End-user IT Security Policy Compliance: A Confidence-Building Measures Approach

Size: px
Start display at page:

Download "End-user IT Security Policy Compliance: A Confidence-Building Measures Approach"

Transcription

1 End-user IT Security Policy Compliance: A Confidence-Building Measures Approach Abstract Research-in-Progress Emmanuel Ayaburi The University of Texas at San Antonio emmanuel.ayaburi@utsa.edu Corporate information systems security managers are continuously investing in the latest technical security tools to make their defenses against internal and external attacks on their information systems effective and efficient. However, these technical tools do not provide complete protection and organizations are experiencing a rise in security breaches. The cause of some security breaches are attributed to the actions of employees within the organization. Based on literature in international relations, this study advances four propositions to explain how end-user compliance with organizational information security policy (ISP) can be achieved using a confidence-building measures approach. The set of four propositions developed involve trust, prior notification of information system security initiative(s), disclosure of observed non-compliant behavior and promotion of compliant behavior. A laboratory experiment has been proposed as a methodology to assess these propositions. Keywords Compliance, confidence-building measures, information security policy. Introduction Advances in technology, the movement toward cloud based applications and the changing nature of cyber-attacks have converged to increase the risks posed by unintentional or deliberate non-compliance with organization laid down IT security protocols. End-user non-compliance has a direct bearing on the ability of organizations to reduce the risks posed by the full spectrum of cyber threats. Technology dependent organizations over the years have concerned themselves with implementation of the latest state-of-art security technology. However, negligent insiders are among the top causes of data breaches with an industry survey estimating that 39% of organizational data breaches are the result of insider actions (Symantec Corp & Ponemon Institute study, 2011). Until technologies are appropriately used and security policies complied with by users within the organization, the security goals of the firms are less likely to be met. Information security policy (ISP) compliance refers to users behaving in a manner consistent with provisions of the security policy covering the information assets of their organizations so as to achieve a secured information infrastructure (Padayachee 2012). ISP has been studied by a lot of people in academia and industry. Most studies on achieving user security compliance do so from the personality traits perspective (Padayachee, (2012); Sommestad et al. (2014); Siponen et al. 2010). Some of the personality traits identified as having an influence on compliant behavior include self-efficacy, personal beliefs or ethics and threat appraisal. Other studies have looked at environmental factors such as certainty of detection, severity of punishments and swiftness of punishment as having an effect on user compliance (Herath and Rao 2009; Son (2011). Some other studies have looked at the importance of trust in achieving better user compliance with security policy but little attention is paid to how trust in ISP can be developed (Colwill 2009). Trust increases employee affinity, loyalty, organizational culture stability and building of confidence in collective actions taken in the interest of the organization. This study extends from this stream of extant literature to look at how trust in organizational ISP can be built and sustained. Confidence in the actions of management and users holds the potential of strengthening the role of security policies in promoting compliance to the prescribed use of organization information technology

2 infrastructure. Confidence-Building Measures (CBM) consist of activities or measures taken by interested parties to minimize or prevent uncertainties before, during or after a conflict (Chevrier 1998). This concept has been used to achieve compliance from states or governments to an agreed security plan. This study adopts the approach of CBM to investigate user information system security policy compliance behavior. Specifically, the goal of this study is to investigate factors that influence effective user compliance with implementation of information system security policy from a confidence-building measures perspective. Therefore this study seeks answers to the following questions: RQ1: Through what mechanism(s) can end-users trust in ISP be accomplished? RQ2: What is the effect of user trust in ISP on ISP compliance? The rest of the study is structured as follows; next will be a review of the literature on user compliance, followed by the development of user compliance model from CBM perspective and in conclusion will be plans for future testing of the model proposed in this study. Literature Review Previous studies in information technology and security have applied many prominent and useful theories to explain various individual behavior and organizational security policy development. Some of these theories include fear appeals, protection motivation theory and theory of reasoned action (Sommestad et al. 2014). Using theories of protection motivation, deterrence, rewards, innovation diffusion and reasoned action, Siponen et al. (2010) empirically identified normative beliefs, threat appraisal, self-efficacy, visibility, deterrence and reward as factors positively influencing employees compliance with security policies. Some user behaviors that influence effectiveness of information system security in organizations include intentional destruction, detrimental misuse, dangerous tinkering and naïve mistakes (Stanton et al. 2005). A number of research studies have further examined motivators that influence employee intension to comply with workplace security policies. Herath and Rao (2009) conducted an empirical study of employees from 77 organizations and concluded that severity of penalty, certainty of detection, normative belief, peer behavior and perceived effectives of the policies are the motivating factors that encourage employee intention to comply with organizational ISP. Trust has also been used as theoretical framework in some studies to evaluate security behavior. In the organizational context, employees compliance with ISP is based on trust which is achieved through cooperation between management and employees (Furnell and Rajendran 2012). Therefore, this study specifically leverages trust development concepts to model a process of gaining individual trust and positive attitude towards security policy compliance. To do this end, this study extends research from extant literature on security compliance in information systems to adopt the concept of Confidence- Building Measures (CBM) from international relations to study user compliance with ISP. CBM have been used in many circumstances such as in the India-Pakistan conflict, Middle East peace process and Egyptian-Israeli peace treaty to build trust and ensure compliance by parties to the agreed security policies (Ahmed 1998). Despite the importance of CBM in international relations literature, very little research in information system security has explored this mechanism to understand user security compliance behaviors. Some instances where CBM has been used in the information system arena is in the discussion on cooperation between nations in achieving secure national cyberspace (Stauffacher and Kavanagh 2013; Pernik 2014). This study focuses on end-users within the organization where little CBM has been applied. Model Development - Confidence Building Measures (CBM) Confidence-Building Measures (CBM) is an assortment of activities that states engage in to become more sure that each understands the true actions and/or intentions of the other (Chevrier 1998, pg. 1). The primary goal of CMB as originally introduced in the 1970s is to reduce the risk of armed conflicts by building trust and reducing misperceptions and miscalculations of activities. CBM influences the perceptions of one party about the intension of the other party and not its capabilities. CBM has been extensively used in international relations and conflict mediation and it can usefully be applied in other spheres where trust is essential in building or repairing some relationship problems. Confidence is the belief that future outcomes will fall in line with expectations because one places the responsibility (trust) on the entity taking the action. Participants in an agreement who effectively build goodwill at the start of a

3 process will be more willing to see the process through completion because of culture of compliance to agreed principles. Participating States in the Helsinki 1975 Conference on Security and Co-Operation in Europe on confidence-building measures to promote security, justice, peace and cooperation adopted the following: prior notification of major military maneuvers, prior notification of other military maneuvers, and prior notification of major military movements and exchange of observers (Hänggi 2002) as important factors needed to build confidence and achieve a secured Europe. In the organizational setting these could easily translate to transparency, cooperative and stability measures which help maintain an open and secured working environment (Stauffacher and Kavanagh 2013). CMB involves three main actors; designers of the policies, deciders of the policies and all those affected by the policies. Similarly, in the information security setting we have the ISP developers, managers as deciders of the policies and all employees connected in any way to the information system infrastructure. CBM aims to improve relations, signal positive intension and commitment by helping build working trust (Mason and Siegfried 2013). CBM are low risk or low cost mechanism for building confidence and achieving compliance with agreed policies. The objectives of most CBMs are to reduce the causes for mistrust, fear, tensions and hostilities (Pfeiffer 1982). This can help party s gain reliable reciprocity in gestures or actions which maintained a secured environment. These measures help in the exchange of communication and information which aids in validating actions taken my parties. This could result in increased trust in policies. In a seminar organized by ASEAN Regional Forum in September 2012 on Confidence Building Measures in Cyberspace, it was recognized that information security can be addressed through three fronts; capacity building (technical), norm building (personality traits) and confidence building (compliance) 1. Some of the CBMs discussed included exchange of information and terminologies, joint exercises and developing agreements. Whether ISPs are binding or non-binding, deliberated attempts must be made to build confidence in them since sheer compliance by association is difficult to achieve. The use to CMB to build confidence in ISP is therefore not out of place. The goal of any ISP is to provide protection against careless system use with unintended consequences, preventing malicious outsiders and insiders from abusing the organizational information system infrastructure and adhering to regularity requirements (Bowen et al. 2006, page 2). This calls for active cooperation between security managers and employees to build a safe security culture. Prior Notification of Information Systems Security Initiative Prior notification is the disclosure of details of any planned activity that can clarify party s intensions and capabilities before the activity is carried out. CBM as gestures of goodwill can be used to signal intent and gain trust from other party (Landau and Landau 1997). Defects in software used in an organization might require end-user action to implement a patch. Some systems in the network can go for long periods of time without being patched. This exposes the whole network to potential attack. Defensive information security which focuses on reactive measures such as patching software and fixing system vulnerabilities might require the active participation of end users. Although an organization s ISP might require endusers to actively take part in the patching process, end-users may fail to do so because they have not received any information regarding the act and intension of the process that they are involved in. Therefore, a full disclosure of the when and why a certain defensive security measure is put in place prior to its actual execution can win the active cooperation of end-users to ensure it is successfully implementation. Thus, Proposition 1: Prior notification of information systems security initiative(s) has a positive effect on user trust in actions required of them in organizational ISP. Disclosure of Non-compliant Behavior A common approach in CBM is symmetrical information exchange which gives parties the assurance that their gestures will be reciprocated resulting in more emboldened significant actions to comply with policies (Landau and Landau 1997). Successful implementation of an organization s ISP require open communication between the implementing unit and beneficiary unit as measures implemented in secrecy might be misconstrued as violation of a user security and privacy rights. Disclosure of observed noncomplaint behavior raises the level of awareness and increases trust in the sincerity of management to 1 :

4 maintain a secured organizational information system. For example the sharing of information about phishing attacks in the organization, provides employees the awareness they need to avoid going against company policy that prohibits employees from opening suspicious attachments. Hence, Proposition 2: Disclosure of information system security non-complaint behavior(s) has a positive effect on user trust in actions required of them in organizational ISP. Promotion of Security Compliant Behavior It goes without saying that one good deed begets another. Reciprocity is when actions or measures taken my one party lead to a similar and equal action taken by the other party (Pernik 2014). A promise to conduct an action does not necessarily build trust. Positive experiences from actual actions that have been subjected to assessment are essential in building confidence (Pfeiffer 1982). Trust promotes cooperative behavior while suspicion gives rise to competitive behavior. Employees who have experienced cooperative behavior from their peers and management are more likely to respond cooperatively when they have the power to determine an outcome. Cooperative response is an example of reciprocity. Increased transparency in the development and implementation of security policies increases participants honesty and reliability on such measures. Active promotion of security knowledge and encouragement of breach reportage are examples of behaviors that elicit reciprocity in organizations. When management actively promote security knowledge by introducing employees to the latest security measures and shares with employees organizational or industry information about security breaches, employees will most likely reciprocate by sharing any detected breach or suspicious behavior within the organization which are likely to compromise the security of the information infrastructure. Proposition 3: Active promotion of compliant security behavior has a positive effect on user trust in actions required of them in organizational ISP. Trust and Compliance ISP compliance refers to users behaving in manner consistent with provisions of the security policy so as to achieve a secured information infrastructure (Padayachee 2012). A complaint behavior on the part of employees will become a habit if the employees trust in the ability of their actions to achieve the desired goals in a security policy. Despite varied definitions of trust in literature, this study adopts Jјsang and Presti (2004) definition; Trust is the extent to which a given party is willing to depend on something or somebody in a given situation with a feeling of relative security, even though negative consequences are possible pg 1. The existence of trust in a social setting has been acknowledged to be vital for cooperative behavior. Lack of trust in a system or management increases the risk exposure of such systems as they can be subject to abuse. Trust influences actions, responses, increases affinity and loyalty to organization and stabilizes organizational culture (Colwill 2009) which goes a long way to create high security alertness on the part of employees. Increase in trust will strengthen one s belief in the actions required to achieve an intended goal. This consequently builds an end-user s confidence in a system which might result in complaint behavior. Thus, Proposition 4: User trust in organization ISP has a positive effect on user compliance with organization ISP.

5 Disclosure of Noncompliance IS Security Behavior Prior Notification of IS Security Initiative User Trust in ISP Promotion of Compliance IS Security Behavior User Compliance with ISP Figure 1. Research Model Future Research and Concluding Comments Despite the adaption of the concepts of prior notification of information system security initiatives, disclosure of non-compliant behavior and promotion of compliant behavior from CBM as mechanisms for building user trust and subsequent compliance with organization ISP, further empirical testing of the propositions advanced in this study is needed. An empirical examination of the above model will test the utility of CMB as a mechanism for achieving employee compliance with ISP. The above propositions will be tested in a future study through a laboratory experimental methodology since the construct of interest is end-user compliance and not their intension to comply. The experiment will be executed with students in a laboratory with a simulated organization environment where end-users will be brief on a security policy and the construct of interest will be manipulated while compliant behavior of subjects will be monitored and measured. There are limitations to this study as confidence is not the only means of gaining trust. It will therefore be appropriate to investigate other antecedents of trust such as ability, benevolence and integrity (Söllner and Leimeister 2013) alongside constructs from CMB to understand how they influence compliance with ISP. Some theoretical contribution of this research is the introduction of the concept of CMB into information system security policy compliance domain. This provides insight into how security manager can facilitate the achievement of a relatively secured information system infrastructure. REFERENCES Ahmed, M Confidence-building measures between Pakistan and India: An argument for change. Contemporary South Asia, 7(2), Bowen, P., Hash, J. and Wilson, M SP Information Security Handbook: A Guide for Managers. Chevrier, M. I Doubts about confidence: the potential and limits of confidence-building measures for the Biological Weapons Convention, Biological Weapons Proliferation: Reasons for Concern, Courses of Action, Stimson Center Report (24), pp Colwill, C Human factors in information security: The insider threat Who can you trust these days?, Information Security Technical Report (14:4), pp (doi: /j.istr ). Europe, C.-O. I Conference on Security and Co-Operation in Europe Final Act. Journal of Communication, 135. Furnell, S., and Rajendran, A Understanding the influences on information security behaviour, Computer Fraud & Security (2012:3), pp

6 Hänggi, H Good governance of the security sector: its relevance for confidence building, Practical Confidence-Building Measures: Does Good Governance of the Security Sector Matter, pp Herath, T., and Rao, H. R Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness, Decision Support Systems (47:2), pp (doi: /j.dss ). Jјsang, A., and Presti, S. L. (n.d.). Analysing the Relationship between Risk and Trust,. Landau, D., and Landau, S Confidence-building measures in mediation, Mediation Quarterly (15:2), pp Mason, S. J., and Siegfried, M. (n.d.). Confidence Building Measures (CBMs) in Peace Processes, Geneva: Humanitarian Dialogue Centre (available at 06de4-891e-4acb-b58fa8b /en/_AU+Handbook_Confidence+Building+Measures+in+Peace+Processes.pdf). Padayachee, K Taxonomy of compliant information security behavior, Computers & Security (31:5), pp (doi: /j.cose ). Pernik, P. (2014). Advancing Confidence Building in Cyberspace: Sub-Regional Groups To Lead The Way. International Centre for Defence Studies ISSN Pfeiffer, G. (1982) "Comprehensive Study on Confidence-building Measures". UN Report Siponen, M., Pahnila, S., and Mahmood, M. A Compliance with information security policies: An empirical investigation, Computer (43:2), pp Söllner, M., and Leimeister, J. M What We Really Know About Antecedents of Trust: A Critical Review of the Empirical Information Systems Literature on Trust, (available at Sommestad, T., Hallberg, J., Lundholm, K., and Bengtsson, J Variables influencing information security policy compliance: A systematic review of quantitative studies, Information Management & Computer Security (22:1), pp (doi: /IMCS ). Son, J.-Y Out of fear or desire? Toward a better understanding of employees motivation to follow IS security policies, Information & Management (48:7), pp (doi: /j.im ). Stanton, J. M., Stam, K. R., Mastrangelo, P., and Jolton, J Analysis of end user security behaviors, Computers & Security (24:2), pp (doi: /j.cose ). Stauffacher, D. & Kavanagh, C Confidence Building Measures and International Cybersecurity ICT4Peace Publishing, Geneva. capacity/system/files/ict4peace%20- %20International%20Dialogue%20on%20CBMs%20and%20International%20Cyber%20Security.pdf

A Theory of Employee Compliance with Information Security

A Theory of Employee Compliance with Information Security Association for Information Systems AIS Electronic Library (AISeL) MWAIS 2014 Proceedings Midwest (MWAIS) 5-15-2014 A Theory of Employee Compliance with Information Security David Sikolia dsikoli@ilstu.edu,

More information

MALICIOUS INSIDER THREATS AND CONDUCT RISK

MALICIOUS INSIDER THREATS AND CONDUCT RISK MALICIOUS INSIDER THREATS AND CONDUCT RISK Annie Searle University of Washington The Information School Puget Sound ISACA September 19, 2017 Annie s Background 15 years as co-founder and CEO of Delphi

More information

Information Security Policies Compliance: The Role of

Information Security Policies Compliance: The Role of Information Security Policies Compliance: The Role of Organizational Punishment Mohammad I. Merhi Department of Computer Information Systems & Quantitative Methods College of Business Administration University

More information

Better Security More Often. How to Keep Sacramento County Information Systems and Data Secure While Achieving Your Department Mission

Better Security More Often. How to Keep Sacramento County Information Systems and Data Secure While Achieving Your Department Mission How to Keep Sacramento County Information Systems and Data Secure While Achieving Your Department Mission 1 Table of contents Privacy and Security Matter: You Decide How Much A Look Inside Sacramento County

More information

CAFOD CODE OF BEHAVIOUR

CAFOD CODE OF BEHAVIOUR CAFOD CODE OF BEHAVIOUR PRINCIPLES In line with the Vision, Mission and Values, CAFOD expects all staff, volunteers, partners and consultants to conduct themselves in a manner that preserves the dignity,

More information

Impact of Protection Motivation and Deterrence on IS Security Policy Compliance: A Multi- Cultural View

Impact of Protection Motivation and Deterrence on IS Security Policy Compliance: A Multi- Cultural View Association for Information Systems AIS Electronic Library (AISeL) WISP 2012 Proceedings Pre-ICIS Workshop on Information Security and Privacy (SIGSEC) Winter 12-15-2012 Impact of Protection Motivation

More information

Mayer et al. (Academy of Management Review, July 1995).

Mayer et al. (Academy of Management Review, July 1995). Mayer et al. (Academy of Management Review, July 1995). Trust is the willingness of a party to be vulnerable to the actions of another party based on the expectation that the other will perform a particular

More information

STATEMENT ON RISK MANAGEMENT AND INTERNAL CONTROL

STATEMENT ON RISK MANAGEMENT AND INTERNAL CONTROL Governance Digi.Com Berhad Annual Report 2017 73 STATEMENT ON RISK MANAGEMENT AND INTERNAL CONTROL IN ACCORDANCE WITH PARAGRAPH 15.26 (b) OF THE MAIN MARKET LISTING REQUIREMENTS OF BURSA MALAYSIA SECURITIES

More information

THICAL PRINCIPLES OF THE MAERO GROUP. The value of people

THICAL PRINCIPLES OF THE MAERO GROUP. The value of people THICAL PRINCIPLES OF THE MAERO GROUP The value of people TABLE OF CONTENTS MESSAGE FROM THE MANAGEMENT 2 OBJECTIVE AND SCOPE OF APPLICATION 3 HUMAN CAPITAL 4 OUR ORGANISATION 6 PRINCIPALS OF ACTION 7 COMPLIANCE,

More information

Navigating Gray Zone Challenges in and through Cyberspace

Navigating Gray Zone Challenges in and through Cyberspace Navigating Gray Zone Challenges in and through Cyberspace COL Gary Corn Overall Classification: Unclassified 1 Agenda Navigating Gray Zone Challenges Domestic Law Considerations Fundamental rights and

More information

Annex I Political Principles of the Government of the Federal Republic of Germany for the Export of War Weapons and Other Military Equipment (2000)

Annex I Political Principles of the Government of the Federal Republic of Germany for the Export of War Weapons and Other Military Equipment (2000) Annex I Political Principles of the Government of the Federal Republic of Germany for the Export of War Weapons and Other Military Equipment (2000) The Government of the Federal Republic of Germany, desiring

More information

The study of organisational culture Hofstede: Hofstede developed 5 dimensions of culture operating within organisational culture:

The study of organisational culture Hofstede: Hofstede developed 5 dimensions of culture operating within organisational culture: Informal Organisation: perceptions of the organisation -The unofficial and less visible part of the organisation -What the workers really think about the organisation? -What is portrayed to the public

More information

BUSINESS ETHICS AND CODE OF CONDUCT

BUSINESS ETHICS AND CODE OF CONDUCT BUSINESS ETHICS AND CODE OF CONDUCT The Countryside Group of Companies (the Group) is committed to the highest standards of business ethics and professional conduct. Maintaining a culture of honesty, trust

More information

CODE OF CONDUCT, ETHICS & SOCIAL RESPONSABILITY. syone

CODE OF CONDUCT, ETHICS & SOCIAL RESPONSABILITY. syone CODE OF CONDUCT, ETHICS & SOCIAL RESPONSABILITY syone INTRODUCTION Our values reflect the ethical conduct by which we are guided, make decisions and act. Syone believes that honesty, integrity and trust

More information

Knowledge of Security Protocols and Acceptance of E-commerce

Knowledge of Security Protocols and Acceptance of E-commerce Knowledge of Security Protocols and Acceptance of E-commerce Sumendra Singh, Faculty of Business and IT, Webster University, Thailand. E-mail: singh89sumendra@gmail.com Leslie Klieb, Faculty of Business

More information

NACCHO GOVERNANCE CODE: NATIONAL PRINCIPLES AND GUIDELINES FOR GOOD GOVERNANCE

NACCHO GOVERNANCE CODE: NATIONAL PRINCIPLES AND GUIDELINES FOR GOOD GOVERNANCE NACCHO GOVERNANCE CODE: NATIONAL PRINCIPLES AND GUIDELINES FOR GOOD GOVERNANCE Introduction In this code: board means the governing body of the organisation objectives includes aims, purposes and objects

More information

Supplier Code of Conduct. December 2017

Supplier Code of Conduct. December 2017 Supplier Code of Conduct December 2017 The QinetiQ Group We believe that following our key principles of integrity, collaboration, and performance enables us to deliver excellence to our customers, and

More information

Code of Business Conduct & Ethics

Code of Business Conduct & Ethics For internal use only Code of Business Conduct & Ethics Date Author Senior Management Policy Owner Human Resources Policy Sponsor Chief Executive Officer Issuing Department Human Resources Initially Approved

More information

Computershare Group Code of

Computershare Group Code of Computershare Group Code of Conduct A Message from the President & CEO Underpinning everything we do as a business are our three core values: Certainty: to deliver our services and solutions right first

More information

Fenix s fundamental ethical principal Act in accordance with laws and regulations Respect others Behave honestly and promote a culture of integrity

Fenix s fundamental ethical principal Act in accordance with laws and regulations Respect others Behave honestly and promote a culture of integrity Ethics charter 2 INTRODUCTION LYNDSAY HOLLEY HANDLER, CEO A SUSTAINABLE COMPANY IS AN ETHICAL COMPANY Fenix International is a next-generation energy company. Our mission is to transform our customers

More information

Toward Developing a Theory of End User Information Security Competence

Toward Developing a Theory of End User Information Security Competence Toward Developing a Theory of End User Information Security Competence Canchu Lin University of Toledo Canchu.lin@rockets.toledo.edu Anand S. Kunnathur University of Toledo anand.kunnathur@utoledo.edu

More information

Towards a Theory of Trusted Performance in Software Development Projects

Towards a Theory of Trusted Performance in Software Development Projects Communications of the IIMA Volume 12 Issue 1 Article 3 2012 Towards a Theory of Trusted Performance in Software Development Projects Jim Jenkins Seattle Pacific University Gerhard Steinke Seattle Pacific

More information

Proposition 69 Building Trust in the Workplace

Proposition 69 Building Trust in the Workplace Proposition 69 Building Trust in the Workplace In a Word Workplace dynamics make a significant difference to people and the organizations they sustain. High-performance organizations earn, develop, and

More information

CHAPTER 6 GOVERNMENT ACCOUNTABILITY

CHAPTER 6 GOVERNMENT ACCOUNTABILITY Kern County Administrative Policy and Procedures Manual CHAPTER 6 GOVERNMENT ACCOUNTABILITY Section Page 601. General Statement... 1 602. Definitions... 1 603. Fraud, Waste, and Abuse... 1 604. Fraud Protocol...

More information

Doing the right thing the PwC way

Doing the right thing the PwC way www.pwc.com/ethics Doing the right thing the PwC way Code of conduct Acting professionally. Doing business with integrity. Upholding our clients reputations as well as our own. Treating people and the

More information

Results Integrity Management Survey

Results Integrity Management Survey Week of Integrity 2018 Results Integrity Management Survey 1 9 December 2018 Level of awareness and effective mitigation of integrity and integrity risk Week of Integrity In the Week of Integrity a large

More information

ETHICS: ORGANISATIONAL CULTURE OR LEADERSHIP

ETHICS: ORGANISATIONAL CULTURE OR LEADERSHIP ACADEMIA DE STUDII ECONOMICE BUCUREŞTI Sesiunea Internaţională de Comunicări Ştiinţifice Youth on the move. Teaching languages for international study and career-building Bucureşti, 13-14 mai 2011 ETHICS:

More information

9-1. Managing Leadership. Essentials of Contemporary Management, 3Ce. Copyright 2010 The McGraw-Hill Companies, Inc. All rights reserved

9-1. Managing Leadership. Essentials of Contemporary Management, 3Ce. Copyright 2010 The McGraw-Hill Companies, Inc. All rights reserved 9 9-1 Managing Leadership Learning Objectives 9-2 1. Describe what leadership is and on what bases of power leaders influence others. 2. Describe the early trait and behavioural theories of leadership

More information

Information Security Policy Compliance: A User Acceptance Perspective

Information Security Policy Compliance: A User Acceptance Perspective Association for Information Systems AIS Electronic Library (AISeL) MWAIS 2011 Proceedings Midwest (MWAIS) 5-20-2011 Information Security Policy Compliance: A User Acceptance Perspective Ahmad Al-Omari,

More information

Government Auditing Standards

Government Auditing Standards United States Government Accountability Office GAO By the Comptroller General of the United States August 2011 Government Auditing Standards 2011 Internet Version CONTENTS CHAPTER 1... 1 GOVERNMENT AUDITING:

More information

CORPORATE GOVERNANCE THEORY, SCOPE AND IMPORTANCE

CORPORATE GOVERNANCE THEORY, SCOPE AND IMPORTANCE CORPORATE GOVERNANCE THEORY, SCOPE AND IMPORTANCE What is on the agenda Corporate Governance: In Theory Brief history The concept Principles Corporate Governance: In Practice Corporate governance elements

More information

A Model of Team Development

A Model of Team Development A Model of Team Development Stage 1: Forming Stage 2: Storming Stage 3: Norming Stage 4: Performing Frequently an iterative process, phases often overlap Stage 1: Forming Team members begin to discover

More information

Policy on Financial Accountability & Control

Policy on Financial Accountability & Control Responsible Official (Title): Responsible Office: Responsible Division: Chief Financial Officer Chief Financial Officer Financial Services Policy on Financial Accountability & Control 1. Policy Statement

More information

GOVERNMENT OF INDIA OFFICE OF THE DIRECTOR GENERAL OF CIVIL AVIATION TECHNICAL CENTRE, OPPOSITE SAFDARJUNG AIRPORT, NEW DELHI

GOVERNMENT OF INDIA OFFICE OF THE DIRECTOR GENERAL OF CIVIL AVIATION TECHNICAL CENTRE, OPPOSITE SAFDARJUNG AIRPORT, NEW DELHI GOVERNMENT OF INDIA OFFICE OF THE DIRECTOR GENERAL OF CIVIL AVIATION TECHNICAL CENTRE, OPPOSITE SAFDARJUNG AIRPORT, NEW DELHI 11 0 003 CIVIL AVIATION REQUIREMENTS SECTION 1 GENERAL SERIES 'C' PART I Issue

More information

ENABLING THE BUSINESS WITH SOCIAL RELATIONSHIP PLATFORMS

ENABLING THE BUSINESS WITH SOCIAL RELATIONSHIP PLATFORMS W H I T E PA P E R ENABLING THE BUSINESS WITH SOCIAL RELATIONSHIP PLATFORMS AN EASY WIN FOR STRATEGIC CIOs THE ROLE OF THE IT LEADER IS CHANGING. CIOs must shift their focus from keeping the lights on

More information

Resolution 67/49. Information on confidence-building measures in the field of conventional arms. Kingdom of the Netherlands

Resolution 67/49. Information on confidence-building measures in the field of conventional arms. Kingdom of the Netherlands Resolution 67/49 Information on confidence-building measures in the field of conventional arms Introduction Kingdom of the Netherlands 2012 The Netherlands attaches great value to disarmament and arms

More information

These guidelines are general provisions which apply to all Fishbones employees.

These guidelines are general provisions which apply to all Fishbones employees. 1. Purpose Page 1 of 6 These guidelines are general provisions which apply to all Fishbones employees. Our business must meet the same ethical standards wherever in the world we operate. Employees must

More information

Public Procurement Reforms to enhance value for money

Public Procurement Reforms to enhance value for money Public Procurement Reforms to enhance value for money 1. It is my pleasure to be here in the inaugural function of the Seminar on Public Procurement Reforms to enhance value for money being organized by

More information

Blowing the Whistle on Workplace Misconduct

Blowing the Whistle on Workplace Misconduct Blowing the Whistle on Workplace Misconduct December 2010 Founded in 1922, the Ethics Resource Center (ERC) is America s oldest nonprofit organization devoted to the advancement of high ethical standards

More information

IT Security Policies and Employee Compliance: The Effects of Organizational Environment

IT Security Policies and Employee Compliance: The Effects of Organizational Environment IT Security Policies and Employee Compliance: The Effects of Organizational Environment Kendal Stephens LaFleur, Narasimha Shashidhar Department of Computer Science Sam Houston State University Huntsville,

More information

Motivating Employees to Comply with Information Security Policies

Motivating Employees to Comply with Information Security Policies Association for Information Systems AIS Electronic Library (AISeL) MWAIS 2016 Proceedings Midwest (MWAIS) Spring 5-19-2016 Motivating Employees to Comply with Information Security Policies David Sikolia

More information

NOGDAWINDAMIN FAMILY AND COMMUNITY SERVICES

NOGDAWINDAMIN FAMILY AND COMMUNITY SERVICES This dictionary describes the following six functional competencies and four enabling competencies that support the differentiated territory for professional accountants in strategic management accounting:

More information

ETHICAL CODE OF CONDUCT

ETHICAL CODE OF CONDUCT S E C U R I N G T H E F U T U R E ETHICAL CODE OF CONDUCT 1 TABLE OF CONTENT 1. THE ETHICAL CODE OF CONDUCT 4 1.1 Purpose 4 1.2 Commitment 5 1.3 Presentation of the Code of Conduct 5 2. GENERAL PRINCIPLES

More information

THE CORPORATION OF THE TOWNSHIP OF O'CONNOR

THE CORPORATION OF THE TOWNSHIP OF O'CONNOR THE CORPORATION OF THE TOWNSHIP OF O'CONNOR POLICY FOR PROGRESSIVE DISCIPLINE PURPOSE: POLICY STATEMENT: To establish a consistent method of disciplining all Municipal employees and to ensure work duties

More information

Dawning of a new era of empowerment a key success factor of service quality in banking in

Dawning of a new era of empowerment a key success factor of service quality in banking in Dawning of a new era of empowerment a key success factor of service quality in banking in Sri Lanka Abstract E.P.A. Sisira Kumara Senior Dealer (Money Market), People s Bank To survive in the increasingly

More information

10 ways to raise your users cybersecurity IQ. By Alison DeNisco Rayome COPYRIGHT 2018 CBS INTERACTIVE INC. ALL RIGHTS RESERVED.

10 ways to raise your users cybersecurity IQ. By Alison DeNisco Rayome COPYRIGHT 2018 CBS INTERACTIVE INC. ALL RIGHTS RESERVED. 10 ways to raise your users cybersecurity IQ By Alison DeNisco Rayome INTRODUCTION Employees are a company s greatest asset, but also its greatest security risk. If we look at security breaches over the

More information

Wilo Group Code of Conduct. "Responsible Behaviour

Wilo Group Code of Conduct. Responsible Behaviour Wilo Group Code of Conduct "Responsible Behaviour January 2011 CONTENT FOREWORD 2 SCOPE 3 WILO PRINCIPLES 4 BASIC SOCIAL PRINCIPLES 4 COMPLIANCE OF LAWS 4 CONFLICTS OF INTEREST 4 ENVIRONMENTAL PROTECTION

More information

Atria Code of Conduct. HANdpRINT of RESpoNSIbLE ATRIA

Atria Code of Conduct. HANdpRINT of RESpoNSIbLE ATRIA Atria Code of Conduct HANdpRINT of RESpoNSIbLE ATRIA Dear Partners, You are holding Atria s code of practice, which is entitled Atria s Way of Action. It is intended for all Atria employees and partners

More information

PaCCS POLICY BRIEFING. The governance of unmanned aerial vehicles in defence and security

PaCCS POLICY BRIEFING. The governance of unmanned aerial vehicles in defence and security PaCCS POLICY BRIEFING The governance of unmanned aerial vehicles in defence and security 1 Foreword In March 2016, we convened a group of academics, Government policy-makers, technologists, engineers,

More information

SUMMARY BY THE SECRETARIAT OF THE INTERNET & JURISDICTION POLICY NETWORK AND OTTAWA ROADMAP

SUMMARY BY THE SECRETARIAT OF THE INTERNET & JURISDICTION POLICY NETWORK AND OTTAWA ROADMAP SUMMARY BY THE SECRETARIAT OF THE INTERNET & JURISDICTION POLICY NETWORK AND OTTAWA ROADMAP www.internetjurisdiction.net TOWARDS POLICY COHERENCE AND JOINT ACTION Secretariat Summary and Ottawa Roadmap

More information

Why Hiring the Right CISO is so Hard And What You Can Do About It

Why Hiring the Right CISO is so Hard And What You Can Do About It Why Hiring the Right CISO is so Hard And What You Can Do About It AUTHORS: ERIK MATSON Managing Director, Global Head of Insurance & Cybersercurity JOHN BUDRISS Executive Director, Technology, Data Science

More information

Policy and Procedures Date: November 5, 2017

Policy and Procedures Date: November 5, 2017 Virginia Polytechnic Institute and State University No. 3350 Rev.: 8 Policy and Procedures Date: November 5, 2017 Subject: Charter for the Office of Audit, Risk, and Compliance 1. Purpose... 1 2. Policy...

More information

//DATA INNOVATION FOR DEVELOPMENT GUIDE DATA INNOVATION RISK ASSESSMENT TOOL

//DATA INNOVATION FOR DEVELOPMENT GUIDE DATA INNOVATION RISK ASSESSMENT TOOL CHECKLIST Rationale for the checklist: Large-scale social or behavioural data may not always contain directly identifiable personal data and/or may be derived from public sources. Nevertheless, its use

More information

Acceleron Pharma Inc. Code of Business Conduct and Ethics

Acceleron Pharma Inc. Code of Business Conduct and Ethics I. INTRODUCTION Acceleron Pharma Inc. Code of Business Conduct and Ethics (Amended & Restated as of March 1, 2018) This Code of Business Conduct and Ethics ( Code ) provides a general statement of the

More information

Human Resources Security Management towards ISO/IEC 27001:2005 accreditation of an Information Security Management System

Human Resources Security Management towards ISO/IEC 27001:2005 accreditation of an Information Security Management System Human Resources Security Management towards ISO/IEC 27001:2005 accreditation of an Information Security Management System Professor PhD. Constantin MILITARU Polytechnic University of Bucharest, Romania

More information

Fact Sheet Conflict Sensitivity

Fact Sheet Conflict Sensitivity Kompetenzzentrum Friedensförderung Centre pour la promotion de la paix Centro per la promozione della pace Center for Peacebuilding K O F F Fact Sheet Conflict Sensitivity 1. Definitions and what is Conflict

More information

Core Humanitarian Standard

Core Humanitarian Standard Core Humanitarian Standard on Quality and Accountability Version 3 - Final Draft 01.10.2014 www.corehumanitarianstandard.org 1 Table of Contents i.introduction... 3 ii. Structure of the Standard... 4 iii.

More information

LIBERTY HOLDINGS LIMITED CODE OF ETHICS

LIBERTY HOLDINGS LIMITED CODE OF ETHICS LIBERTY HOLDINGS LIMITED CODE OF ETHICS 2 Our Liberty Holdings Limited and all its group and associate companies and subsidiaries (the company) are committed to maintaining the highest standards of ethical

More information

A SUSTAINABLE COMPANY IS AN ETHICAL COMPANY

A SUSTAINABLE COMPANY IS AN ETHICAL COMPANY Ethics charter 2 INTRODUCTION ISABELLE KOCHER, CEO A SUSTAINABLE COMPANY IS AN ETHICAL COMPANY ENGIE is a global benchmark player in the energy sector. Responsible growth is central to the Group s areas

More information

GLOBAL SUMMIT ON CHEMICAL SAFETY AND SECURITY KIELCE, POLAND, APRIL SUMMIT DECLARATION

GLOBAL SUMMIT ON CHEMICAL SAFETY AND SECURITY KIELCE, POLAND, APRIL SUMMIT DECLARATION GLOBAL SUMMIT ON CHEMICAL SAFETY AND SECURITY KIELCE, POLAND, 18-20 APRIL 2016 www.chemss2016.org SUMMIT DECLARATION On the development of international cooperation to enhance chemical safety and security

More information

WINNING BACK TRUST IN E-BUSINESS

WINNING BACK TRUST IN E-BUSINESS WINNING BACK TRUST IN E-BUSINESS Anil Singh University of Texas at Brownsville anil.singh@utb.edu Ph: 956-882-5831 Aakash Taneja Richard Stockton College of New Jersey aakash.taneja@stockton.edu Ph: 609-652-4948

More information

Ethics charter ENGIE_Ethics-Charter_EN_BEE.indd 1 15/02/ :55:46

Ethics charter ENGIE_Ethics-Charter_EN_BEE.indd 1 15/02/ :55:46 Ethics charter ENGIE_Ethics-Charter_EN_BEE.indd 1 15/02/2017 15:55:46 2 INTRODUCTION ISABELLE KOCHER, CEO A SUSTAINABLE COMPANY IS AN ETHICAL COMPANY ENGIE is a global benchmark player in the energy sector.

More information

Vice-Chair s Summary. Universality

Vice-Chair s Summary. Universality Regional Workshop on Preparations for the Seventh Review Conference of the Biological Weapons Convention 30 June 1 July, 2011, the New World Hotel, Makati City, the Philippines Vice-Chair s Summary On

More information

Supplier Code of Conduct

Supplier Code of Conduct Samsung Telecommunications America, LLC Supplier Code of Conduct - Partners in Integrity STA Strategic SRM 10/1/2013 Rev. C Samsung Telecommunications America, LLC ( STA or Samsung Telecommunications America

More information

FIFTEEN MINUTES OF SHAME: A MULTILEVEL APPROACH OF THE ANTECEDENTS AND EFFECTS OF CORPORATE ACCOUNTING SCANDALS JESUS RODOLFO JIMENEZ-ANDRADE

FIFTEEN MINUTES OF SHAME: A MULTILEVEL APPROACH OF THE ANTECEDENTS AND EFFECTS OF CORPORATE ACCOUNTING SCANDALS JESUS RODOLFO JIMENEZ-ANDRADE FIFTEEN MINUTES OF SHAME: A MULTILEVEL APPROACH OF THE ANTECEDENTS AND EFFECTS OF CORPORATE ACCOUNTING SCANDALS by JESUS RODOLFO JIMENEZ-ANDRADE Executive summary corresponding to the full document submitted

More information

Motivation. Mark Meckler, University of Portland

Motivation. Mark Meckler, University of Portland Motivation i Motivation The amount of effort that an individual puts into doing something Content Theories Freud/Levinson: Unconscious Needs Maslow s Hierarchy of Needs ERG Theory Herzberg s Motivation-Hygiene

More information

UNIVERSITY OF NAIROBI THE ESSENCE OF INTEGRITY IN STAFF DISCIPLINARY PRACTICES. Offer of appointment, with effect from a specified date

UNIVERSITY OF NAIROBI THE ESSENCE OF INTEGRITY IN STAFF DISCIPLINARY PRACTICES. Offer of appointment, with effect from a specified date UNIVERSITY OF NAIROBI THE ESSENCE OF INTEGRITY IN STAFF DISCIPLINARY PRACTICES a) DISCIPLINE: A definition: The outward marks of respect for our covenants. The expectation leads to: A system of rules for

More information

SUPPLIER CODE OF CONDUCT

SUPPLIER CODE OF CONDUCT SUPPLIER CODE OF CONDUCT 14/05/18 HRE-PRC-POL-003 Issue 1.0 0 Contents Introduction 1 Contents 00 Introduction 1 01 Human Rights 2 Modern Slavery 1.1 Child and Forced Labour 3 1.2 Fair Pay and Benefits

More information

PRINCIPLES OF BANKING ETHICS (*)

PRINCIPLES OF BANKING ETHICS (*) 1 THE BANKS ASSOCIATION OF TURKEY PRINCIPLES OF BANKING ETHICS (*) I. Introduction: Ethics can be defined as a system of criteria and measures examining the values, norms and rules underlying the individual

More information

THE WBHO WAY.. Known collectively as the WBHO Way, these principles include:

THE WBHO WAY.. Known collectively as the WBHO Way, these principles include: CODE OF CONDUCT THE WBHO WAY.. If you are reading this, you are probably already part of the success that is WBHO. You will know that a big part of what makes our organisation special is that we have retained

More information

THE FIVE DYSFUNCTIONS OF A TEAM

THE FIVE DYSFUNCTIONS OF A TEAM Members of truly cohesive teams: 1. Trust one another. 2. Engage in unfiltered conflict around ideas. 3. Commit to decisions and plans of action. 4. Hold one another accountable for delivering against

More information

IMPARTIALITY. Impartiality and objectivity of auditors are basic prerequisites for an effective and consistent audit.

IMPARTIALITY. Impartiality and objectivity of auditors are basic prerequisites for an effective and consistent audit. International Organization for Standardization ISO 9001 Auditing Practices Group Guidance on: International Accreditation Forum 13 January 2016 IMPARTIALITY Impartiality and objectivity of auditors are

More information

Discussion of Technostress Impact on Employees Information Security Behaviour

Discussion of Technostress Impact on Employees Information Security Behaviour Discussion of Technostress Impact on Employees Information Security Behaviour Masterarbeit zur Erlangung des akademischen Grades Master of Science (M.Sc.) im Masterstudiengang Wirtschaftswissenschaft der

More information

SCDLMCE5 Develop operational plans and manage resources to meet current and future demands on the provision of care services

SCDLMCE5 Develop operational plans and manage resources to meet current and future demands on the provision of care services Develop operational plans and manage resources to meet current and future demands on the provision of care services Overview This standard identifies the requirements when developing operational plans

More information

Shared & Solved by SILENTLIPS FINALTERM EXAMINATION Fall 2009 MGT502- Organizational Behaviour (Session - 2) Time: 120 min Marks: 92

Shared & Solved by SILENTLIPS FINALTERM EXAMINATION Fall 2009 MGT502- Organizational Behaviour (Session - 2) Time: 120 min Marks: 92 Shared & Solved by SILENTLIPS FINALTERM EXAMINATION Fall 2009 MGT502- Organizational Behaviour (Session - 2) Time: 120 min Marks: 92 Question No: 1 ( Marks: 1 ) - Please choose one Which one of the following

More information

Sogefi Group Code of Ethics

Sogefi Group Code of Ethics June 13, 2016 1 Contents 1 INTRODUCTION... 3 2 MISSION AND ETHICAL VISION... 3 3 SCOPE OF APPLICATION... 3 4 REFERENCE PRINCIPLES AND PROVISIONS... 5 4.1 Fair business practices... 5 4.1.1 Compliance with

More information

Performance Leader Navigator Individual Feedback Report For: Chris Anderson

Performance Leader Navigator Individual Feedback Report For: Chris Anderson For: Chris Anderson Finding your way in today's world of work Copyright ã 2007, 2008 Wilson Learning Worldwide Inc. This report includes ratings from: Self 1 Manager 1 Direct Report 5 Peer 3 Customer 4

More information

MAVI S PEOPLE AND ITS PRINCIPLES

MAVI S PEOPLE AND ITS PRINCIPLES 1 MAVI S PEOPLE AND ITS PRINCIPLES Contents 1. OUR UNDERSTANDING OF ETHICS 2. OUR MISSION, VISION AND VALUES 3. WE COMPLY WITH THE RULES 4. WE ARE AWARE OF OUR RESPONSIBILITIES 5. WE SOLVE PROBLEMS 6.

More information

Individual Feedback Report for

Individual Feedback Report for Individual Feedback Report for Individual Name: John A. Smith Company Name: ABC Company Report Date: 23 Jan 2006 Harcourt Assessment, Inc San Antonio, TX 78259 Sample Report Page 1 Values Arrangement List

More information

Ready or Not: SMBs and the GDPR

Ready or Not: SMBs and the GDPR Ready or Not: SMBs and the GDPR Introduction The deadline for General Data Protection Regulation (GDPR) compliance draws closer for organisations across the world. With fewer than 12 months to ensure compliance

More information

Societal Impact & Sustainability Policy

Societal Impact & Sustainability Policy Societal Impact & Sustainability Policy October 2018 1. Purpose The Societal Impact & Sustainability Policy (the Policy) governs Danske Bank Group s approach to societal impact and sustainability, and

More information

International Ethics Standards Board for Accountants (IESBA) th Avenue, 6th Floor New York, New York 10017

International Ethics Standards Board for Accountants (IESBA) th Avenue, 6th Floor New York, New York 10017 Santa Cruz- Bolivia, April 15th, 2015 International Ethics Standards Board for Accountants (IESBA). 529 5th Avenue, 6th Floor New York, New York 10017 REF: Proposed Changes to Part C of the Code Addressing

More information

QUALITY GROUP QUALITY TECHNICAL SERVICES

QUALITY GROUP QUALITY TECHNICAL SERVICES Certification Body Requirements for the Woolworths Ethical Audit Program The objective of this document is to establish requirements for Approved Third Party Certification Bodies conducting Ethical Audits

More information

Responsible behaviour VALUES AND ETHICAL GUIDELINES FOR EMPLOYEES AT NHH NORWEGIAN SCHOOL OF ECONOMICS

Responsible behaviour VALUES AND ETHICAL GUIDELINES FOR EMPLOYEES AT NHH NORWEGIAN SCHOOL OF ECONOMICS Responsible behaviour VALUES AND ETHICAL GUIDELINES FOR EMPLOYEES AT NHH NORWEGIAN SCHOOL OF ECONOMICS Approved by NHH's board on 9 Dec 2015 CONTENTS 1. RESPONSIBLE BEHAVIOUR 1 2. VISION AND VALUES 1 3.

More information

The RUAG Code of Conduct

The RUAG Code of Conduct Visionary thinking Collaboration High performance The RUAG Code of Conduct Contents 4 Foreword 8 Our Values 9 Brand Promise 10 Integrity@RUAG 11 Guiding questions 12 Application 16 Zero tolerance for

More information

HCCA Professional Code of Ethics

HCCA Professional Code of Ethics HCCA Professional Code of Ethics DISPLAY DRAFT CODE OF ETHICS FOR HEALTH CARE COMPLIANCE PROFESSIONALS ADOPTED SEPTEMBER 15, 1999 PREAMBLE Health care compliance programs are ultimately judged by how they

More information

SCDLMCD3 Lead and manage inter-professional teams

SCDLMCD3 Lead and manage inter-professional teams Overview This standard identifies the requirements associated with leading and managing inter-professional teams. It includes establishing governance arrangements and protocols that provide clarity about

More information

NOVEMBER 2015 IFBEC MODEL SUPPLIER CODE OF CONDUCT

NOVEMBER 2015 IFBEC MODEL SUPPLIER CODE OF CONDUCT NOVEMBER 2015 IFBEC MODEL SUPPLIER CODE OF CONDUCT IFBEC MODEL SUPPLIER CODE OF CONDUCT The relationship between the members of IFBEC and their suppliers is an important component to building business

More information

Stakeholders. Principles of stakeholder involvement. Peter Rickwood - Media Outreach and Public Involvement

Stakeholders. Principles of stakeholder involvement. Peter Rickwood - Media Outreach and Public Involvement Stakeholders Principles of stakeholder involvement 1 Enhancing public confidence The OECD/NEA Forum on Stakeholder Confidence defines stakeholder involvement as: An integral part of a stepwise process

More information

MBS Code of Conduct. MBS places great importance on the values of ethical conduct, efficiency, fairness, impartiality and integrity.

MBS Code of Conduct. MBS places great importance on the values of ethical conduct, efficiency, fairness, impartiality and integrity. MBS Code of Conduct 1. Purpose MBS values diversity and is committed to achieving a workforce which is inclusive and respectful of each other s differences. We are expected to treat all people we deal

More information

GOODWILL INDUSTRIES OF COLORADO SPRINGS

GOODWILL INDUSTRIES OF COLORADO SPRINGS GOODWILL INDUSTRIES OF COLORADO SPRINGS CORPORATE COMPLIANCE PROGRAM ADOPTED : By the Board of Directors Date: October 25, 2005 Attachment 2 Memorandum 10-41 TABLE OF CONTENTS Corporate Compliance Program

More information

Notes: Below are informal notes taken by a JHU/APL staff member at the Seminar.

Notes: Below are informal notes taken by a JHU/APL staff member at the Seminar. Rethinking Future Elements of National and International Power Seminar Series 16 July 2008 Dr. James L. Narel Academic Director, Peace Operations Policy Program George Mason University Non-Governmental

More information

Standard on Quality Control (SQC-1) CA Gautam Shah Khimji Kunverji & Co

Standard on Quality Control (SQC-1) CA Gautam Shah Khimji Kunverji & Co Standard on Quality Control (SQC-1) CA Gautam Shah Khimji Kunverji & Co Agenda Setting the Context Elements of SQC SQC and SMP Challenges and Benefits Setting the Context Setting the Context COMPANY LAW

More information

Chapter 4: Theories of Motivation

Chapter 4: Theories of Motivation Chapter 4: Theories of Motivation Organizational Behaviour 5 th Canadian Edition Langton / Robbins / Judge Copyright 2010 Pearson Education Canada 4-1 Chapter Outline What Is Motivation? Needs Theories

More information

A FRAMEWORK FOR AUDIT QUALITY. KEY ELEMENTS THAT CREATE AN ENVIRONMENT FOR AUDIT QUALITY February 2014

A FRAMEWORK FOR AUDIT QUALITY. KEY ELEMENTS THAT CREATE AN ENVIRONMENT FOR AUDIT QUALITY February 2014 A FRAMEWORK FOR AUDIT QUALITY KEY ELEMENTS THAT CREATE AN ENVIRONMENT FOR AUDIT QUALITY February 2014 This document was developed and approved by the International Auditing and Assurance Standards Board

More information

WHISTLEBLOWING POLICY

WHISTLEBLOWING POLICY WHISTLEBLOWING POLICY Date of last review: April 2015 Review period: 2 years Date of next review: April 2017 Owner: COO Type of policy: Network LGB or Board approval: Board Policy Agreed by Ark Schools

More information

1.1 What is Ethics? Why is it important to apply this Code?.. 2

1.1 What is Ethics? Why is it important to apply this Code?.. 2 PPI CODE OF ETHICS CONTENT 1. Our Code of Ethics 2 1.1 What is Ethics? 2 1.2 Why is it important to apply this Code?.. 2 2. Ethic Principles.3 2.1 Respect.4 2.2 Equality and non-discrimination....4 2.3

More information

NATIONAL LEGISLATION ON TRANSFER OF ARMS, MILITARY EQUIPMENT AND DUAL-USE GOODS AND TECHNOLOGY

NATIONAL LEGISLATION ON TRANSFER OF ARMS, MILITARY EQUIPMENT AND DUAL-USE GOODS AND TECHNOLOGY NATIONAL LEGISLATION ON TRANSFER OF ARMS, MILITARY EQUIPMENT AND DUAL-USE GOODS AND TECHNOLOGY GERMAN REPLY TO THE REQUEST FOR A STATEMENT BY THE SECRETARY- GENERAL OF THE UNITED NATIONS With reference

More information

BUSINESS NEGOTIATIONS: COMMUNICATION IN THE BARGAINING PROCESS

BUSINESS NEGOTIATIONS: COMMUNICATION IN THE BARGAINING PROCESS Journal of Business Economics and Management ISSN 1611-1699 / eissn 2029-4433 2017 Volume 18(3): 554 559 doi:10.3846/16111699.2017.1333525 BUSINESS NEGOTIATIONS: COMMUNICATION IN THE BARGAINING PROCESS

More information

Service Quality Research/10 Deming s Fourteen Points and Service Quality Research - 2

Service Quality Research/10 Deming s Fourteen Points and Service Quality Research - 2 Publishing Date: September 1991. 1991. All rights reserved. Copyright rests with the author. No part of this article may be reproduced without written permission from the author. Service Quality Research/10

More information