THE ART OF DIS-CONNECTING, SOCIAL NETWORKING RISK MANAGEMENT ISACA Perth Chapter 13 October 2011

Size: px
Start display at page:

Download "THE ART OF DIS-CONNECTING, SOCIAL NETWORKING RISK MANAGEMENT ISACA Perth Chapter 13 October 2011"

Transcription

1 THE ART OF DIS-CONNECTING, SOCIAL NETWORKING RISK MANAGEMENT ISACA Perth Chapter 13 October 2011 Australian Crime Commission 1 THE ART OF DIS-CONNECTING SOCIAL NETWORKING RISK MANAGEMENT ISACA Perth Chapter 13 October

2 ENISA Ad-hoc Working Group on Risk Assessment and Risk Management When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll's Through the Looking-Glass (1872) 2

3 Social Media Social media is defined as using Internet-based applications or broadcast capabilities to disseminate and/or collaborate on information. This is different than traditional advertising and marketing channels due to the populist nature of social media, in which anyone with an Internet-attached device can, with near anonymity and without accountability, participate in public or private information or disinformation sharing, depending on access privileges to a social media web site. Current social media tools include: Blogs (e.g., WordPress, Drupal, TypePad ) Microblogs (e.g., Twitter, Tumblr) Instant messaging (e.g,, AOL Instant Messenger [AIM ], Microsoft Windows Live Messenger) Online communication systems (e.g., Skype ) Image and video sharing sites (e.g., Flickr, YouTube) Social networking sites (e.g., Facebook, MySpace) Professional networking sites (e.g., LinkedIn, Plaxo) Online communities that may be sponsored by the company itself (Similac.com, Open by American Express) Online collaboration sites (e.g., Huddle) The common link is that all of the tools are implemented and managed by individuals. These technologies can also be hacked, hijacked and leveraged by unscrupulous individuals. ISACA: Social Media Audit/Assurance Program 3

4 10 HB Delivering assurance based on ISO 31000: Risk management - Principles and guidelines Figure 2 Maturity Model for Internal Control Maturity Level Status of the Internal Control Environment Establishment of Internal Controls 0 Non-existent There is no recognition of the need for internal control. Control is not part of the There is no intent to assess the need for internal control. Incidents are dealt organization s culture or mission. There is a high risk of control deficiencies and with as they arise. incidents. 1 Initial/ad hoc There is some recognition of the need for internal control. The approach to risk and There is no awareness of the need for assessment of what is needed in terms control requirements is ad hoc and disorganized, without communication or of IT controls. When performed, it is only on an ad hoc basis, at a high level monitoring. Deficiencies are not identified. Employees are not aware of their and in reaction to significant incidents. Assessment addresses only the actual responsibilities. incident. 2 Repeatable but Intuitive Controls are in place but are not documented. Their operation is dependent on the Assessment of control needs occurs only when needed for selected IT knowledge and motivation of individuals. Effectiveness is not adequately evaluated. processes to determine the current level of control maturity, the target level Many control weaknesses exist and are not adequately addressed; the impact can that should be reached and the gaps that exist. An informal workshop be severe. Management actions to resolve control issues are not prioritized or approach, involving IT managers and the team involved in the process, is used consistent. Employees may not be aware of their responsibilities. to define an adequate approach to controls for the process and to motivate an agreed-upon action plan. 3 Defined Controls are in place and adequately documented. Operating effectiveness is Critical IT processes are identified based on value and risk drivers. A detailed evaluated on a periodic basis and there is an average number of issues. However, analysis is performed to identify control requirements and the root cause of the evaluation process is not documented. While management is able to deal gaps and to develop improvement opportunities. In addition to facilitated predictably with most control issues, some control weaknesses persist and impacts workshops, tools are used and interviews are performed to support the could still be severe. Employees are aware of their responsibilities for control. analysis and ensure that an IT process owner owns and drives the assessment and improvement process. 4 Managed and There is an effective internal control and risk management environment. A formal, IT process criticality is regularly defined with full support and agreement from Measurable documented evaluation of controls occurs frequently. Many controls are automated the relevant business process owners. Assessment of control requirements is and regularly reviewed. Management is likely to detect most control issues, but not based on policy and the actual maturity of these processes, following a all issues are routinely identified. There is consistent follow-up to address identified thorough and measured analysis involving key stakeholders. Accountability control weaknesses. A limited, tactical use of technology is applied to automate for these assessments is clear and enforced. Improvement strategies are controls. supported by business cases. Performance in achieving the desired outcomes is consistently monitored. External control reviews are organized occasionally. 5 Optimized An enterprise-wide risk and control program provides continuous and Business changes consider the criticality of IT processes and cover any need effective control and risk issues resolution. Internal control and risk to reassess process control capability. IT process owners regularly perform management are integrated with enterprise practices, supported with self-assessments to confirm that controls are at the right level of maturity to automated real-time monitoring with full accountability for control monitoring, meet business needs and they consider maturity attributes to find ways to risk management and compliance enforcement. Control evaluation is make controls more efficient and effective. continuous, based on self-assessments and gap and root cause analyses. The organization benchmarks to external best practices Employees are proactively involved in control improvements. and seeks external advice on internal control effectiveness. For critical processes, independent reviews take place to provide assurance that the controls are at the desired level of maturity and working as planned. ISACA: IT Assurance Guide Using COBIT, Appendix VII Maturity Model for Internal Control (figure 2) 4

5 Agencies MUST adopt a risk management approach to cover all areas of protective security activity across their organisation, in accordance with the Australian Standard for Risk Management AS/NZS ISO 31000:2009 and the Australian Standards HB 167:2006 Security risk management. Australian Government Protective Security Policy Framework V1.2 (January 2011), Protective Security Policy Branch, Attorney General s Department Security risk management is really a special application that should fit within an organisation s established risk management framework. It introduces a new element, the concept of someone deliberately introducing an exposure to potential harm and seeking actively to bypass controls in place. However, the similarities between organisational and security risk management far outweigh any differences. HB 167:2006 Security risk management 15 ACC

6 Threat intent = the optimism a threat agent has about successfully attacking a target Threat capability = the force a threat agent can bring to bear on a target Australian Government Protective Security Manual 6

7 7

8 Category Objective Control Mobile computing and teleworking To ensure information security when using mobile computing and teleworking facilities. A formal policy shall be in place, and appropriate security measures shall be adopted to protect against the risks of using mobile computing and communication facilities. A policy, operational plans and procedures shall be developed and implemented for teleworking activities. Security requirements of information systems To ensure that security is an integral part of information systems. Statements of business requirements for new information systems, or enhancements to existing information systems shall specify the requirements for security controls. LOCATION/USAGE HOME/HOME WORK/HOME HOME/WORK WORK/WORK ENISA: Online as soon as it happens 8

9 ENISA: Online as soon as it happens Category Objective Control Management of information security incidents and security incidents. improvements To ensure a consistent and effective approach is applied to the management of information security monitored. incidents. Compliance with legal requirements Identification of applicable legislation Management responsibilities and procedures shall be established to ensure a quick, effective, and orderly response to information There shall be mechanisms in place to enable the types, volumes, and costs of information security incidents to be quantified and Where a follow-up action against a person or organization after an information security incident involves legal action (either civil or criminal), evidence shall be collected, retained, and presented to conform to the rules for evidence laid down in the relevant jurisdiction(s). All relevant statutory, regulatory and contractual requirements and the organization s approach to meet these requirements shall be explicitly defined, documented, and kept up to date for each information system and the organization. ENISA - Online as soon as it happens 9

10 ENISA - Online as soon as it happens ENISA - Online as soon as it happens ENISA - Online as soon as it happens 10

11 ENISA - Online as soon as it happens ENISA - Online as soon as it happens 11

12 The Australian Government Performance Reference Mode (PRM) is a part of the Australian Government Architecture Reference Models which itself is based on the US Government s Federal Enterprise Architecture Framework See also: 12

13 HB Governance, risk management and control assurance 13

December 2015 THE STATUS OF GOVERNMENT S GENERAL COMPUTING CONTROLS:

December 2015 THE STATUS OF GOVERNMENT S GENERAL COMPUTING CONTROLS: December 2015 THE STATUS OF GOVERNMENT S GENERAL COMPUTING CONTROLS: 2014 www.bcauditor.com CONTENTS Auditor General s Comments 3 623 Fort Street Victoria, British Columbia Canada V8W 1G1 P: 250.419.6100

More information

CTI Capability Maturity Model

CTI Capability Maturity Model CTI Capability Maturity Model 2018 CTI-EU, Brussels November 2018 MARCO LOURENCO - ENISA Cyber Security Analyst Lead European Union Agency for Network and Information Security Whoami Started as data forensics

More information

Enterprise SM VOLUME 2, SECTION 2.6: TROUBLE AND COMPLAINT HANDLING

Enterprise SM VOLUME 2, SECTION 2.6: TROUBLE AND COMPLAINT HANDLING VOLUME 2, SECTION 2.6: TROUBLE AND COMPLAINT HANDLING 2.6 TROUBLE AND COMPLAINT HANDLING [C.3.4.2, M.3.7] 2.6.1 TROUBLE AND COMPLAINT ORGANIZATION AND RESOURCES [L.34.2.3.6] The Level 3 Team provides a

More information

For a leader to be effective in today s uncertain world, they have to. understand the nature of complexity and adapt their leadership role in a

For a leader to be effective in today s uncertain world, they have to. understand the nature of complexity and adapt their leadership role in a Exercise and Testing IDRC 2010 Emergent Leadership For a leader to be effective in today s uncertain world, they have to understand the nature of complexity and adapt their leadership role in a manner

More information

Chapter 41 Tourism Saskatchewan Managing the Use of Social Media

Chapter 41 Tourism Saskatchewan Managing the Use of Social Media Chapter 41 Tourism Saskatchewan Managing the Use of Social Media 1.0 MAIN POINTS Tourism Saskatchewan uses social media to market Saskatchewan as a tourism destination. Social media channels, such as Facebook,

More information

CGEIT Certification Job Practice

CGEIT Certification Job Practice CGEIT Certification Job Practice Job Practice A job practice serves as the basis for the exam and the experience requirements to earn the CGEIT certification. This job practice consists of task and knowledge

More information

ISACA All Rights Reserved.

ISACA All Rights Reserved. Tichaona Zororo CIA, CISA, CISM, CRISC, CRMA, CGEIT, COBIT 5 Certified Assessor B.Sc. Honours Information Systems, PGD Computer Auditing Accredited COBIT 5 Trainer ISACA 2016. Business Value Value

More information

International Civil Aviation Organization FIRST INFORMATION MANAGEMENT PANEL (IMP/1) Montreal, Canada January, 25 30, 2015

International Civil Aviation Organization FIRST INFORMATION MANAGEMENT PANEL (IMP/1) Montreal, Canada January, 25 30, 2015 International Civil Aviation Organization WORKING PAPER 15/01/2015 rev. 0 FIRST INFORMATION MANAGEMENT PANEL (IMP/1) Montreal, Canada January, 25 30, 2015 Agenda Item 5: Review and elaborate on concepts,

More information

BT Identity and Access Management Quick Start Service

BT Identity and Access Management Quick Start Service BT Identity and Access Management Quick Start Service The BT Identity and Access Management Quick Start Service enables organisations to rapidly assess their Identity and Access Management (IAM) implementation

More information

A Guide to Successful Social Media Marketing

A Guide to Successful Social Media Marketing A Guide to Successful Social Media Marketing Advantages & Disadvantages of Social Networking Advantages It s one of the main ways the world works today. It usually is free, and it is always low cost. It

More information

Starting a Organizational Competitive Intelligence Function

Starting a Organizational Competitive Intelligence Function Starting a Organizational Function Basic Steps to Implement or Improve a Valuable Resource for Strategy Decision-Makers Tom Hawes, JTHawes Consulting, LLC October 2009 The Case for Action Needed Basic

More information

Translate stakeholder needs into strategy. Governance is about negotiating and deciding amongst different stakeholders value interests.

Translate stakeholder needs into strategy. Governance is about negotiating and deciding amongst different stakeholders value interests. Principles Principle 1 - Meeting stakeholder needs The governing body is ultimately responsible for setting the direction of the organisation and needs to account to stakeholders specifically owners or

More information

Contents. List of figures. List of tables. Acknowledgements. 1 Introduction 1. 5 Where do we want to be? Achieving cultural change 23

Contents. List of figures. List of tables. Acknowledgements. 1 Introduction 1. 5 Where do we want to be? Achieving cultural change 23 Contents List of figures List of tables Acknowledgements v vii viii 1 Introduction 1 1.1 ITIL and good practice in service management 4 1.2 Overview 7 1.3 Purpose 8 1.4 Usage 9 1.5 What are services? 10

More information

SOCIAL MEDIA FOR EVERY DAY CREATE YOUR OWN SOCIAL MEDIA PLAN BROUGHT TO YOU BY LEADERSHIP & LIPSTICK

SOCIAL MEDIA FOR EVERY DAY CREATE YOUR OWN SOCIAL MEDIA PLAN BROUGHT TO YOU BY LEADERSHIP & LIPSTICK SOCIAL MEDIA FOR EVERY DAY CREATE YOUR OWN SOCIAL MEDIA PLAN BROUGHT TO YOU BY LEADERSHIP & LIPSTICK Copyright 2015 by Leadership & Lipstick Brigitte Kobi You are welcome to share this checklist with your

More information

CORROSION MANAGEMENT MATURITY MODEL

CORROSION MANAGEMENT MATURITY MODEL CORROSION MANAGEMENT MATURITY MODEL CMMM Model Definition AUTHOR Jeff Varney Executive Director APQC Page 1 of 35 TABLE OF CONTENTS OVERVIEW... 5 I. INTRODUCTION... 6 1.1 The Need... 6 1.2 The Corrosion

More information

SOCIAL MEDIA FOR SMEs

SOCIAL MEDIA FOR SMEs SOCIAL MEDIA FOR SMEs Glass and Glazing Victorian State Conference Presented By Rajiv Ramachandran SOCIAL MEDIA FOR SMEs Understand & demystify Social Media Identify ways to Gain, Maintain & Retain Customers

More information

Developing a Communications Strategy

Developing a Communications Strategy Developing a Communications Strategy Lin Lin Yeoh Global Director, Communications & External Relations 16 th Africa Scout Conference, 2015 Kampala, Uganda Know the Organisation s strategy A Strategy is

More information

IS Group Assignments Internet Tools and Business. Blank Mind Group. Rick Dana Darrell Jason Kuo-Luen

IS Group Assignments Internet Tools and Business. Blank Mind Group. Rick Dana Darrell Jason Kuo-Luen IS 5800 -Group Assignments Internet Tools and Business Blank Mind Group Rick Dana Darrell Jason Kuo-Luen February 24/ 2010 Samples Explain Evaluate how they are using the Internet as part of their business

More information

IMPLEMENT A PIPELINE SMS

IMPLEMENT A PIPELINE SMS GROUP HOW TO IMPLEMENT A PIPELINE SMS AN INTRODUCTORY GUIDE WITH IMPLEMENTATION SUGGESTIONS AND STRATEGIES 3 2 YOUR GUIDE TO IMPLEMENTATION. An Introductory Guide on How to Implement Pipeline SMS Implementing

More information

A Risk Management Process for Information Security and Business Continuity

A Risk Management Process for Information Security and Business Continuity A Risk Management Process for Information Security and Business Continuity João Carlos Gonçalves Fialho Instituto Superior Técnico - Taguspark joaogfialho@gmail.com ABSTRACT It was from the DNS.PT internship

More information

IT Management & Governance Tool Assess the importance and effectiveness of your core IT processes

IT Management & Governance Tool Assess the importance and effectiveness of your core IT processes IT & Governance Tool Assess the importance and effectiveness of your core IT processes STRATEGY& GOVERNANCE IT & Governance Framework APPS EDM01 ITRG04 DATA &BI ITRG06 IT Governance Application Portfolio

More information

Track and Trace Compliance. New Requirements, Challenges, Paybacks & Solutions

Track and Trace Compliance. New Requirements, Challenges, Paybacks & Solutions Track and Trace Compliance New Requirements, Challenges, Paybacks & Solutions Strong antidotal evidence suggests your traceability system is NOT a qualified traceability system It is not what you don't

More information

September 17, 2012 Pittsburgh ISACA Chapter

September 17, 2012 Pittsburgh ISACA Chapter September 17, 2012 Pittsburgh ISACA Chapter What is COBIT? Control Objectives for Information and related Technologies ISACA s guidance on the enterprise governance and management of IT. Builds on more

More information

Policy Incident Communication Plan. Table of Contents

Policy Incident Communication Plan. Table of Contents Table of Contents Incident Communication Plan... 3 Overview... 3 Objective... 3 Policy... 4 Guidelines... 4 Request for Information... 5 Editorial or Letter to Editor Requests... 6 Requests for Interviews...

More information

THE COMPLETE GUIDE TO ISO14001

THE COMPLETE GUIDE TO ISO14001 THE COMPLETE GUIDE TO ISO14001 1. Introduction... 3 Plan Do Check Act... 5 2. Requirements... 7 Environmental Policy... 7 Environmental Aspects... 7 Legal and Other Requirements... 8 Objectives & Targets...

More information

Step 2: Analyze Stakeholders/Drivers and Define the Target Business Strategy

Step 2: Analyze Stakeholders/Drivers and Define the Target Business Strategy Step 2: Analyze Stakeholders/Drivers and Define the Target Business Strategy Version 1.5, December 2006 1. Step Description and Purpose The step Analyze Stakeholders/Drivers and Define the Target Business

More information

THE SOCIAL MEDIA IMPACT ON SMALL AND MEDIUM SIZED BUSINESSES

THE SOCIAL MEDIA IMPACT ON SMALL AND MEDIUM SIZED BUSINESSES THE SOCIAL MEDIA IMPACT ON SMALL AND MEDIUM SIZED BUSINESSES Mihai Alexandru Constantin Logofatu PhD. Student University of Craiova Abstract: This paper aims to be a short introduction to social media

More information

8. Target & Vital Areas

8. Target & Vital Areas 8. Target & Vital Areas 7. Threat Definition RTC on Physical Protection and Security Management for RRs Serpong, Indonesia 29 th September to 3 rd October 2014 Information presented, developed and compiled

More information

The impact of social media on information security and assurance ISACA San Francisco Fall Conference October

The impact of social media on information security and assurance ISACA San Francisco Fall Conference October The impact of social media on information security and assurance 2012 ISACA San Francisco Fall Conference 15 17 October 2012!@# Social media explosion Facebook LinkedIn Twitter Google Pinterest 950 million

More information

Governance Institute of Australia Ltd

Governance Institute of Australia Ltd Governance Institute of Australia Ltd Management Policy 1. Overview management is a key element of effective corporate governance. In view of this, Governance Institute of Australia Ltd (Governance Institute)

More information

CORESafety Safety and Health Principles

CORESafety Safety and Health Principles CORESafety Safety and Health Principles Principle 1 Leadership Development Identifying and developing employees in leadership positions who can: Influence safety and health performance improvement. Positively

More information

NEPCon Impartiality Policy

NEPCon Impartiality Policy NEPCon Impartiality Policy NEPCon Policies 21 December 2016 2011 NEPCon Impartiality Policy 2 The purpose of this policy is to describe how NEPCon ensures independence, impartiality and transparency in

More information

Governance, COBIT and the Cloud a match made in the sky! Robert E Stroud CGEIT International Vice President ISACA Treasurer, Director Audit,

Governance, COBIT and the Cloud a match made in the sky! Robert E Stroud CGEIT International Vice President ISACA Treasurer, Director Audit, Governance, COBIT and the Cloud a match made in the sky! Robert E Stroud CGEIT International Vice President ISACA Treasurer, Director Audit, Standards & Compliance itsmf Intl. Service Management and Governance

More information

EA-7/04 Legal Compliance as a part of accredited ISO 14001: 2004 certification

EA-7/04 Legal Compliance as a part of accredited ISO 14001: 2004 certification Publication Reference EA-7/04 Legal Compliance as a part of Accredited ISO 14001: 2004 certification PURPOSE The text of this document has been produced by a working group in the European co-operation

More information

Assistance Options to New Applicants and Sponsors in connection with Internal Controls over Financial Reporting

Assistance Options to New Applicants and Sponsors in connection with Internal Controls over Financial Reporting Technical Bulletin - AATB 1 Issued March 2008 Technical Bulletin Assistance Options to New Applicants and Sponsors in connection with Internal Controls over Financial Reporting This Technical Bulletin

More information

City of Marceline, Missouri Communications Plan

City of Marceline, Missouri Communications Plan City of Marceline, Missouri Communications Plan Approved by Ordinance #35.1213 September 19, 2014 Table of Contents INTRODUCTION... 2 POLICY STATEMENT... 3 TARGETED AUDIENCES... 5 GUIDING PRINCIPALS...

More information

Quick Guide: Meeting ISO Requirements for Asset Management

Quick Guide: Meeting ISO Requirements for Asset Management Please visit the NAMS.org.nz website for downloading the digital version of this quick guide. Supplement to the IIMM 2011 Quick Guide: Meeting ISO 55001 Requirements for Asset Management Using the International

More information

Asset Management Policy

Asset Management Policy Asset Management Policy January 2018 Introduction Our Asset Management Policy was last published in 2014. It is being updated to reflect our commitment to regularly review and improve all of our Asset

More information

Guidelines for Social Media Engagement. for the Consumer Health Product Industry VOLUNTARY GUIDE

Guidelines for Social Media Engagement. for the Consumer Health Product Industry VOLUNTARY GUIDE Guidelines for Social Media Engagement for the Consumer Health Product Industry VOLUNTARY GUIDE March 2016 Table of Contents 1.0 Background. 3 1.1 Objective.. 3 1.2 Guiding Principles.. 4 2.0 Scope.. 4

More information

Social Media. For a Small Business AN INTRODUCTION TO - A PUBLICATION OF KBA CONSULTING-

Social Media. For a Small Business AN INTRODUCTION TO - A PUBLICATION OF KBA CONSULTING- - A PUBLICATION OF KBA CONSULTING- AN INTRODUCTION TO Social Media For a Small Business THE STEP-BY-STEP GUIDE TO [YouTube, LinkedIn, Twitter] AND HOW YOU CAN DO IT TABLE OF CONTENTS 1 Intro 2 Table of

More information

Marketing Your Firm Successfully

Marketing Your Firm Successfully Marketing Your Firm Successfully Presented by Michelle Bomberger JD, MBA Equinox Business Law Group PLLC www.equinoxbusinesslaw.com Gil Price - MSBA Price Management Group www.pmgideas.com Legal Disclaimer:

More information

COBIT Control Assessment Questionnaire

COBIT Control Assessment Questionnaire The key to maintaining profitability in a technologically changing environment is how well you maintain control. COBIT's Control Objectives provides the critical insight needed to delineate a clear policy

More information

Ethical leadership and corporate citizenship. Applied. Applied. Applied. Company s ethics are managed effectively.

Ethical leadership and corporate citizenship. Applied. Applied. Applied. Company s ethics are managed effectively. CORPORATE GOVERNANCE- KING III COMPLIANCE Analysis of the application as at 24 June 2015 by Master Drilling Group Limited (the Company) of the 75 corporate governance principles as recommended by the King

More information

JOB DESCRIPTION. Manager Service Management Technical Systems & Proposed band. Job family

JOB DESCRIPTION. Manager Service Management Technical Systems & Proposed band. Job family Job title Job family Manager Service Management Technical Systems & Proposed Delivery band E Job purpose The Manager, Service Management is responsible for leading a functional team in one of the specialist

More information

Auditing Open Source Applications by Using COBIT 4.1

Auditing Open Source Applications by Using COBIT 4.1 Auditing Open Source Applications by Using COBIT 4.1 Assist. Cristian AMANCEI, PhD candidate Academy of Economic Studies, Bucharest, Romania Department of Computer Science in Economics cristian.amancei@ie.ase.ro

More information

TABLE OF CONTENTS CHAPTER TITLE PAGE

TABLE OF CONTENTS CHAPTER TITLE PAGE vii TABLE OF CONTENTS CHAPTER TITLE PAGE TITLE PAGE DECLARATION DEDICATION ACKNOWLEDGEMENT ABSTRACT ABSTRAK TABLE OF CONTENTS LIST OF TABLES LIST OF FIGURES LIST OF APPENDICES I II III IV VI VII VIII XII

More information

WHSE POL 1 WORK HEALTH, SAFETY & ENVIRONMENT MANAGEMENT POLICY

WHSE POL 1 WORK HEALTH, SAFETY & ENVIRONMENT MANAGEMENT POLICY Issue Number: 5 Prepared by (author): Greg McDonald, Group Manager WHSE Authorised by: Chen Wei Ng, Managing Director Date of release: 01 January 2014 Date of review 01 December 2015 WHSE POL 1 WORK HEALTH,

More information

Sarbanes-Oxley Compliance Kit

Sarbanes-Oxley Compliance Kit Kit February 2018 This product is NOT FOR RESALE or REDISTRIBUTION in any physical or electronic format. The purchaser of this template has acquired the rights to use it for a SINGLE Disaster Recovery

More information

General Guidance for Developing, Documenting, Implementing, Maintaining, and Auditing an SQF Quality System. Quality Code. SQF Quality Code, Edition 8

General Guidance for Developing, Documenting, Implementing, Maintaining, and Auditing an SQF Quality System. Quality Code. SQF Quality Code, Edition 8 General Guidance for Developing, Documenting, Implementing, Maintaining, and Auditing an SQF Quality System Quality Code SQF Quality Code, Edition 8 October 2017 2014 Safe Quality Food Institute 2345 Crystal

More information

Drakewell Support Service Level Agreement

Drakewell Support Service Level Agreement Drakewell Support Service Level Agreement Overview This Service Level Agreement ( SLA ) details customer service and support to be performed on a tenant s ( Client ) Drakewell instance or as-needed technical

More information

S.D.F ELECTRICAL PTY LTD ABN EMPLOYEE POLICY BOOKLET

S.D.F ELECTRICAL PTY LTD ABN EMPLOYEE POLICY BOOKLET S.D.F ELECTRICAL PTY LTD EMPLOYEE POLICY BOOKLET 2017 S.D.F ELECTRICAL PTY LTD BLANK PAGE S.D.F Electrical Pty Ltd BUSINESS OBJECTIVES KEY POLICIES ASSOCIATED PROCEDURES Working Live Establishing Employee

More information

Governance in a Multi-Supplier Environment

Governance in a Multi-Supplier Environment Governance in a Multi-Supplier Environment This paper provides advice and guidance for organisations faced with governing a multi-supplier environment. 1. The Need for Governance ISACA, the global IT governance

More information

GENERAL GUIDANCE NOTE The Board Charter aligned to King IV August 2018

GENERAL GUIDANCE NOTE The Board Charter aligned to King IV August 2018 1 GENERAL GUIDANCE NOTE The Board Charter aligned to King IV August 2018 PURPOSE In accordance with the King IV Report on Corporate Governance for South Africa 2016 1 the governing body ensures that its

More information

A guide to using social networking websites and blogs

A guide to using social networking websites and blogs Acceptable use policy for Internet users Supporting documentation A guide to using social networking websites and blogs Version 1.0 (final) October 2010-1 - Introduction... 3 Definitions... 3 Social networking

More information

5 Great Reasons to Start Using Sendible

5 Great Reasons to Start Using Sendible 5 Great Reasons to Start Using Sendible Sendible is an online marketing service for businesses and marketers to promote, grow and track their brands through the use of Social Media, Email and SMS messaging.

More information

Implementing Enterprise 2.0 Implementing Enterprise 2.0 A practical guide to creating business value inside organizations with web technologies Ross Dawson and the Advanced Human Technologies team Version

More information

Internal Audit Report

Internal Audit Report Internal Audit Report Key Financial Controls Accounts Payable and Accounts Receivable December 2017 To: Deputy Chief Executive Director of Finance Head of Finance Finance Manager Copied to: Operations

More information

Top 35 Reasons You Need Contact Center Performance Management

Top 35 Reasons You Need Contact Center Performance Management Top 35 Reasons You Need Contact Center Performance Management February 2014 Sponsored by: - 1 - DMG Consulting LLC Table of Contents Introduction... 1 Real-Time and Historical CCPM... 1 Top Reasons to

More information

Hennepin County Sheriff s Office Policy Manual

Hennepin County Sheriff s Office Policy Manual Document Number: 1058 Document Name: Employee Speech, Expression and Social Networking Effective Date: February 9, 2016 Document Status: Approved 1058.1 PURPOSE AND SCOPE This policy is intended to address

More information

Enterprise Risk Management Framework

Enterprise Risk Management Framework Enterprise Risk Management Framework 2018 Johnson & Johnson 1 2 Introduction In order to deliver value to our consumers, patients, caregivers, employees, communities and shareholders, we at Johnson & Johnson

More information

Quality Manual DRAFT. Quality Management Plan Version A1 Date: <22/01/11> Page 1 of 17

Quality Manual DRAFT. Quality Management Plan Version A1 Date: <22/01/11> Page 1 of 17 Quality Manual DRAFT Page 1 of 17 Document Acceptance and Release Notice This is Revision A1 of the East Coast Designer Builders Quality Manual. The Manual is a managed document. For identification of

More information

Recruit, Hire and Onboard the Right Talent. White Paper. Developing Strategy and Using New Tools Are Critical. Sponsored by

Recruit, Hire and Onboard the Right Talent. White Paper. Developing Strategy and Using New Tools Are Critical. Sponsored by Ventana Research: Recruit, Hire and Onboard the Right Talent Recruit, Hire and Onboard the Right Talent Developing Strategy and Using New Tools Are Critical White Paper Sponsored by 1 Ventana Research

More information

SS177: CSR Branding and Communication

SS177: CSR Branding and Communication SS177: CSR Branding and Communication SS177 Rev.001 CMCT COURSE OUTLINE Page 1 of 7 Training Description: The course provides participants with a clear overview of key concepts involved in managing and

More information

Establishing Data Fusion Center Baseline Technology Capabilities. Paul Christin ESRI David Stampfli Microsoft

Establishing Data Fusion Center Baseline Technology Capabilities. Paul Christin ESRI David Stampfli Microsoft Establishing Data Fusion Center Baseline Technology Capabilities Paul Christin ESRI David Stampfli Microsoft Problem The asymmetrical threat of organized crime, gangs, drug cartels and terrorist organizations

More information

Audit of Entity Level Controls

Audit of Entity Level Controls Unclassified Internal Audit Services Branch Audit of Entity Level Controls February 2014 SP-606-03-14E You can download this publication by going online: http://www12.hrsdc.gc.ca This document is available

More information

DATA PROTECTION POLICY 2016

DATA PROTECTION POLICY 2016 DATA PROTECTION POLICY 2016 ADOPTED FROM BRADFORD METROPOLITAIN COUNCIL MODEL POLICY AUTUMN 2016 To be agreed by Governors on; 17/10/16 Signed by Chair of Governors: Statutory policy: Yes Frequency of

More information

THE MOVE TO SOCIAL MOBILE AND THE CLOUD:

THE MOVE TO SOCIAL MOBILE AND THE CLOUD: THE MOVE TO SOCIAL MOBILE AND THE CLOUD: A snapshot of the privacy, security and other legal risks to be managed Presenter: David Yates Partner, Perth 9 May 2014 11009050/11 INFORMATION SECURITY All organisations

More information

Social Media in a Project Environment. Survey Results

Social Media in a Project Environment. Survey Results Social Media in a Project Environment Survey Results Table of Contents 1 About the Survey...3 How I did the survey...3 Why I did the survey...3 Respondent profile...3 2. Using social media and enterprise

More information

Contents. viii. List of figures. List of tables. OGC s foreword. 6 Organizing for Service Transition 177. Chief Architect s foreword.

Contents. viii. List of figures. List of tables. OGC s foreword. 6 Organizing for Service Transition 177. Chief Architect s foreword. iii Contents List of figures List of tables OGC s foreword Chief Architect s foreword Preface Acknowledgements v vii viii 1 Introduction 1 ix xi xii 1.1 Overview 3 1.2 Context 3 1.3 Goal and scope of Transition

More information

05/15/2018 Scott Baron Added UCF IT definition as of May 2018 Added Section I. Document Control

05/15/2018 Scott Baron Added UCF IT definition as of May 2018 Added Section I. Document Control University of Central Florida Information Technology (UCF IT) Title: Effective: 09/01/2016 UCF IT Change Management Policy & Procedure Revised: 05/15/2018 Approved By: Michael Sink, Associate VP & COO,

More information

COMPLIANCE IN A RISK MANAGEMENT WORLD

COMPLIANCE IN A RISK MANAGEMENT WORLD Society of Corporate Compliance and Ethics Regional Compliance & Ethics Conference COMPLIANCE IN A RISK MANAGEMENT WORLD Mark Lasswell SVP/Chief Compliance Officer Securities America, Inc. October 23,

More information

The Maryland-National Capital Park and Planning Commission

The Maryland-National Capital Park and Planning Commission Class Definition: Under direction, manages a full range of challenging projects to design or construct park or recreation facilities as a Registered Professional Architect; works fully proficiently as

More information

npliance IN 2008, MICROSOFT CORP. WAS FINED 899 MILLION Auditing for

npliance IN 2008, MICROSOFT CORP. WAS FINED 899 MILLION Auditing for IN 2008, MICROSOFT CORP. WAS FINED 899 MILLION EUROS (US $1.15 BILLION) BY EUROPEAN UNION REGULATORS for failing to comply with a 2004 antitrust order. The previous year, DaimlerChrysler paid a US $30

More information

Making Sense of Social Media Strategies and Tactics for Facebook, Twitter and More

Making Sense of Social Media Strategies and Tactics for Facebook, Twitter and More Making Sense of Social Media Strategies and Tactics for Facebook, Twitter and More Peter Muir President Bizucate Inc. 2010 Bizucate Inc. Who am I? Principal of an education, consulting and coaching company

More information

Table of Contents BACKGROUND 3 OBJECTIVES, SCOPE & METHODOLOGY 3-5 CONTROLS REVIEW 5 CONCLUSION & NEXT STEPS 11 APPENDIX DETAILED ANALYSIS 14

Table of Contents BACKGROUND 3 OBJECTIVES, SCOPE & METHODOLOGY 3-5 CONTROLS REVIEW 5 CONCLUSION & NEXT STEPS 11 APPENDIX DETAILED ANALYSIS 14 November 2015 Table of Contents BACKGROUND 3 OBJECTIVES, SCOPE & METHODOLOGY 3-5 CONTROLS REVIEW 5 CONCLUSION & NEXT STEPS 11 APPENDIX DETAILED ANALYSIS 14 IT Internal Controls Audit November 2015 1 List

More information

COMMUNICATIONS AND ENGAGEMENT STRATEGY FOR THE PROBATION BOARD FOR NORTHERN IRELAND

COMMUNICATIONS AND ENGAGEMENT STRATEGY FOR THE PROBATION BOARD FOR NORTHERN IRELAND COMMUNICATIONS AND ENGAGEMENT STRATEGY FOR THE PROBATION BOARD FOR NORTHERN IRELAND 2017-20 1. Introduction This strategy sets out the framework for all communications and engagement activity undertaken

More information

This strategy will help you create, develop, build and manage your social media presence.

This strategy will help you create, develop, build and manage your social media presence. 1 1/7 Welcome to Social Media Strategy! This strategy will help you create, develop, build and manage your social media presence. Through this process your target audiences will be identified and key messages

More information

Technical Specification

Technical Specification ISO/TS 9002:2016 SA TS ISO 9002:2017 Technical Specification Quality management systems Guidelines for the application of ISO 9001:2015 This Australian Technical Specification was prepared by Committee

More information

Media Influence on Telecom Purchases Among Multicultural Consumers

Media Influence on Telecom Purchases Among Multicultural Consumers Media Influence on Telecom Purchases Among Multicultural Consumers How do Hispanic, Asian and African differ in how they shop for mobile phones and plans? How does digital media play a role? Oct. 2017

More information

The Sector Skills Council for the Financial Services Industry. National Occupational Standards. Risk Management for the Financial Sector

The Sector Skills Council for the Financial Services Industry. National Occupational Standards. Risk Management for the Financial Sector The Sector Skills Council for the Financial Services Industry National Occupational Standards Risk Management for the Financial Sector Final version approved April 2009 IMPORTANT NOTES These National Occupational

More information

Thematic Review of Police Scotland s approach to the development and operational delivery of the Annual Police Plan ( )

Thematic Review of Police Scotland s approach to the development and operational delivery of the Annual Police Plan ( ) HM INSPECTORATE OF CONSTABULARY IN SCOTLAND Thematic Review of Police Scotland s approach to the development and operational delivery of the Annual Police Plan (2018-19) June 2018 Improving Policing Across

More information

Take your social media performance to the next level with powerful social data intelligence

Take your social media performance to the next level with powerful social data intelligence LexisNexis Social Analytics POWERED BY Take your social media performance to the next level with powerful social data intelligence Empowering brands and agencies to make business decisions based on social

More information

The 5 New Messaging Rules

The 5 New Messaging Rules The 5 New Messaging Rules for Community Engagement by Dr. Steven B. Goldman About the Author DR. STEVEN B. GOLDMAN is an internationally recognized expert and consultant in Business Continuity, Crisis

More information

Occupational Health and Safety Management Manual v2.2

Occupational Health and Safety Management Manual v2.2 Occupational Health and Safety Management Manual v2.2 Written: February 2013 Author: David Seymour, Director of Operations Co Author: Mathew Sprake, Operations Manager Approved: Board of Directors 1. Introduction

More information

Chapter 10 Strategy Evaluation and Control

Chapter 10 Strategy Evaluation and Control Chapter 10 Strategy Evaluation and Control 1 Learning Objective To understand the strategic control process To understand the clear definition of what needs to be controlled To learn the process of setting

More information

HANDOUT A: DESIGNING, IMPLEMENTING AND SUSTAINING A METRICS PROGRAM

HANDOUT A: DESIGNING, IMPLEMENTING AND SUSTAINING A METRICS PROGRAM HANDOUT A: DESIGNING, IMPLEMENTING AND SUSTAINING A METRICS PROGRAM CRISC CGEIT CISM CISA 9/11/2013 1 Handout A: Developing a Security metrics program Identify business/it drivers for the program and sponsors

More information

Glasgow Kelvin College. Publicity / Communications. Audit Report No: 2017/03

Glasgow Kelvin College. Publicity / Communications. Audit Report No: 2017/03 Item 10a Glasgow Kelvin College Publicity / Communications Audit Report No: 2017/03 Draft issued: 10 March 2017 2nd Draft issued: 17 March 2017 Final issued: 21 March 2017 LEVEL OF ASSURANCE Satisfactory

More information

Report. Quality Assessment of Internal Audit at <Organisation> Draft Report / Final Report

Report. Quality Assessment of Internal Audit at <Organisation> Draft Report / Final Report Report Quality Assessment of Internal Audit at Draft Report / Final Report Quality Self-Assessment by Independent Validation by Table of Contents 1.

More information

Proposed Development Plan Scheme

Proposed Development Plan Scheme Appendix 1 Proposed Development Plan Scheme May 2014 LIVE Park is your chance to really understand the future potential of where you live, work, play and invest. It sets out how planning can help improve

More information

Did You. Social Networking, Privacy and Employment Law Issues

Did You. Social Networking, Privacy and Employment Law Issues My Did You Wall? Social Networking, Privacy and Employment Law Issues By g 26 June / July 2010 In the beginning, accessing the Internet was not an interactive activity. Instead, people used it primarily

More information

Part 1 Executive Summary

Part 1 Executive Summary 2013 December Part 1 Executive Summary Local Government Town Planning Guideline for Alcohol Outlets S u i t e 6, 2 8 0 H a y S t r e e t, S U B I A C O W A 6 0 0 8 Disclaimer: This Guideline does not replace

More information

Short-Medium Term Marketing Plan template Voluntary Sector Organisation

Short-Medium Term Marketing Plan template Voluntary Sector Organisation Short-Medium Term Marketing Plan template Voluntary Sector Organisation Contents 1.0 Executive summary 2.0 Current situation Where are we now? 2.1 The Marketing audit 2.1.1 Financial summary current funding

More information

Understanding the Challenge and Incredible Potential of IT Governance

Understanding the Challenge and Incredible Potential of IT Governance Understanding the Challenge and Incredible Potential of IT Governance REALIZING THE MOST VALUE FROM TECHNOLOGY THROUGH BUSINESS GOV ERNANC E O F IT Governance defined gov er nance noun (ˈgə-vər-nən(t)s)

More information

ADMINISTRATION OF QUALITY ASSURANCE PROCESSES

ADMINISTRATION OF QUALITY ASSURANCE PROCESSES ADMINISTRATION OF QUALITY ASSURANCE PROCESSES The organizational arrangements procedures outlined in this chapter have been found to be effective in higher education institutions in many parts of the world.

More information

Guidance Document. Auditing the Cloud Controls Matrix

Guidance Document. Auditing the Cloud Controls Matrix Guidance Document Auditing the Cloud Controls Matrix Release 1: 08/08/2013 2013 Cloud Security Alliance All Rights Reserved. Valid at time of printing. All rights reserved. You may download, store, display

More information

CIP 2017 Project Outline

CIP 2017 Project Outline Outline IT_SUM_1 Summer 1 Jun 2017 31 Aug 2017 Information Technology 4. Name: Process Improvement in Construction Management Objectives: 6. To optimize processes in construction project management To

More information

The IIA s Global Strategic Planning. European Session Advance Material and Worksheet

The IIA s Global Strategic Planning. European Session Advance Material and Worksheet The IIA s Global Strategic Planning European Session Advance Material and Worksheet Session Overview The IIA s Global Strategic Plan is critical to guiding us forward in pursuit of The IIA s vision: Internal

More information

The Maryland-National Capital Park and Planning Commission

The Maryland-National Capital Park and Planning Commission Class Definition: Under direction, manages a full range of challenging projects to design or construct park or recreation facilities as a Registered Professional Landscape Architect; works fully proficiently

More information