against the bloggers. The court overturned a lower court ruling which ordered an Internet service provider to provide the identities of four anonymous posters to a blog. The court found anonymous Internet speech similar to anonymous political pamphleteering, a practice protected under the free speech provisions of the First Amendment to the U.S. Constitution. A claimant must offer strong proof of defamation in order to unmask an anonymous Internet poster, the Delaware Supreme Court ruled, and the lower court set that bar too low.

NewsFactor Network: Banks and other companies taking advantage of the online channel are becoming more proactive in protecting their customers, according to a Canadian business executive. This comes as companies realize that law enforcement has assigned a low priority to fighting online fraud. When notified that a phishing attack is occurring, these businesses use private sources to locate the originating server and shut down the illegal Web site. In addition, counter-phishing consultants set up fake accounts to track the final use of stolen data, and provide law enforcement with evidence for prosecution.

Emerging Trends

Sarbanes-Oxley Compliance Journal: Small- and mid-sized publicly traded companies are having difficulty complying with Sarbanes-Oxley, largely because they have fewer in-house resources to bring to bear on compliance activities and therefore must spend more on compliance efforts. The complexity of Sarbanes-Oxley compliance has also caused auditing costs to increase. Companies with market capitalization of $5 billion or more spend an average of .03 percent of revenue on compliance, while companies with market capitalization of $100 million or less are spending an average of 1.3 percent. Some small companies are complaining that the burden of compliance will force them go private. Within a year after Sarbanes-Oxley went on the books, de-listing activity increased by 30 percent. The implications of these difficulties mean that fewer companies will seek to go public in the future. Since companies generally go public when they are seeking a capital infusion to fuel growth, the trend could result in stifled innovation.

CIO.com Asia: Smart CIOs are beginning to get their heads above the drudgery of specific compliance details and are taking a more holistic approach. Experts say executives charged with keeping their companies compliant should take a macro view to make sure that the enterprise stays in line with company policies and procedures. At Chartered Semiconductor Manufacturing, the CIO shares the chief responsibility for Sarbanes-Oxley compliance with the CFO. This reflects the recognition of the interrelationship between IT and financial reporting and the pervasive effect IT has on company processes. Chartered Semiconductor boasts a dedicated team of IT and business process specialists who have been awarded adequate resources as well as management oversight and a well-defined project plan. The starting point of a holistic compliance plan is to align compliance needs with business objectives and priorities.

Enterprise IT Planet: Instant messaging is expected to continue to grow as a substantial business collaboration application, according to IDC research. IDC expects the enterprise IM market to grow from $315 million in 2005 to $736 million in 2009. Sales of EIM applications jumped 37 percent in 2004 over 2003. If companies are recognizing the utility of IM, then compliance and security considerations provide a major countervailing headache. Regulations such as HIPAA, Sarbanes-Oxley and SEC regulation 17A-4 require businesses to store digital information, prompting strong growth in the security and management software end of the EIM market. Viruses spreading through instant messaging are also a worry, and vendors such as FaceTime, IMLogic and Akonix are integrating their products with those of EIM market leaders to defend against an increase in IM threats.

IT Business Edge: Managing Compliance Standards
Issue 42, Vol. 2
DISCLAIMER: At the time of publication, all links in this e-mail functioned properly. However, since many links point to sites other than itbusinessedge.com, some links may become invalid as time passes.
This e-mail is sent by: NarrowCast Group, LLC, 124 N.First St., Louisville, KY 40202
Copyright ©2003-2005 NarrowCast Group, LLC. All Rights Reserved.

Hot Solutions
IronMail Secure Anti-Virus Gateway
Citrix Access Gateway Universal SSL VPN Appliance
Adonix X3 ERP Manufacturing, Distribution and Supply Chain Management
ViewWise Document Management Solutions
Search entire
IT Solution Directory

powered by

IT Best Practices
Guides and Templates


Strategic IT Planning and Governance

Building a Comprehensive Disaster Recovery Plan

IT Operations Guide
 

Optimizing Your IT Infrastructure

 

Securing Your IT Environment

Policies and Procedures
IT Operations Essentials


IT Operations Guide

  IT Planning Bundle
  2005 IT Compensation Study
  Strategic Outsourcing Framework
Outsourcing Process Templates
PortfolioStep Portfolio Management System

Training Products
IT and Management Skills


IT Manager Development Series

  IT Management Essentials Bundle
IT Management Development Mega Pack
PortfolioStep Portfolio Management System
  Strategic Outsourcing Framework

SPONSORED RESOURCES
Free 30-day Trial from Intuit QuickBase
Manage projects, sales, IT and more. Control access to data. Perfect for mid-size and large companies.
Your E-Mail System: Asset or Liability?
White paper explains how ILM solutions can help you face the most pressing need in regulatory messaging compliance.
Add Accountability & Visibility to Projects
Check out the advantages of a Web-based collaboration platform geared for any budget.
Why More Bandwidth Won't Save Slow WANs
White paper overturns common belief that extra bandwidth will correct poor performing WAN apps.

Business Case Kits
Background and Templates


VoIP Business Case Resource Kit

  Spam Filtering Business Case Resource Kit
  Blade Server Business Case Resource Kit
  CaseBuilder for IT Initiatives

Research
Consultant Rates

Free for Subscribers!
Don't budget IT projects in the dark! Find out what contractors are charging for the skills you need by querying our database of more than 12,000 consultants and firms.

Click here to begin your research now!

IT Security
Guidelines and Tools


Building a Comprehensive Disaster Recovery Plan

 

Security Manual Template

Disaster Recovery Plan Process Kit
  Securing Your IT Environment Best Practices Methodology
  Firewalls: The InfoWorld Test Center Product Guide

Info-Tech Research
Premium Analyst Reports
 


How to Select a Security Outsourcer

  A Strategy for CRM Selection
  Dissecting .NET for for IT Decision Makers
  Enterprise Wireless Networking: A View to the Future
  Linux on the Desktop
  Portals: Separating Myth from Reality

Find Related Technology Solutions
Compliance Management/Sarbanes-Oxley Compliance
Information Lifecycle Management
Risk Management
Vulnerability Assessment
Access Control
Storage Management
Database Administration
Data Warehousing
Data Privacy
Electronic Medical Records
Search entire
IT Solution Directory

powered by

Find Related
IT Contract Resources
Find consultants and contractors with the skills you need in your area!
Sarbanes-Oxley
HIPAA: Peoplesoft, SAP, etc.
Risk Based Audit
Search entire
Contractor Database
Get listed now!
Consultants or Firms

Weekly Reports

About the Editor

Peter Buxbaum has been writing about business, technology, and law for 12 years. He has published over 1,000 articles in publications such as Fortune, Forbes, Chief Executive, Computerworld, InformationWeek, and dozens of others. He earned a law degree from Temple University, studied economics at Columbia University, and taught seminars in international business at Penn State University.
He can be reached at editorial@itbusinessedge.com.
   
 
   

0 Comments:

Post a Comment

<< Home