Critique of the SPY Car Act of Obaid Farooqui

Size: px
Start display at page:

Download "Critique of the SPY Car Act of Obaid Farooqui"

Transcription

1 Critique of the SPY Car Act of 2015 Obaid Farooqui Introduction The Security and Privacy in Your Car Act (SPY Car) Act was proposed in 2015 by Senator Markey of Massachusetts and Senator Blumenthal of Connecticut, and is aimed at introducing standards for the automobile industry with regards to cyber security. First and foremost, it outlines that the National Highway Traffic Safety Administration (NHTSA) and the Federal Trade Commission (FTC) should formulate standards surrounding car safety. The Act targets not just the ability of hackers to gain control of vehicles but also calls for safeguards against data breaches. Second, it advocates for greater transparency between car manufacturers and consumers about what driving data is being collected, and allows for users to opt out without losing out on features (to the extent possible). Third, the Act calls for creating a cyber dashboard to be presented as a sticker on all new cars to help consumers understand the security measures implemented by the manufacturer. A Great Beginning The SPY Car Act is a fine start, and a much needed push for the automobile industry. Given the costs associated with developing ever- complicating security

2 features, the relatively low margins of the auto industry, the low volume of real world car hacks, and the resulting consumer complacency on the issue, there simply do not exist the market incentives for car companies to invest in the kinds of security features that modern car owners need. Thus, this first step to introduce government oversight incentivizes car manufacturers towards developing new models with cyber security and data privacy in mind. The Act has a number of high points. It sets lofty goals for protecting cars against hacks, including real- time detection and response mechanisms. It also sets the expectation of secure storage of data in all parts of the data pipeline, from onboard and off- board storage to the transmission in between. It also makes a bold move towards protecting consumer privacy interests, and prohibits manufacturers from strong- arming consumers into accepting data collection by withholding features from consumers; however, it also wisely recognizes that certain features may inherently require data collection, and cannot be offered if the user opts out, and makes an exception for such features. The idea of a dashboard that allows consumers to quickly understand what the different security features entail is a well- intentioned effort as well. It is in line with the larger push of the Act towards greater security coupled with greater consumer choice and understanding.

3 Points to Consider While it is a brilliant start and commendable that the Senate is starting to consider these issues as the security community is waking up to them, there are a number of finer points in the Act, many of whose details have yet to be decided on by the NHTSA and the FTC, which should be reconsidered. Cybersecurity Standards First, the notion of setting minimum standards is a sort of double- edged sword. The general goals that are outlined in the Act, especially in the first section on Cybersecurity Standards, hit the nail on the head quite well. However, the nature of the regulations that will come of it from the NHTSA and the FTC will have a great impact on the effectiveness of this Act. If the regulations are simply an enumeration of certain implementations or a battery of attacks that automakers must protect their cars from, then this Act poses the danger of making the automobile industry lazy in the face of new attacks, and lulling consumers into a false sense of security simply because the cars they purchase met the minimum standards months or years ago (which could very well have already become outdated at that time). In the case of automobile safety, we can say that we want cars to be able to withstand crashes of a certain force, and as long as the laws of Physics don t change, it stands to reason that a car that was up to

4 standard yesterday will be no less safe tomorrow. Cybersecurity is not like auto safety, however: we can say that we want data to be stored securely for instance, but a method of storage that is secure today may not be secure tomorrow for any number of reasons, say if an encryption algorithm is broken or a new vulnerability is found. Furthermore, the proposed regulations will take 18 months to formulate, and an additional 18 months to reach their final forms. While there s no good ways around this, and some may even argue that it s a relatively short amount of time given the massive number of attack vectors and the variety of car systems out there. But it serves the point made above that these regulations, then, cannot be a simple list of attacks they must present goals that are broad enough to be current, and specific enough to be meaningful. It s a fine line to walk, but one that the NHTSA and the FTC must consider very carefully. In addition, the regulations should include provisions to ensure that carmakers design systems that can be easily updated with retroactive security patches. The constantly changing nature of cyber threats and vulnerabilities necessitates that for a vehicle to remain secure, it should be easy for owners to have their cars updated at a later time when newer security features are introduced or previously unknown vulnerabilities come to light. Otherwise, a car that is secure at the time of manufacture may quickly become vulnerable after it leaves the lot.

5 Privacy Standards The second part of the Act that deals with privacy standards is a strong one, and sets a powerful precedent with regards to what consumers might be able to expect from companies. But a question that the automobile industry will no doubt and rightfully ask is why this special treatment of driving data? After all, just about every tech company from the multi- billion dollar giants to every Tom, Dick, and Harry that develops iphone apps out of their basement collects data. This can range from wristbands that collect health data to productivity apps that scan s to recommendation and navigation apps that track location data (which is essentially the same, if not more privacy- invading, then driving data). This begs the question: is this part of the Act just the first step in attempting to tame the Wild West that is user data collection? Can the rest of the tech industry expect similar regulations in the near future? It s important to keep in mind that data collection is the name of the game these days, and is an integral part of developing key new features and personalizing user experiences, and is a stepping- stone to making discoveries about aggregate usage that can in turn guide future products. For car companies specifically, collecting driving data has many benefits, not least of which is helping to design self- driving cars and introducing new and improved safety features. Pushing for complete openness with consumers might negatively impact the level of data collection that these companies can then conduct.

6 Nevertheless, this move to require car companies to be open about their data collections and usage policies is a laudable move, but perhaps it would be best to consider this as part of a separate bill that deals with user privacy issues, and not the SPY Car Act that focuses on vehicle security. Cyber Dashboard The last part of the Act that proposes the idea of the cyber dashboard is an interesting idea, but again, its efficacy will depend entirely on the details of its implementation. It's certainly well- intentioned to try and educate the populace about cyber- attacks, but the fact of the matter is that even many engineers within the tech industry don t have a solid grasp on what different cyber attacks and their defenses entail. Simply providing consumers with information on what a manufacturer has done beyond the minimum requirements will not necessarily help them to understand how safe a car might be. More importantly and as discussed above, this may cause the industry to focus their efforts off of a list of requirements rather than reform the engineering process to take security into consideration at every step. A better implementation of the cyber dashboard might be to create it in the form of a five- star security rating system similar to the car safety rating that already exists. The rating body should have a list of common and reasonable attacks that it tries to execute against a car, and the rating it awards should be based off of how

7 immune a car is to those attacks relative to other vehicles in the market. This list of attacks can and should be updated on a yearly basis, and should strive to be as technically advanced as possible. Additionally, design decisions that manufacturers make to secure their cars (such as the use of encryption, or the separation of essential and non- essential systems), while they may not directly protect against specific attacks, should be rewarded and favored in the rating process. The benefits of such a system are twofold. For the consumers, it s a lot more meaningful to shop for cars that have four or five stars and to avoid cars that have two or three stars, even if these cars can claim to have met the minimum requirements. The five star system is already related to car safety, is easy to understand, and leaves little room for consumers to be deluded about the meaningfulness of security features that manufacturers may try to trumpet. For manufacturers, this incentivizes being at the top of their class in terms of security, since the rating system is inherently competitive. They can meet whatever standards are set forth and legally be allowed to sell cars, but if they innovate in the security space, they can turn that into a real competitive advantage that everyday consumers can understand and respond to. Conclusion In summary, the SPY Car Act is a fantastic start, and it is an important step for the government to take to keep up with the dizzying speed of the tech and car

8 industries. With the above considerations, the Act can become more effective and compelling, and will hopefully prevent the auto industry from making the sorts of security mistakes that subsets of the tech industry have made in the past.

9 Sources Carter, Gene. "Ramifications of the SPY Car Act." Embedded Computing Design. N.p., 29 July Web. 15 Dec < computing.com/guest- blogs/ramifications- of- the- spy- car- act/>. Greenberg, Andy. "Senate Bill Seeks Standards For Cars Defenses From Hackers." Wired.com. N.p., 21 July Web. 15 Dec < bill- seeks- standards- cars- defenses- hackers/>. Howard, Alexander. "Senate Bill Aims To Lock Hackers Out Of Connected Cars." Huffington Post. N.p., 21 July Web. 15 Dec < act- car- hackers- senators- security_55ae4e72e4b0a9b b>. S , 114 Cong. (2015). Print. "Sen. Blumenthal Introduces Bill To Protect Connected Cars From Hackers." NPR. NPR, 22 July Web. 15 Dec < blumenthal- introduces- bill- to- protect- connected- cars- from- hackers>.

10 "Sens. Markey, Blumenthal Introduce Legislation to Protect Drivers from Auto Security, Privacy Risks with Standards & Cyber Dashboard Rating System." Senator Ed Markey. N.p., 21 July Web. 15 Dec < releases/sens- markey- blumenthal- introduce- legislation- to- protect- drivers- from- auto- security- privacy- risks- with- standards- and- cyber- dashboard- rating- system>. "Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk." (2015): n. pag. Ed Markey, United States Senator for Massachusetts. Web. 15 Dec < 06_MarkeyReport- Tracking_Hacking_CarSecurity%202.pdf>.

Legal Risks For Consumer Products Cos. In 2018: Part 2

Legal Risks For Consumer Products Cos. In 2018: Part 2 Portfolio Media. Inc. 111 West 19 th Street, 5th Floor New York, NY 10011 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Legal Risks For Consumer Products Cos. In

More information

Information Technology in the Automotive Aftermarket

Information Technology in the Automotive Aftermarket Information Technology in the Automotive Aftermarket March 2015 AASA Thought Leadership: The following white paper consists of key takeaways from three AASA surveys conducted in 2014, which focused on

More information

HOKUAPPS THE MODERN ENTERPRISE APPLICATION PLATFORM

HOKUAPPS THE MODERN ENTERPRISE APPLICATION PLATFORM HOKUAPPS THE MODERN ENTERPRISE APPLICATION PLATFORM Contents OVERVIEW p-4 HOW TO SOLVE THEM p-5 THE CHAINS OF THE PAST p-6 THE CHALLENGE OF THE FUTURE p-7 TAKING COMMAND p-8 Like it or not, the world has

More information

Privacy Principles for Vehicle Technologies & Services

Privacy Principles for Vehicle Technologies & Services The Automotive Industry s Commitment to Privacy and Transparency Privacy Principles for Vehicle Technologies & Services FOOTER TEXT 1 A Breakthrough in Privacy The Alliance and Global came together to

More information

ECONOMIC MACHINE LEARNING FOR FRAUD DETECTION

ECONOMIC MACHINE LEARNING FOR FRAUD DETECTION ECONOMIC MACHINE LEARNING FOR FRAUD DETECTION Maytal Saar-Tsechansky 2015 UT CID Report #1511 This UT CID research was supported in part by the following organizations: identity.utexas.edu ECONOMIC MACHINE

More information

Consumers & Usage Based Insurance

Consumers & Usage Based Insurance Consumers & Usage Based Insurance 2013 Consumer Research Results A representative sample of auto insurance consumers were interviewed. Conducted March 2013 2,072 consumers Age 21 to 74 Insured drivers

More information

Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C

Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. 000 In the Matter of ) ) EPIC Et Al. Petition for Rulemaking to Repeal ) WC Docket No. 17-10 7 C.F.R..6 ( Retention of Telephone Records )

More information

Outsourcing is a common practice in several

Outsourcing is a common practice in several Why Should We Care About Outsourcing? Brian Schultz Outsourcing: Practice used by companies to reduce costs by transferring portions of work to outside suppliers rather than completing it internally. (Investopedia)

More information

Design Like a Pro. Boost Your Skills in HMI / SCADA Project Development. Part 3: Designing HMI / SCADA Projects That Deliver Results

Design Like a Pro. Boost Your Skills in HMI / SCADA Project Development. Part 3: Designing HMI / SCADA Projects That Deliver Results INDUCTIVE AUTOMATION DESIGN SERIES Design Like a Pro Boost Your Skills in HMI / SCADA Project Development Part 3: Designing HMI / SCADA Projects That Deliver Results The end of a project can be the most

More information

How Startups Can Manage Benefit Costs

How Startups Can Manage Benefit Costs WHITE PAPER How Startups Can Manage Benefit Costs Get the Package You Need Without Breaking the Bank Seventy-five percent of U.S. workers consider a health plan to be the most important employee benefit

More information

for managing your changing IT environment.

for managing your changing IT environment. Getting ready for the Next Big Thing: 5 KEY QUESTIONS for managing your changing IT environment. The future of IT management is now. Answer these five questions to assess your readiness to manage the ongoing

More information

Prioritizing IT Modernization Projects

Prioritizing IT Modernization Projects Prioritizing IT Modernization Projects A New Era of Cybersecurity. In the landscape of ever-changing requirements, dynamic missions, and funding levels that fluctuate year-to-year, getting ahead of aging

More information

Welcome to Now. Once upon a time, this was the best possible way to protect government assets. Those days are over.

Welcome to Now. Once upon a time, this was the best possible way to protect government assets. Those days are over. Secure Data Management: Addressing the Weakest Link in Government Security Once upon a time, this was the best possible way to protect government assets. Those days are over. Welcome to Now. In the wake

More information

Economic Machine Learning for Fraud Detection

Economic Machine Learning for Fraud Detection Economic Machine Learning for Fraud Detection Maytal Saar-Tsechansky 2015 UT CID Report #1518 This UT CID research was supported in part by the following organizations: identity.utexas.edu ECONOMIC MACHINE

More information

Executive Briefing Guide. In association with. Managing Web and Mobile Security Risk. An introduction to continuous assessment for business executives

Executive Briefing Guide. In association with. Managing Web and Mobile Security Risk. An introduction to continuous assessment for business executives In association with Managing Web and Mobile Security Risk An introduction to continuous assessment for business executives March 2017 In a nutshell Authorities are introducing ever stronger regulations,

More information

Transparency in the digital age: companies should talk about their cyber security

Transparency in the digital age: companies should talk about their cyber security Transparency in the digital age: companies should talk about their The cyber security of companies is an increasingly important issue for society. Nations depend on the of both public and private institutions

More information

TODAY S ORGANIZED MARKETS A STEP TOWARD COMPETITION OR AN EXERCISE IN RE-REGULATION?

TODAY S ORGANIZED MARKETS A STEP TOWARD COMPETITION OR AN EXERCISE IN RE-REGULATION? TODAY S ORGANIZED MARKETS A STEP TOWARD COMPETITION OR AN EXERCISE IN RE-REGULATION? What is ELCON? The Electricity Consumers Resource Council (ELCON) is the national association representing large industrial

More information

Rules of the Road for KnowYourDrive

Rules of the Road for KnowYourDrive Rules of the Road for KnowYourDrive Welcome to KnowYourDrive Congratulations! You ve made a wise choice to drive safer and smarter with American Family s KnowYourDrive program, powered by Automatic. Helping

More information

State Clean Energy Actions January December 2014 Update

State Clean Energy Actions January December 2014 Update State Clean Energy Actions January December 2014 Update Sue Gander Energy, Environment & Transportation Division NGA Center for Best Practices April 16, 2015 Online database compiles clean energy activities

More information

Comments of the U.S. HAV Data Access Coalition To the Subcommittee on Communications and Technology Of the House Committee on Energy and Commerce

Comments of the U.S. HAV Data Access Coalition To the Subcommittee on Communications and Technology Of the House Committee on Energy and Commerce Comments of the U.S. HAV Data Access Coalition To the Subcommittee on Communications and Technology Of the House Committee on Energy and Commerce Hearing on Protecting Consumer Proprietary Network Information

More information

3 Questions. to Ask When Developing an Adaptive Security Awareness Program

3 Questions. to Ask When Developing an Adaptive Security Awareness Program 3 Questions to Ask When Developing an Adaptive Security Awareness Program 3 Questions to Ask When Developing an Adaptive Security Awareness Program INTRODUCTION Most people working in or near cybersecurity

More information

10 ways to raise your users cybersecurity IQ. By Alison DeNisco Rayome COPYRIGHT 2018 CBS INTERACTIVE INC. ALL RIGHTS RESERVED.

10 ways to raise your users cybersecurity IQ. By Alison DeNisco Rayome COPYRIGHT 2018 CBS INTERACTIVE INC. ALL RIGHTS RESERVED. 10 ways to raise your users cybersecurity IQ By Alison DeNisco Rayome INTRODUCTION Employees are a company s greatest asset, but also its greatest security risk. If we look at security breaches over the

More information

Comments of the. Ad-Hoc HAV Data Access Coalition. To the. U.S. Department of Transportation. Pipeline and Hazardous Materials Safety Administration s

Comments of the. Ad-Hoc HAV Data Access Coalition. To the. U.S. Department of Transportation. Pipeline and Hazardous Materials Safety Administration s Comments of the Ad-Hoc HAV Data Access Coalition To the U.S. Department of Transportation Pipeline and Hazardous Materials Safety Administration s Request for Information on Regulatory Challenges to Safely

More information

Testimony of Julia Rege

Testimony of Julia Rege Testimony of Julia Rege Director, Environment & Energy, Association of Global Automakers, Inc. at the Public Hearing for Reconsideration of the Final Determination of the Mid-term Evaluation of Greenhouse

More information

MEDIAPRO BEST PRACTICES SERIES: A Roadmap for Planning Your Awareness Program

MEDIAPRO BEST PRACTICES SERIES: A Roadmap for Planning Your Awareness Program MEDIAPRO BEST PRACTICES SERIES: A Roadmap for Planning Your Awareness Program MEDIAPRO BEST PRACTICES SERIES: A ROADMAP FOR PLANNING YOUR AWARENESS PROGRAM INTRODUCTION No journey should begin without

More information

Big Data - Its Impacts on Economies, Finance and Central Banking

Big Data - Its Impacts on Economies, Finance and Central Banking November 1, 2017 Bank of Japan Big Data - Its Impacts on Economies, Finance and Central Banking Remarks at the Fourth FinTech Forum Hiroshi Nakaso Deputy Governor of the Bank of Japan (English translation

More information

Using Natural Language Processing and Machine Learning to Forecast Legislative Outcomes

Using Natural Language Processing and Machine Learning to Forecast Legislative Outcomes White Paper Using Natural Language Processing and Machine Learning to Forecast Legislative Outcomes 1 Thomas Circle, 8th Floor, Washington DC 20005 www.fiscalnote.com contact@fiscalnote.com 888.655.6082

More information

SKORR PRESS FAQ. Questions about the business strategy: 1) What is Skorr?

SKORR PRESS FAQ. Questions about the business strategy: 1) What is Skorr? Questions about the business strategy: 1) What is Skorr? SKORR PRESS FAQ Skorr is a powerful new app to empower individuals to take control of their online presence. Skorr will measure, monitor and improve

More information

FAPT POSITION PAPER Advertising on School Buses January 2011

FAPT POSITION PAPER Advertising on School Buses January 2011 www.faptflorida.org FAPT POSITION PAPER Advertising on School Buses January 2011 Over the past few years, a number of states and local school districts have considered allowing the placement of advertisements

More information

White Paper. Small, Incremental Adjustments Make for Significant Gains

White Paper. Small, Incremental Adjustments Make for Significant Gains White Paper Small, Incremental Adjustments Make for Significant Gains Small, Incremental Adjustments Make for Significant Gains Author: Alun Bain simtrac Manager Monash University conducted a 12-week study

More information

Measuring Cross-Device, The Methodology

Measuring Cross-Device, The Methodology Measuring Cross-Device, The Methodology As the first company to crack-the-code on cross-screen, Tapad Data Scientists are asked to explain the power of our cross-screen technology on a near-daily basis.

More information

Hiroshi Nakaso: Big data its impacts on economies, finance and central banking

Hiroshi Nakaso: Big data its impacts on economies, finance and central banking Hiroshi Nakaso: Big data its impacts on economies, finance and central banking Speech by Mr Hiroshi Nakaso, Deputy Governor of the Bank of Japan, at the Fourth FinTech Forum, Tokyo, 1 November 2017. Introduction:

More information

Why is O2 doing car insurance?

Why is O2 doing car insurance? Why is O2 doing car insurance? The reason, and the role of data Steve Wright Head of Product & Operations. O2 Drive Insuretech December 6 th 2016 A bit about O2 You probably know O2 as And we also do this

More information

FACE DOWN CYBERTHREATS WITH CDM INSIDE P2 CDM ROLLOUT PRESSURED BY INCREASING THREATS P3 WHAT S NEXT FOR CDM? P4 ALLIANT GWAC USED FOR SOME CDM NEEDS

FACE DOWN CYBERTHREATS WITH CDM INSIDE P2 CDM ROLLOUT PRESSURED BY INCREASING THREATS P3 WHAT S NEXT FOR CDM? P4 ALLIANT GWAC USED FOR SOME CDM NEEDS ONLINE REPORT SPONSORED BY: FACE DOWN CYBERTHREATS WITH CDM INSIDE P2 CDM ROLLOUT PRESSURED BY INCREASING THREATS P3 WHAT S NEXT FOR CDM? P4 ALLIANT GWAC USED FOR SOME CDM NEEDS P5 PHASE 3 REQUIREMENTS

More information

NERC CIP Compliance - Questions the Board Should Ask. Paul J. Feldman and Shelley A. Longmuir

NERC CIP Compliance - Questions the Board Should Ask. Paul J. Feldman and Shelley A. Longmuir NERC CIP Compliance - Questions the Board Should Ask Paul J. Feldman and Shelley A. Longmuir A Board of Directors is charged with oversight of company activities. To accomplish that mission, the Board

More information

A Comparison of the Recent FTC and Commerce Department Data Privacy Frameworks

A Comparison of the Recent FTC and Commerce Department Data Privacy Frameworks A Comparison of the Recent FTC and Commerce Department Data Privacy Frameworks By Lydia Parnes & Edward Holman As the IAPP enters its second decade, the privacy landscape in the U.S. is undergoing a major

More information

Show notes for today's conversation are available at the podcast website.

Show notes for today's conversation are available at the podcast website. Information Compliance: A Growing Challenge for Business Leaders Transcript Part 1: Information Compliance Overload Julia Allen: Welcome to CERT's podcast series: Security for Business Leaders. The CERT

More information

Browsing & Buying Behaviour 2016.

Browsing & Buying Behaviour 2016. Browsing & Buying Behaviour 2016. Study: online consumer shopping behaviour revealed 1 United Kingdom: Q3 2016 Preface With UK ecommerce sales growing at an annual rate of 15%, according to the Centre

More information

my Driving Discount program

my Driving Discount program my Driving Discount program CUSTOMER MOBILE APP Frequently Asked Questions for Alberta Brokers ENROLMENT AND DISCOUNT 1. How do I know if my customer is eligible for the program? Any driver that is a principal

More information

EB TechPaper. Connected cars and data economy. elektrobit.com

EB TechPaper. Connected cars and data economy. elektrobit.com EB TechPaper Connected cars and data economy elektrobit.com 1 Data economy should be paramount in the development of products and solutions for the automotive market. The economic use of customer and vehicle

More information

PUTTING THE i IN CRM. Series 1: The Impact to the Sales Team. ebook

PUTTING THE i IN CRM. Series 1: The Impact to the Sales Team. ebook PUTTING THE i IN CRM Series 1: The Impact to the Sales Team. ebook Table of Contents Section I Empowering the Individual 3 Section II Management Benefits 6 of Individualized CRM Section III Expanding your

More information

Build Secure Applications with Software Analysis

Build Secure Applications with Software Analysis White Paper Build Secure Applications with Software Analysis Despite the fact that application security has become an increasingly major concern in recent years, many application development teams treat

More information

Insurance Accounting & Systems Association (IASA): NY/NJ Chapter Spring 2014

Insurance Accounting & Systems Association (IASA): NY/NJ Chapter Spring 2014 Insurance Accounting & Systems Association (IASA): NY/NJ Chapter Spring 2014 State of Information Security by Deloitte & Touche LLP May 20, 2014 As used in this document, Deloitte means Deloitte & Touche

More information

Inc 5000 Agency 2016, 2015 and MARKETING HACKS FOR MULTI-LOCATION COMPANIES

Inc 5000 Agency 2016, 2015 and MARKETING HACKS FOR MULTI-LOCATION COMPANIES Inc 5000 Agency 2016, 2015 and 2014 6 MARKETING HACKS FOR MULTI-LOCATION COMPANIES 1 While admittedly the term marketing hack has been overused in recent years, the practice and premise behind the term

More information

CUSTOMIZATION: A B LESSING O R A C URSE?

CUSTOMIZATION: A B LESSING O R A C URSE? March 2016 CUSTOMIZATION: A B LESSING O R A C URSE? REMOVING T HE B ARRIERS T O I NNOVATION A ND C HANGE Data Source In this report, Mint Jutras references data collected from its 2016 Enterprise Solution

More information

WHY YOUR INFLUENCER CAMPAIGN IS FAILING

WHY YOUR INFLUENCER CAMPAIGN IS FAILING WHY YOUR INFLUENCER CAMPAIGN IS FAILING INTRO Have you implemented an influencer campaign that just didn t quite work? Did you find yourself asking What went wrong? You re not alone. With influencer marketing

More information

ENERGY POLICY ACT OF (Senate - June 28, 2005) [Page: S7458]

ENERGY POLICY ACT OF (Senate - June 28, 2005) [Page: S7458] ENERGY POLICY ACT OF 2005 -- (Senate - June 28, 2005) [Page: S7458] Mr. OBAMA. Mr. President, during the 2 weeks or so that we have been debating this Energy bill in the Senate, the price of crude oil

More information

Briefing on Investigatory Powers Bill Prepared for the Public Bill Committee March 2016

Briefing on Investigatory Powers Bill Prepared for the Public Bill Committee March 2016 Briefing on Investigatory Powers Bill Prepared for the Public Bill Committee March 2016 Talal Rajab Programme Manager 020 7331 2189 talal.rajab@techuk.org Antony Walker Deputy CEO 07780 603 065 antony.walker@techuk.org

More information

January Top 10 questions for compensation committees in 2018

January Top 10 questions for compensation committees in 2018 January 2018 Top 10 questions for compensation committees in 2018 Compensation committees don t turn on a dime; they have to be prepared to satisfy legal and regulatory changes as well as expectations

More information

The Truth about Cyber Risk Metrics

The Truth about Cyber Risk Metrics SESSION ID: CXO-R02 The Truth about Cyber Risk Metrics Connecting Vulnerabilities to Economics Scott Borg U.S. Cyber Consequences Unit "You can t always get what you want. But if you try sometimes you

More information

Agriculture Investment Data Needs: NGOs

Agriculture Investment Data Needs: NGOs Agriculture Investment Data Needs: NGOs Background The Initiative for Open Ag Funding 1 works to support efforts to end hunger and food insecurity by ensuring organizations have the information they need

More information

How do you make money in a sustainable energy environment? Where are the opportunities for energy growth [by location]?

How do you make money in a sustainable energy environment? Where are the opportunities for energy growth [by location]? Panel Session Notes Session II: Energy Moderator: Dr. Jennifer Curtis Panelists: Dr. Gary Peter, Patrick Sheehan, And Dr. Samuel Baldwin Notes: Roberto Ruiz and Emotion Silvestri Dr. Curtis begins by opening

More information

PROACTIVE ADOPTER SERIES: Embracing foundational benefits of IT security

PROACTIVE ADOPTER SERIES: Embracing foundational benefits of IT security PROACTIVE ADOPTER SERIES: Embracing foundational benefits of IT security In a world where small and midsize businesses (SMBs) are constantly looking for ways to costeffectively increase productivity and

More information

Research: A Strong Privacy Policy Can Save Your Company Millions

Research: A Strong Privacy Policy Can Save Your Company Millions SECURITY & PRIVACY Research: A Strong Privacy Policy Can Save Your Company Millions by Kelly D. Martin, Abhishek Borah, and Robert W. Palmatier FEBRUARY 15, 2018 OSMAN RANA/HAYON THAPALIYA/UNSPLASH Page

More information

Matt Loeb ISACA CEO. September 17, WCARS

Matt Loeb ISACA CEO. September 17, WCARS Matt Loeb ISACA CEO September 17, 2016 37WCARS Agenda A Disruptive and Changing World Impact on Auditors Implications for the Future Workforce A Disrupted World Digital disruption is already here World

More information

Redtail Actively Addresses the Challenge of CRM User Adoption

Redtail Actively Addresses the Challenge of CRM User Adoption Reprint from August 2013 Redtail Actively Addresses the Challenge of CRM User Adoption By Paul Cantrell, Redtail If your office has implemented a CRM tool, or if you are considering doing so, you should

More information

THE MOBILE TSUNAMI THREATENS THE COMPETITIVE POSITIONING OF THE ENTERPRISE

THE MOBILE TSUNAMI THREATENS THE COMPETITIVE POSITIONING OF THE ENTERPRISE THE MOBILE TSUNAMI THREATENS THE COMPETITIVE POSITIONING OF THE ENTERPRISE Abstract: This white paper zooms in on the threat of increasing costs of app-development faced by Enterprises and offers a vision

More information

Driven by Smart Data. The automotive industry and the cloud.

Driven by Smart Data. The automotive industry and the cloud. Driven by Smart Data The automotive industry and the cloud. Cloud survey report: Industry experts explore the current and planned cloud adoption strategies of senior IT professionals. Researched by 2 Introduction.

More information

THE VALUE OF TIME NO BETTER INVESTMENT FOR YOUR SERVICE DEPARTMENT BY JIM LEMAN. $300,000 and upward of $300,000 for Parts inventory.

THE VALUE OF TIME NO BETTER INVESTMENT FOR YOUR SERVICE DEPARTMENT BY JIM LEMAN. $300,000 and upward of $300,000 for Parts inventory. FEATURE JANUARY / FEBRUARY 2017 FIXED OPS MAGAZINE THE VALUE OF TIME NO BETTER INVESTMENT FOR YOUR SERVICE DEPARTMENT BY JIM LEMAN Modern digital and mobile equipment and tools make today s Service Department

More information

Digital Transformation in Financial Services

Digital Transformation in Financial Services The IT Innovator s Guide to Digital Transformation in Financial Services 2018 Introduction The Financial Services Industry: A Snapshot Technologies Necessary for Digital Transformation Building the Infrastructure

More information

IMPLEMENTING CHANGE IN A COMPLEX WORLD. Responding to complexity in socio- economic systems: How to build a smart and resilient society?

IMPLEMENTING CHANGE IN A COMPLEX WORLD. Responding to complexity in socio- economic systems: How to build a smart and resilient society? IMPLEMENTING CHANGE IN A COMPLEX WORLD Dirk Helbing, Computational Social Science @ ETH Zurich, Switzerland Responding to complexity in socio- economic systems: How to build a smart and resilient society?

More information

Managing Sanctions Compliance in a Global Economy

Managing Sanctions Compliance in a Global Economy Managing Sanctions Compliance in a Global Economy PART 1: DEPLOYING REAL-TIME WATCH LIST SCREENING Competing in today s multifaceted, global economy is a high-stakes game of risk and reward. Regardless

More information

PERFORMANCE-BASED REGULATION

PERFORMANCE-BASED REGULATION PERFORMANCE-BASED REGULATION Aligning utility incentives with policy objectives and customer benefits A 21 st Century Electricity System Issue Brief By Advanced Energy Economy September 2017 San Francisco

More information

Top 5 Must Do IT Audits

Top 5 Must Do IT Audits Top 5 Must Do IT Audits Mike Fabrizius, Sharp HealthCare, VP, Internal Audit DJ Wilkins, KPMG, Partner, IT Advisory 2011 AHIA Annual Conference www.ahia.org Background on Sharp HealthCare Sharp s Co-sourcing

More information

Ten Components for a Successful Safety Program

Ten Components for a Successful Safety Program Ten Components for a Successful Safety Program One of the things I enjoy most about being a safety consultant is that every day brings forth new and dynamic adventures. Today I could be teaching employees

More information

Understanding the Impact of the Analysis Exchange Model 1.0

Understanding the Impact of the Analysis Exchange Model 1.0 Understanding the Impact of the Analysis Exchange Model 1.0 Approved for Public Release; Distribution Unlimited. Case Number 17-3990. 2017 The MITRE Corporation. ALL RIGHTS RESERVED. Government agencies

More information

Digital transformation in the automotive industry

Digital transformation in the automotive industry IBM Institute for Business Value Digital transformation in the automotive industry Creating new business models where digital meets physical Overview Individuals and businesses alike are embracing the

More information

Records Management Perspectives:

Records Management Perspectives: Records Management Perspectives: Unprepared, unaware, unmoved. Why companies must wake up to the challenges of the EU General Data Protection Regulation The power of memory www.crownrms.com The business

More information

The DealerRater Guide to Online Reviews: LEVERAGING REVIEWS FOR A COMPETITIVE EDGE

The DealerRater Guide to Online Reviews: LEVERAGING REVIEWS FOR A COMPETITIVE EDGE The DealerRater Guide to Online Reviews: LEVERAGING REVIEWS FOR A COMPETITIVE EDGE EXECUTIVE SUMMARY Online reviews are the new word of mouth. A positive online review of your dealership causes a ripple

More information

SMART-TRANSPORTATION DIVISION BEFORE THE U.S.DEPARTMENT OF TRANSPORTATION FEDERAL RAILROAD ADMINISTRATION FRA

SMART-TRANSPORTATION DIVISION BEFORE THE U.S.DEPARTMENT OF TRANSPORTATION FEDERAL RAILROAD ADMINISTRATION FRA SMART-TRANSPORTATION DIVISION BEFORE THE U.S.DEPARTMENT OF TRANSPORTATION FEDERAL RAILROAD ADMINISTRATION FRA 2018-0027 May 7, 2018 These comments are on behalf of the Transportation Division of the International

More information

A You can use m-tickets on Arriva bus services throughout the UK, except for Park and Ride buses, and Transport for London services.

A You can use m-tickets on Arriva bus services throughout the UK, except for Park and Ride buses, and Transport for London services. Arriva m-ticket app FAQs v.1.26 4 January 2017 Q - Where can I use m-ticket? A You can use m-tickets on Arriva bus services throughout the UK, except for Park and Ride buses, and Transport for London services.

More information

Marijuana on the Blockchain:

Marijuana on the Blockchain: Marijuana on the Blockchain: Stability through Proof of Stake 01.30.2018 GanjaCoin (MRJA) 1 Abstract 2 Overview 4 Unique Value Proposition 4 Token Information 4 Proof of Work and Proof of Stake 5 Problems

More information

Amazon s Approach to Privacy

Amazon s Approach to Privacy Statement of Andrew DeVore Vice President and Associate General Counsel Amazon.com, Inc. before the United States Senate Committee on Commerce, Science, and Transportation September 26, 2018 Thank you,

More information

Microsoft Azure: CSP SCE and Pay As You Go Customer Behavior Analysis

Microsoft Azure: CSP SCE and Pay As You Go Customer Behavior Analysis Microsoft Azure: CSP SCE and Pay As You Go Customer Behavior Analysis Patrick O Leary Microsoft Practice Leader, Softchoice Patrick.Oleary@softchoice.com +1 610-914-5265 Connect with us today. 1.800.268.7638

More information

Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014 SUPPLEMENTARY SUBMISSION

Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014 SUPPLEMENTARY SUBMISSION http://www.privacy.org.au Secretary@privacy.org.au http://www.privacy.org.au/about/contacts.html 31 January 2015 Committee Secretary Parliamentary Joint Committee on Intelligence and Security PO Box 6021

More information

The Risks and Consequences of Poor App Quality

The Risks and Consequences of Poor App Quality The Risks and Consequences of Poor App Quality From user abandonment to lost revenue to damaged brands, a poor quality app can cost your company big time White Paper January 2014 100 Pennsylvania Ave.

More information

NEW TECHNOLOGIES TO OPTIMIZE PARKING AVAILABILITY, SAFETY AND REVENUE

NEW TECHNOLOGIES TO OPTIMIZE PARKING AVAILABILITY, SAFETY AND REVENUE NEW TECHNOLOGIES TO OPTIMIZE PARKING AVAILABILITY, SAFETY AND REVENUE AllTrafficSolutions.com 2 New Technologies to Optimize Parking Availability, Safety and Revenue CONTENTS Introduction Parking Technology:

More information

5 TIPS TO BUILD TRUST WITH THE DIGITAL CAR SHOPPER

5 TIPS TO BUILD TRUST WITH THE DIGITAL CAR SHOPPER 5 TIPS TO BUILD TRUST WITH THE DIGITAL CAR SHOPPER Today s auto shoppers rely on the Internet to gather information, compare prices and communicate with dealers. Accustomed to using sites like TripAdvisor

More information

The golden rulebook. Ensuring compliance and data security in a complex and risky world

The golden rulebook. Ensuring compliance and data security in a complex and risky world The golden rulebook Ensuring compliance and data security in a complex and risky world Extract from technology, media, telecommunication report Building tomorrow s billion dollar businesses Ensuring compliance

More information

Achieving i total t retail

Achieving i total t retail www.pwc.com Achieving i total t retail Consumer expectations driving the next retail business model January, 2014 Jeff Holmes PwC Retail & Consumer Managing Director Contents Hypothetical case study discussion

More information

Richard R. Yuse, RTSC President NDIA / 24 th Annual National Logistics Conference & Exhibition. March 11, Good morning, everybody.

Richard R. Yuse, RTSC President NDIA / 24 th Annual National Logistics Conference & Exhibition. March 11, Good morning, everybody. Richard R. Yuse, RTSC President NDIA / 24 th Annual National Logistics Conference & Exhibition March 11, 2008 Good morning, everybody. I would like to start by saying that it is a privilege for me to be

More information

The 2014 Global Innovation Automotive industry findings

The 2014 Global Innovation Automotive industry findings The 2014 Global Innovation 1000 Automotive industry findings Automotive industry findings From the ground level, three powerful forces are roiling the auto industry: shifts in consumer demand, expanded

More information

MOBILITY MODELS: DEVELOPING YOUR FLEET S CONNECTED STRATEGY MOBILITY MODELS: DEVELOPING YOUR FLEET S CONNECTED STRATEGY

MOBILITY MODELS: DEVELOPING YOUR FLEET S CONNECTED STRATEGY MOBILITY MODELS: DEVELOPING YOUR FLEET S CONNECTED STRATEGY MOBILITY MODELS: DEVELOPING YOUR FLEET S CONNECTED STRATEGY Introduction On-road communications have always been vital to the success of the transportation industry. But in today s advancing technological

More information

A N A L Y S T M E E T. Amitabh Chaudhry - Session I

A N A L Y S T M E E T. Amitabh Chaudhry - Session I Infosys Technologies Limited 2 0 0 7 A N A L Y S T M E E T July 30, 2007, Monday, Bangalore - Session I Very quickly our revenue profile as you can see we did $43 million dollars in financial year of 2005

More information

GOOD FIRST IMPRESSIONS ARE ROCKET FUEL FOR SMALL BUSINESS GROWTH 6 STEPS TO MAKE YOUR INTRODUCTION MEANINGFUL

GOOD FIRST IMPRESSIONS ARE ROCKET FUEL FOR SMALL BUSINESS GROWTH 6 STEPS TO MAKE YOUR INTRODUCTION MEANINGFUL GOOD FIRST IMPRESSIONS ARE ROCKET FUEL FOR SMALL BUSINESS GROWTH 6 STEPS TO MAKE YOUR INTRODUCTION MEANINGFUL step 1 CREATE A SINCERE RELATIONSHIP FROM THE START. Success with first impressions in business

More information

UNDERSTANDING CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

UNDERSTANDING CONTINUOUS DIAGNOSTICS & MITIGATION (CDM) ONLINE REPORT SPONSORED BY: CONTRACT GUIDE UNDERSTANDING CONTINUOUS DIAGNOSTICS & MITIGATION (CDM) INSIDE 2 3 4 5 6 WHAT IS CDM AND WHY DO YOU NEED IT? CDM COULD BE A GAME-CHANGER HOW DOES CDM WORK? WITH

More information

Environment America, The Natural Resources Defense Council, Sierra Club, & Union of Concerned Scientists

Environment America, The Natural Resources Defense Council, Sierra Club, & Union of Concerned Scientists TO: FROM: RE: Environment America, The Natural Resources Defense Council, Sierra Club, & Union of Concerned Scientists The Mellman Group, Inc. Voters Overwhelmingly Support Stricter Fuel Efficiency Standards

More information

8 Benefits of Network Marketing & Communicating Them

8 Benefits of Network Marketing & Communicating Them 8 Benefits of Network Marketing & Communicating Them If you ve been in the network marketing profession for any length of time you already know the importance of leadership. It drives momentum, customer

More information

GDPR in SAP. June, Igor Gregurec

GDPR in SAP. June, Igor Gregurec GDPR in SAP June, 2017 Igor Gregurec Agenda GDPR rules GDPR compliance approach Example SAP solutions for GDPR compliance Lifecycle of personal data Fines and trends 2 The New EU Data Protection Rules

More information

1 W H I T E P A P E R

1 W H I T E P A P E R W H I T E P A P E R 1 2 DISCLAIMER This white paper shall not and cannot be considered as an invitation to enter into an investment. It does not constitute or relate in any way nor should it be considered

More information

IT S TIME TO RETHINK VDI:

IT S TIME TO RETHINK VDI: IT S TIME TO RETHINK VDI: TOP 5 REASONS TO CONSIDER A SECURE REMOTE BROWSER The number of empty office desks is on the rise, as a growing number of employees work remotely and/or use their own devices.

More information

Creating a safety culture:

Creating a safety culture: Today, it s commonplace for companies to check the motor vehicle records (MVRs) of their drivers once a year. That s considered due diligence. White paper Creating a safety culture: Moving from policies

More information

Key Financial Industry Issues Impacting the Access and Security of Customer Data

Key Financial Industry Issues Impacting the Access and Security of Customer Data Key Financial Industry Issues Impacting the Access and Security of Customer Data The financial industry is facing technology challenges related to the access and security of customer data, fueled by key

More information

FORTUNE FAVORS THE BRAVE EMPOWERING THE BACK OFFICE INSIGHT REPORT

FORTUNE FAVORS THE BRAVE EMPOWERING THE BACK OFFICE INSIGHT REPORT FORTUNE FAVORS THE BRAVE EMPOWERING THE BACK OFFICE INSIGHT REPORT Contents Technology in the back office Regulation Tech trends The future of the back office Conclusions Technology in the back office

More information

Banking in the Balance: Security vs. Convenience. IBM Trusteer s Valerie Bradford on How to Assess Digital Identities

Banking in the Balance: Security vs. Convenience. IBM Trusteer s Valerie Bradford on How to Assess Digital Identities Banking in the Balance: Security vs. Convenience IBM Trusteer s Valerie Bradford on How to Assess Digital Identities In an interview about overcoming these challenges, Bradford discusses: The fundamental

More information

WHY DO I NEED CRM? Answers to frequently asked customer relationship management questions.

WHY DO I NEED CRM? Answers to frequently asked customer relationship management questions. WHY DO I NEED CRM? Answers to frequently asked customer relationship management questions. INTRODUCTION In a 2015 survey conducted by Salesforce, more than half of small business owners said their companies

More information

FEEDBACK FORM. 1. Are high merchant fees a competitiveness issue for the EU economy?

FEEDBACK FORM. 1. Are high merchant fees a competitiveness issue for the EU economy? FEEDBACK FORM Name of undertaking: The Nuance Group AG Industry (network, current/potential acquirer, current/potential issuer, processor, other third party provider (e.g. merchant service provider), merchant

More information

Promotion Suite. Reach and engage today s shoppers on their terms, and deliver impactful promotions that build brand, loyalty and margin.

Promotion Suite. Reach and engage today s shoppers on their terms, and deliver impactful promotions that build brand, loyalty and margin. Promotion Suite Reach and engage today s shoppers on their terms, and deliver impactful promotions that build brand, loyalty and margin. Learn to Speak Customer. Technology-enabled and well connected,

More information

REQUEST FOR AUTHORIZATION TO CONTRACT WITH AMAZON DIGITAL SERVICES TO PROVIDE AN E-BOOK STOREFRONT

REQUEST FOR AUTHORIZATION TO CONTRACT WITH AMAZON DIGITAL SERVICES TO PROVIDE AN E-BOOK STOREFRONT REQUEST FOR AUTHORIZATION TO CONTRACT WITH AMAZON DIGITAL SERVICES TO PROVIDE AN E-BOOK STOREFRONT Estimated Annual / Total Contract Amount Funding Source Contract Term Options Option Amount Procurement

More information

Auctions Quick-Start Guide

Auctions Quick-Start Guide Auctions Quick-Start Guide Provided by AutoTec 01 Today, buyers rely on more auction locations than ever before. And with the growing popularity of social media and smartphones, we believe there s a tremendous

More information