Critique of the SPY Car Act of Obaid Farooqui
|
|
- Ira Austin
- 6 years ago
- Views:
Transcription
1 Critique of the SPY Car Act of 2015 Obaid Farooqui Introduction The Security and Privacy in Your Car Act (SPY Car) Act was proposed in 2015 by Senator Markey of Massachusetts and Senator Blumenthal of Connecticut, and is aimed at introducing standards for the automobile industry with regards to cyber security. First and foremost, it outlines that the National Highway Traffic Safety Administration (NHTSA) and the Federal Trade Commission (FTC) should formulate standards surrounding car safety. The Act targets not just the ability of hackers to gain control of vehicles but also calls for safeguards against data breaches. Second, it advocates for greater transparency between car manufacturers and consumers about what driving data is being collected, and allows for users to opt out without losing out on features (to the extent possible). Third, the Act calls for creating a cyber dashboard to be presented as a sticker on all new cars to help consumers understand the security measures implemented by the manufacturer. A Great Beginning The SPY Car Act is a fine start, and a much needed push for the automobile industry. Given the costs associated with developing ever- complicating security
2 features, the relatively low margins of the auto industry, the low volume of real world car hacks, and the resulting consumer complacency on the issue, there simply do not exist the market incentives for car companies to invest in the kinds of security features that modern car owners need. Thus, this first step to introduce government oversight incentivizes car manufacturers towards developing new models with cyber security and data privacy in mind. The Act has a number of high points. It sets lofty goals for protecting cars against hacks, including real- time detection and response mechanisms. It also sets the expectation of secure storage of data in all parts of the data pipeline, from onboard and off- board storage to the transmission in between. It also makes a bold move towards protecting consumer privacy interests, and prohibits manufacturers from strong- arming consumers into accepting data collection by withholding features from consumers; however, it also wisely recognizes that certain features may inherently require data collection, and cannot be offered if the user opts out, and makes an exception for such features. The idea of a dashboard that allows consumers to quickly understand what the different security features entail is a well- intentioned effort as well. It is in line with the larger push of the Act towards greater security coupled with greater consumer choice and understanding.
3 Points to Consider While it is a brilliant start and commendable that the Senate is starting to consider these issues as the security community is waking up to them, there are a number of finer points in the Act, many of whose details have yet to be decided on by the NHTSA and the FTC, which should be reconsidered. Cybersecurity Standards First, the notion of setting minimum standards is a sort of double- edged sword. The general goals that are outlined in the Act, especially in the first section on Cybersecurity Standards, hit the nail on the head quite well. However, the nature of the regulations that will come of it from the NHTSA and the FTC will have a great impact on the effectiveness of this Act. If the regulations are simply an enumeration of certain implementations or a battery of attacks that automakers must protect their cars from, then this Act poses the danger of making the automobile industry lazy in the face of new attacks, and lulling consumers into a false sense of security simply because the cars they purchase met the minimum standards months or years ago (which could very well have already become outdated at that time). In the case of automobile safety, we can say that we want cars to be able to withstand crashes of a certain force, and as long as the laws of Physics don t change, it stands to reason that a car that was up to
4 standard yesterday will be no less safe tomorrow. Cybersecurity is not like auto safety, however: we can say that we want data to be stored securely for instance, but a method of storage that is secure today may not be secure tomorrow for any number of reasons, say if an encryption algorithm is broken or a new vulnerability is found. Furthermore, the proposed regulations will take 18 months to formulate, and an additional 18 months to reach their final forms. While there s no good ways around this, and some may even argue that it s a relatively short amount of time given the massive number of attack vectors and the variety of car systems out there. But it serves the point made above that these regulations, then, cannot be a simple list of attacks they must present goals that are broad enough to be current, and specific enough to be meaningful. It s a fine line to walk, but one that the NHTSA and the FTC must consider very carefully. In addition, the regulations should include provisions to ensure that carmakers design systems that can be easily updated with retroactive security patches. The constantly changing nature of cyber threats and vulnerabilities necessitates that for a vehicle to remain secure, it should be easy for owners to have their cars updated at a later time when newer security features are introduced or previously unknown vulnerabilities come to light. Otherwise, a car that is secure at the time of manufacture may quickly become vulnerable after it leaves the lot.
5 Privacy Standards The second part of the Act that deals with privacy standards is a strong one, and sets a powerful precedent with regards to what consumers might be able to expect from companies. But a question that the automobile industry will no doubt and rightfully ask is why this special treatment of driving data? After all, just about every tech company from the multi- billion dollar giants to every Tom, Dick, and Harry that develops iphone apps out of their basement collects data. This can range from wristbands that collect health data to productivity apps that scan s to recommendation and navigation apps that track location data (which is essentially the same, if not more privacy- invading, then driving data). This begs the question: is this part of the Act just the first step in attempting to tame the Wild West that is user data collection? Can the rest of the tech industry expect similar regulations in the near future? It s important to keep in mind that data collection is the name of the game these days, and is an integral part of developing key new features and personalizing user experiences, and is a stepping- stone to making discoveries about aggregate usage that can in turn guide future products. For car companies specifically, collecting driving data has many benefits, not least of which is helping to design self- driving cars and introducing new and improved safety features. Pushing for complete openness with consumers might negatively impact the level of data collection that these companies can then conduct.
6 Nevertheless, this move to require car companies to be open about their data collections and usage policies is a laudable move, but perhaps it would be best to consider this as part of a separate bill that deals with user privacy issues, and not the SPY Car Act that focuses on vehicle security. Cyber Dashboard The last part of the Act that proposes the idea of the cyber dashboard is an interesting idea, but again, its efficacy will depend entirely on the details of its implementation. It's certainly well- intentioned to try and educate the populace about cyber- attacks, but the fact of the matter is that even many engineers within the tech industry don t have a solid grasp on what different cyber attacks and their defenses entail. Simply providing consumers with information on what a manufacturer has done beyond the minimum requirements will not necessarily help them to understand how safe a car might be. More importantly and as discussed above, this may cause the industry to focus their efforts off of a list of requirements rather than reform the engineering process to take security into consideration at every step. A better implementation of the cyber dashboard might be to create it in the form of a five- star security rating system similar to the car safety rating that already exists. The rating body should have a list of common and reasonable attacks that it tries to execute against a car, and the rating it awards should be based off of how
7 immune a car is to those attacks relative to other vehicles in the market. This list of attacks can and should be updated on a yearly basis, and should strive to be as technically advanced as possible. Additionally, design decisions that manufacturers make to secure their cars (such as the use of encryption, or the separation of essential and non- essential systems), while they may not directly protect against specific attacks, should be rewarded and favored in the rating process. The benefits of such a system are twofold. For the consumers, it s a lot more meaningful to shop for cars that have four or five stars and to avoid cars that have two or three stars, even if these cars can claim to have met the minimum requirements. The five star system is already related to car safety, is easy to understand, and leaves little room for consumers to be deluded about the meaningfulness of security features that manufacturers may try to trumpet. For manufacturers, this incentivizes being at the top of their class in terms of security, since the rating system is inherently competitive. They can meet whatever standards are set forth and legally be allowed to sell cars, but if they innovate in the security space, they can turn that into a real competitive advantage that everyday consumers can understand and respond to. Conclusion In summary, the SPY Car Act is a fantastic start, and it is an important step for the government to take to keep up with the dizzying speed of the tech and car
8 industries. With the above considerations, the Act can become more effective and compelling, and will hopefully prevent the auto industry from making the sorts of security mistakes that subsets of the tech industry have made in the past.
9 Sources Carter, Gene. "Ramifications of the SPY Car Act." Embedded Computing Design. N.p., 29 July Web. 15 Dec < computing.com/guest- blogs/ramifications- of- the- spy- car- act/>. Greenberg, Andy. "Senate Bill Seeks Standards For Cars Defenses From Hackers." Wired.com. N.p., 21 July Web. 15 Dec < bill- seeks- standards- cars- defenses- hackers/>. Howard, Alexander. "Senate Bill Aims To Lock Hackers Out Of Connected Cars." Huffington Post. N.p., 21 July Web. 15 Dec < act- car- hackers- senators- security_55ae4e72e4b0a9b b>. S , 114 Cong. (2015). Print. "Sen. Blumenthal Introduces Bill To Protect Connected Cars From Hackers." NPR. NPR, 22 July Web. 15 Dec < blumenthal- introduces- bill- to- protect- connected- cars- from- hackers>.
10 "Sens. Markey, Blumenthal Introduce Legislation to Protect Drivers from Auto Security, Privacy Risks with Standards & Cyber Dashboard Rating System." Senator Ed Markey. N.p., 21 July Web. 15 Dec < releases/sens- markey- blumenthal- introduce- legislation- to- protect- drivers- from- auto- security- privacy- risks- with- standards- and- cyber- dashboard- rating- system>. "Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk." (2015): n. pag. Ed Markey, United States Senator for Massachusetts. Web. 15 Dec < 06_MarkeyReport- Tracking_Hacking_CarSecurity%202.pdf>.
Legal Risks For Consumer Products Cos. In 2018: Part 2
Portfolio Media. Inc. 111 West 19 th Street, 5th Floor New York, NY 10011 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Legal Risks For Consumer Products Cos. In
More informationInformation Technology in the Automotive Aftermarket
Information Technology in the Automotive Aftermarket March 2015 AASA Thought Leadership: The following white paper consists of key takeaways from three AASA surveys conducted in 2014, which focused on
More informationHOKUAPPS THE MODERN ENTERPRISE APPLICATION PLATFORM
HOKUAPPS THE MODERN ENTERPRISE APPLICATION PLATFORM Contents OVERVIEW p-4 HOW TO SOLVE THEM p-5 THE CHAINS OF THE PAST p-6 THE CHALLENGE OF THE FUTURE p-7 TAKING COMMAND p-8 Like it or not, the world has
More informationPrivacy Principles for Vehicle Technologies & Services
The Automotive Industry s Commitment to Privacy and Transparency Privacy Principles for Vehicle Technologies & Services FOOTER TEXT 1 A Breakthrough in Privacy The Alliance and Global came together to
More informationECONOMIC MACHINE LEARNING FOR FRAUD DETECTION
ECONOMIC MACHINE LEARNING FOR FRAUD DETECTION Maytal Saar-Tsechansky 2015 UT CID Report #1511 This UT CID research was supported in part by the following organizations: identity.utexas.edu ECONOMIC MACHINE
More informationConsumers & Usage Based Insurance
Consumers & Usage Based Insurance 2013 Consumer Research Results A representative sample of auto insurance consumers were interviewed. Conducted March 2013 2,072 consumers Age 21 to 74 Insured drivers
More informationBefore the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C
Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. 000 In the Matter of ) ) EPIC Et Al. Petition for Rulemaking to Repeal ) WC Docket No. 17-10 7 C.F.R..6 ( Retention of Telephone Records )
More informationOutsourcing is a common practice in several
Why Should We Care About Outsourcing? Brian Schultz Outsourcing: Practice used by companies to reduce costs by transferring portions of work to outside suppliers rather than completing it internally. (Investopedia)
More informationDesign Like a Pro. Boost Your Skills in HMI / SCADA Project Development. Part 3: Designing HMI / SCADA Projects That Deliver Results
INDUCTIVE AUTOMATION DESIGN SERIES Design Like a Pro Boost Your Skills in HMI / SCADA Project Development Part 3: Designing HMI / SCADA Projects That Deliver Results The end of a project can be the most
More informationHow Startups Can Manage Benefit Costs
WHITE PAPER How Startups Can Manage Benefit Costs Get the Package You Need Without Breaking the Bank Seventy-five percent of U.S. workers consider a health plan to be the most important employee benefit
More informationfor managing your changing IT environment.
Getting ready for the Next Big Thing: 5 KEY QUESTIONS for managing your changing IT environment. The future of IT management is now. Answer these five questions to assess your readiness to manage the ongoing
More informationPrioritizing IT Modernization Projects
Prioritizing IT Modernization Projects A New Era of Cybersecurity. In the landscape of ever-changing requirements, dynamic missions, and funding levels that fluctuate year-to-year, getting ahead of aging
More informationWelcome to Now. Once upon a time, this was the best possible way to protect government assets. Those days are over.
Secure Data Management: Addressing the Weakest Link in Government Security Once upon a time, this was the best possible way to protect government assets. Those days are over. Welcome to Now. In the wake
More informationEconomic Machine Learning for Fraud Detection
Economic Machine Learning for Fraud Detection Maytal Saar-Tsechansky 2015 UT CID Report #1518 This UT CID research was supported in part by the following organizations: identity.utexas.edu ECONOMIC MACHINE
More informationExecutive Briefing Guide. In association with. Managing Web and Mobile Security Risk. An introduction to continuous assessment for business executives
In association with Managing Web and Mobile Security Risk An introduction to continuous assessment for business executives March 2017 In a nutshell Authorities are introducing ever stronger regulations,
More informationTransparency in the digital age: companies should talk about their cyber security
Transparency in the digital age: companies should talk about their The cyber security of companies is an increasingly important issue for society. Nations depend on the of both public and private institutions
More informationTODAY S ORGANIZED MARKETS A STEP TOWARD COMPETITION OR AN EXERCISE IN RE-REGULATION?
TODAY S ORGANIZED MARKETS A STEP TOWARD COMPETITION OR AN EXERCISE IN RE-REGULATION? What is ELCON? The Electricity Consumers Resource Council (ELCON) is the national association representing large industrial
More informationRules of the Road for KnowYourDrive
Rules of the Road for KnowYourDrive Welcome to KnowYourDrive Congratulations! You ve made a wise choice to drive safer and smarter with American Family s KnowYourDrive program, powered by Automatic. Helping
More informationState Clean Energy Actions January December 2014 Update
State Clean Energy Actions January December 2014 Update Sue Gander Energy, Environment & Transportation Division NGA Center for Best Practices April 16, 2015 Online database compiles clean energy activities
More informationComments of the U.S. HAV Data Access Coalition To the Subcommittee on Communications and Technology Of the House Committee on Energy and Commerce
Comments of the U.S. HAV Data Access Coalition To the Subcommittee on Communications and Technology Of the House Committee on Energy and Commerce Hearing on Protecting Consumer Proprietary Network Information
More information3 Questions. to Ask When Developing an Adaptive Security Awareness Program
3 Questions to Ask When Developing an Adaptive Security Awareness Program 3 Questions to Ask When Developing an Adaptive Security Awareness Program INTRODUCTION Most people working in or near cybersecurity
More information10 ways to raise your users cybersecurity IQ. By Alison DeNisco Rayome COPYRIGHT 2018 CBS INTERACTIVE INC. ALL RIGHTS RESERVED.
10 ways to raise your users cybersecurity IQ By Alison DeNisco Rayome INTRODUCTION Employees are a company s greatest asset, but also its greatest security risk. If we look at security breaches over the
More informationComments of the. Ad-Hoc HAV Data Access Coalition. To the. U.S. Department of Transportation. Pipeline and Hazardous Materials Safety Administration s
Comments of the Ad-Hoc HAV Data Access Coalition To the U.S. Department of Transportation Pipeline and Hazardous Materials Safety Administration s Request for Information on Regulatory Challenges to Safely
More informationTestimony of Julia Rege
Testimony of Julia Rege Director, Environment & Energy, Association of Global Automakers, Inc. at the Public Hearing for Reconsideration of the Final Determination of the Mid-term Evaluation of Greenhouse
More informationMEDIAPRO BEST PRACTICES SERIES: A Roadmap for Planning Your Awareness Program
MEDIAPRO BEST PRACTICES SERIES: A Roadmap for Planning Your Awareness Program MEDIAPRO BEST PRACTICES SERIES: A ROADMAP FOR PLANNING YOUR AWARENESS PROGRAM INTRODUCTION No journey should begin without
More informationBig Data - Its Impacts on Economies, Finance and Central Banking
November 1, 2017 Bank of Japan Big Data - Its Impacts on Economies, Finance and Central Banking Remarks at the Fourth FinTech Forum Hiroshi Nakaso Deputy Governor of the Bank of Japan (English translation
More informationUsing Natural Language Processing and Machine Learning to Forecast Legislative Outcomes
White Paper Using Natural Language Processing and Machine Learning to Forecast Legislative Outcomes 1 Thomas Circle, 8th Floor, Washington DC 20005 www.fiscalnote.com contact@fiscalnote.com 888.655.6082
More informationSKORR PRESS FAQ. Questions about the business strategy: 1) What is Skorr?
Questions about the business strategy: 1) What is Skorr? SKORR PRESS FAQ Skorr is a powerful new app to empower individuals to take control of their online presence. Skorr will measure, monitor and improve
More informationFAPT POSITION PAPER Advertising on School Buses January 2011
www.faptflorida.org FAPT POSITION PAPER Advertising on School Buses January 2011 Over the past few years, a number of states and local school districts have considered allowing the placement of advertisements
More informationWhite Paper. Small, Incremental Adjustments Make for Significant Gains
White Paper Small, Incremental Adjustments Make for Significant Gains Small, Incremental Adjustments Make for Significant Gains Author: Alun Bain simtrac Manager Monash University conducted a 12-week study
More informationMeasuring Cross-Device, The Methodology
Measuring Cross-Device, The Methodology As the first company to crack-the-code on cross-screen, Tapad Data Scientists are asked to explain the power of our cross-screen technology on a near-daily basis.
More informationHiroshi Nakaso: Big data its impacts on economies, finance and central banking
Hiroshi Nakaso: Big data its impacts on economies, finance and central banking Speech by Mr Hiroshi Nakaso, Deputy Governor of the Bank of Japan, at the Fourth FinTech Forum, Tokyo, 1 November 2017. Introduction:
More informationWhy is O2 doing car insurance?
Why is O2 doing car insurance? The reason, and the role of data Steve Wright Head of Product & Operations. O2 Drive Insuretech December 6 th 2016 A bit about O2 You probably know O2 as And we also do this
More informationFACE DOWN CYBERTHREATS WITH CDM INSIDE P2 CDM ROLLOUT PRESSURED BY INCREASING THREATS P3 WHAT S NEXT FOR CDM? P4 ALLIANT GWAC USED FOR SOME CDM NEEDS
ONLINE REPORT SPONSORED BY: FACE DOWN CYBERTHREATS WITH CDM INSIDE P2 CDM ROLLOUT PRESSURED BY INCREASING THREATS P3 WHAT S NEXT FOR CDM? P4 ALLIANT GWAC USED FOR SOME CDM NEEDS P5 PHASE 3 REQUIREMENTS
More informationNERC CIP Compliance - Questions the Board Should Ask. Paul J. Feldman and Shelley A. Longmuir
NERC CIP Compliance - Questions the Board Should Ask Paul J. Feldman and Shelley A. Longmuir A Board of Directors is charged with oversight of company activities. To accomplish that mission, the Board
More informationA Comparison of the Recent FTC and Commerce Department Data Privacy Frameworks
A Comparison of the Recent FTC and Commerce Department Data Privacy Frameworks By Lydia Parnes & Edward Holman As the IAPP enters its second decade, the privacy landscape in the U.S. is undergoing a major
More informationShow notes for today's conversation are available at the podcast website.
Information Compliance: A Growing Challenge for Business Leaders Transcript Part 1: Information Compliance Overload Julia Allen: Welcome to CERT's podcast series: Security for Business Leaders. The CERT
More informationBrowsing & Buying Behaviour 2016.
Browsing & Buying Behaviour 2016. Study: online consumer shopping behaviour revealed 1 United Kingdom: Q3 2016 Preface With UK ecommerce sales growing at an annual rate of 15%, according to the Centre
More informationmy Driving Discount program
my Driving Discount program CUSTOMER MOBILE APP Frequently Asked Questions for Alberta Brokers ENROLMENT AND DISCOUNT 1. How do I know if my customer is eligible for the program? Any driver that is a principal
More informationEB TechPaper. Connected cars and data economy. elektrobit.com
EB TechPaper Connected cars and data economy elektrobit.com 1 Data economy should be paramount in the development of products and solutions for the automotive market. The economic use of customer and vehicle
More informationPUTTING THE i IN CRM. Series 1: The Impact to the Sales Team. ebook
PUTTING THE i IN CRM Series 1: The Impact to the Sales Team. ebook Table of Contents Section I Empowering the Individual 3 Section II Management Benefits 6 of Individualized CRM Section III Expanding your
More informationBuild Secure Applications with Software Analysis
White Paper Build Secure Applications with Software Analysis Despite the fact that application security has become an increasingly major concern in recent years, many application development teams treat
More informationInsurance Accounting & Systems Association (IASA): NY/NJ Chapter Spring 2014
Insurance Accounting & Systems Association (IASA): NY/NJ Chapter Spring 2014 State of Information Security by Deloitte & Touche LLP May 20, 2014 As used in this document, Deloitte means Deloitte & Touche
More informationInc 5000 Agency 2016, 2015 and MARKETING HACKS FOR MULTI-LOCATION COMPANIES
Inc 5000 Agency 2016, 2015 and 2014 6 MARKETING HACKS FOR MULTI-LOCATION COMPANIES 1 While admittedly the term marketing hack has been overused in recent years, the practice and premise behind the term
More informationCUSTOMIZATION: A B LESSING O R A C URSE?
March 2016 CUSTOMIZATION: A B LESSING O R A C URSE? REMOVING T HE B ARRIERS T O I NNOVATION A ND C HANGE Data Source In this report, Mint Jutras references data collected from its 2016 Enterprise Solution
More informationWHY YOUR INFLUENCER CAMPAIGN IS FAILING
WHY YOUR INFLUENCER CAMPAIGN IS FAILING INTRO Have you implemented an influencer campaign that just didn t quite work? Did you find yourself asking What went wrong? You re not alone. With influencer marketing
More informationENERGY POLICY ACT OF (Senate - June 28, 2005) [Page: S7458]
ENERGY POLICY ACT OF 2005 -- (Senate - June 28, 2005) [Page: S7458] Mr. OBAMA. Mr. President, during the 2 weeks or so that we have been debating this Energy bill in the Senate, the price of crude oil
More informationBriefing on Investigatory Powers Bill Prepared for the Public Bill Committee March 2016
Briefing on Investigatory Powers Bill Prepared for the Public Bill Committee March 2016 Talal Rajab Programme Manager 020 7331 2189 talal.rajab@techuk.org Antony Walker Deputy CEO 07780 603 065 antony.walker@techuk.org
More informationJanuary Top 10 questions for compensation committees in 2018
January 2018 Top 10 questions for compensation committees in 2018 Compensation committees don t turn on a dime; they have to be prepared to satisfy legal and regulatory changes as well as expectations
More informationThe Truth about Cyber Risk Metrics
SESSION ID: CXO-R02 The Truth about Cyber Risk Metrics Connecting Vulnerabilities to Economics Scott Borg U.S. Cyber Consequences Unit "You can t always get what you want. But if you try sometimes you
More informationAgriculture Investment Data Needs: NGOs
Agriculture Investment Data Needs: NGOs Background The Initiative for Open Ag Funding 1 works to support efforts to end hunger and food insecurity by ensuring organizations have the information they need
More informationHow do you make money in a sustainable energy environment? Where are the opportunities for energy growth [by location]?
Panel Session Notes Session II: Energy Moderator: Dr. Jennifer Curtis Panelists: Dr. Gary Peter, Patrick Sheehan, And Dr. Samuel Baldwin Notes: Roberto Ruiz and Emotion Silvestri Dr. Curtis begins by opening
More informationPROACTIVE ADOPTER SERIES: Embracing foundational benefits of IT security
PROACTIVE ADOPTER SERIES: Embracing foundational benefits of IT security In a world where small and midsize businesses (SMBs) are constantly looking for ways to costeffectively increase productivity and
More informationResearch: A Strong Privacy Policy Can Save Your Company Millions
SECURITY & PRIVACY Research: A Strong Privacy Policy Can Save Your Company Millions by Kelly D. Martin, Abhishek Borah, and Robert W. Palmatier FEBRUARY 15, 2018 OSMAN RANA/HAYON THAPALIYA/UNSPLASH Page
More informationMatt Loeb ISACA CEO. September 17, WCARS
Matt Loeb ISACA CEO September 17, 2016 37WCARS Agenda A Disruptive and Changing World Impact on Auditors Implications for the Future Workforce A Disrupted World Digital disruption is already here World
More informationRedtail Actively Addresses the Challenge of CRM User Adoption
Reprint from August 2013 Redtail Actively Addresses the Challenge of CRM User Adoption By Paul Cantrell, Redtail If your office has implemented a CRM tool, or if you are considering doing so, you should
More informationTHE MOBILE TSUNAMI THREATENS THE COMPETITIVE POSITIONING OF THE ENTERPRISE
THE MOBILE TSUNAMI THREATENS THE COMPETITIVE POSITIONING OF THE ENTERPRISE Abstract: This white paper zooms in on the threat of increasing costs of app-development faced by Enterprises and offers a vision
More informationDriven by Smart Data. The automotive industry and the cloud.
Driven by Smart Data The automotive industry and the cloud. Cloud survey report: Industry experts explore the current and planned cloud adoption strategies of senior IT professionals. Researched by 2 Introduction.
More informationTHE VALUE OF TIME NO BETTER INVESTMENT FOR YOUR SERVICE DEPARTMENT BY JIM LEMAN. $300,000 and upward of $300,000 for Parts inventory.
FEATURE JANUARY / FEBRUARY 2017 FIXED OPS MAGAZINE THE VALUE OF TIME NO BETTER INVESTMENT FOR YOUR SERVICE DEPARTMENT BY JIM LEMAN Modern digital and mobile equipment and tools make today s Service Department
More informationDigital Transformation in Financial Services
The IT Innovator s Guide to Digital Transformation in Financial Services 2018 Introduction The Financial Services Industry: A Snapshot Technologies Necessary for Digital Transformation Building the Infrastructure
More informationIMPLEMENTING CHANGE IN A COMPLEX WORLD. Responding to complexity in socio- economic systems: How to build a smart and resilient society?
IMPLEMENTING CHANGE IN A COMPLEX WORLD Dirk Helbing, Computational Social Science @ ETH Zurich, Switzerland Responding to complexity in socio- economic systems: How to build a smart and resilient society?
More informationManaging Sanctions Compliance in a Global Economy
Managing Sanctions Compliance in a Global Economy PART 1: DEPLOYING REAL-TIME WATCH LIST SCREENING Competing in today s multifaceted, global economy is a high-stakes game of risk and reward. Regardless
More informationPERFORMANCE-BASED REGULATION
PERFORMANCE-BASED REGULATION Aligning utility incentives with policy objectives and customer benefits A 21 st Century Electricity System Issue Brief By Advanced Energy Economy September 2017 San Francisco
More informationTop 5 Must Do IT Audits
Top 5 Must Do IT Audits Mike Fabrizius, Sharp HealthCare, VP, Internal Audit DJ Wilkins, KPMG, Partner, IT Advisory 2011 AHIA Annual Conference www.ahia.org Background on Sharp HealthCare Sharp s Co-sourcing
More informationTen Components for a Successful Safety Program
Ten Components for a Successful Safety Program One of the things I enjoy most about being a safety consultant is that every day brings forth new and dynamic adventures. Today I could be teaching employees
More informationUnderstanding the Impact of the Analysis Exchange Model 1.0
Understanding the Impact of the Analysis Exchange Model 1.0 Approved for Public Release; Distribution Unlimited. Case Number 17-3990. 2017 The MITRE Corporation. ALL RIGHTS RESERVED. Government agencies
More informationDigital transformation in the automotive industry
IBM Institute for Business Value Digital transformation in the automotive industry Creating new business models where digital meets physical Overview Individuals and businesses alike are embracing the
More informationRecords Management Perspectives:
Records Management Perspectives: Unprepared, unaware, unmoved. Why companies must wake up to the challenges of the EU General Data Protection Regulation The power of memory www.crownrms.com The business
More informationThe DealerRater Guide to Online Reviews: LEVERAGING REVIEWS FOR A COMPETITIVE EDGE
The DealerRater Guide to Online Reviews: LEVERAGING REVIEWS FOR A COMPETITIVE EDGE EXECUTIVE SUMMARY Online reviews are the new word of mouth. A positive online review of your dealership causes a ripple
More informationSMART-TRANSPORTATION DIVISION BEFORE THE U.S.DEPARTMENT OF TRANSPORTATION FEDERAL RAILROAD ADMINISTRATION FRA
SMART-TRANSPORTATION DIVISION BEFORE THE U.S.DEPARTMENT OF TRANSPORTATION FEDERAL RAILROAD ADMINISTRATION FRA 2018-0027 May 7, 2018 These comments are on behalf of the Transportation Division of the International
More informationA You can use m-tickets on Arriva bus services throughout the UK, except for Park and Ride buses, and Transport for London services.
Arriva m-ticket app FAQs v.1.26 4 January 2017 Q - Where can I use m-ticket? A You can use m-tickets on Arriva bus services throughout the UK, except for Park and Ride buses, and Transport for London services.
More informationMarijuana on the Blockchain:
Marijuana on the Blockchain: Stability through Proof of Stake 01.30.2018 GanjaCoin (MRJA) 1 Abstract 2 Overview 4 Unique Value Proposition 4 Token Information 4 Proof of Work and Proof of Stake 5 Problems
More informationAmazon s Approach to Privacy
Statement of Andrew DeVore Vice President and Associate General Counsel Amazon.com, Inc. before the United States Senate Committee on Commerce, Science, and Transportation September 26, 2018 Thank you,
More informationMicrosoft Azure: CSP SCE and Pay As You Go Customer Behavior Analysis
Microsoft Azure: CSP SCE and Pay As You Go Customer Behavior Analysis Patrick O Leary Microsoft Practice Leader, Softchoice Patrick.Oleary@softchoice.com +1 610-914-5265 Connect with us today. 1.800.268.7638
More informationTelecommunications (Interception and Access) Amendment (Data Retention) Bill 2014 SUPPLEMENTARY SUBMISSION
http://www.privacy.org.au Secretary@privacy.org.au http://www.privacy.org.au/about/contacts.html 31 January 2015 Committee Secretary Parliamentary Joint Committee on Intelligence and Security PO Box 6021
More informationThe Risks and Consequences of Poor App Quality
The Risks and Consequences of Poor App Quality From user abandonment to lost revenue to damaged brands, a poor quality app can cost your company big time White Paper January 2014 100 Pennsylvania Ave.
More informationNEW TECHNOLOGIES TO OPTIMIZE PARKING AVAILABILITY, SAFETY AND REVENUE
NEW TECHNOLOGIES TO OPTIMIZE PARKING AVAILABILITY, SAFETY AND REVENUE AllTrafficSolutions.com 2 New Technologies to Optimize Parking Availability, Safety and Revenue CONTENTS Introduction Parking Technology:
More information5 TIPS TO BUILD TRUST WITH THE DIGITAL CAR SHOPPER
5 TIPS TO BUILD TRUST WITH THE DIGITAL CAR SHOPPER Today s auto shoppers rely on the Internet to gather information, compare prices and communicate with dealers. Accustomed to using sites like TripAdvisor
More informationThe golden rulebook. Ensuring compliance and data security in a complex and risky world
The golden rulebook Ensuring compliance and data security in a complex and risky world Extract from technology, media, telecommunication report Building tomorrow s billion dollar businesses Ensuring compliance
More informationAchieving i total t retail
www.pwc.com Achieving i total t retail Consumer expectations driving the next retail business model January, 2014 Jeff Holmes PwC Retail & Consumer Managing Director Contents Hypothetical case study discussion
More informationRichard R. Yuse, RTSC President NDIA / 24 th Annual National Logistics Conference & Exhibition. March 11, Good morning, everybody.
Richard R. Yuse, RTSC President NDIA / 24 th Annual National Logistics Conference & Exhibition March 11, 2008 Good morning, everybody. I would like to start by saying that it is a privilege for me to be
More informationThe 2014 Global Innovation Automotive industry findings
The 2014 Global Innovation 1000 Automotive industry findings Automotive industry findings From the ground level, three powerful forces are roiling the auto industry: shifts in consumer demand, expanded
More informationMOBILITY MODELS: DEVELOPING YOUR FLEET S CONNECTED STRATEGY MOBILITY MODELS: DEVELOPING YOUR FLEET S CONNECTED STRATEGY
MOBILITY MODELS: DEVELOPING YOUR FLEET S CONNECTED STRATEGY Introduction On-road communications have always been vital to the success of the transportation industry. But in today s advancing technological
More informationA N A L Y S T M E E T. Amitabh Chaudhry - Session I
Infosys Technologies Limited 2 0 0 7 A N A L Y S T M E E T July 30, 2007, Monday, Bangalore - Session I Very quickly our revenue profile as you can see we did $43 million dollars in financial year of 2005
More informationGOOD FIRST IMPRESSIONS ARE ROCKET FUEL FOR SMALL BUSINESS GROWTH 6 STEPS TO MAKE YOUR INTRODUCTION MEANINGFUL
GOOD FIRST IMPRESSIONS ARE ROCKET FUEL FOR SMALL BUSINESS GROWTH 6 STEPS TO MAKE YOUR INTRODUCTION MEANINGFUL step 1 CREATE A SINCERE RELATIONSHIP FROM THE START. Success with first impressions in business
More informationUNDERSTANDING CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)
ONLINE REPORT SPONSORED BY: CONTRACT GUIDE UNDERSTANDING CONTINUOUS DIAGNOSTICS & MITIGATION (CDM) INSIDE 2 3 4 5 6 WHAT IS CDM AND WHY DO YOU NEED IT? CDM COULD BE A GAME-CHANGER HOW DOES CDM WORK? WITH
More informationEnvironment America, The Natural Resources Defense Council, Sierra Club, & Union of Concerned Scientists
TO: FROM: RE: Environment America, The Natural Resources Defense Council, Sierra Club, & Union of Concerned Scientists The Mellman Group, Inc. Voters Overwhelmingly Support Stricter Fuel Efficiency Standards
More information8 Benefits of Network Marketing & Communicating Them
8 Benefits of Network Marketing & Communicating Them If you ve been in the network marketing profession for any length of time you already know the importance of leadership. It drives momentum, customer
More informationGDPR in SAP. June, Igor Gregurec
GDPR in SAP June, 2017 Igor Gregurec Agenda GDPR rules GDPR compliance approach Example SAP solutions for GDPR compliance Lifecycle of personal data Fines and trends 2 The New EU Data Protection Rules
More information1 W H I T E P A P E R
W H I T E P A P E R 1 2 DISCLAIMER This white paper shall not and cannot be considered as an invitation to enter into an investment. It does not constitute or relate in any way nor should it be considered
More informationIT S TIME TO RETHINK VDI:
IT S TIME TO RETHINK VDI: TOP 5 REASONS TO CONSIDER A SECURE REMOTE BROWSER The number of empty office desks is on the rise, as a growing number of employees work remotely and/or use their own devices.
More informationCreating a safety culture:
Today, it s commonplace for companies to check the motor vehicle records (MVRs) of their drivers once a year. That s considered due diligence. White paper Creating a safety culture: Moving from policies
More informationKey Financial Industry Issues Impacting the Access and Security of Customer Data
Key Financial Industry Issues Impacting the Access and Security of Customer Data The financial industry is facing technology challenges related to the access and security of customer data, fueled by key
More informationFORTUNE FAVORS THE BRAVE EMPOWERING THE BACK OFFICE INSIGHT REPORT
FORTUNE FAVORS THE BRAVE EMPOWERING THE BACK OFFICE INSIGHT REPORT Contents Technology in the back office Regulation Tech trends The future of the back office Conclusions Technology in the back office
More informationBanking in the Balance: Security vs. Convenience. IBM Trusteer s Valerie Bradford on How to Assess Digital Identities
Banking in the Balance: Security vs. Convenience IBM Trusteer s Valerie Bradford on How to Assess Digital Identities In an interview about overcoming these challenges, Bradford discusses: The fundamental
More informationWHY DO I NEED CRM? Answers to frequently asked customer relationship management questions.
WHY DO I NEED CRM? Answers to frequently asked customer relationship management questions. INTRODUCTION In a 2015 survey conducted by Salesforce, more than half of small business owners said their companies
More informationFEEDBACK FORM. 1. Are high merchant fees a competitiveness issue for the EU economy?
FEEDBACK FORM Name of undertaking: The Nuance Group AG Industry (network, current/potential acquirer, current/potential issuer, processor, other third party provider (e.g. merchant service provider), merchant
More informationPromotion Suite. Reach and engage today s shoppers on their terms, and deliver impactful promotions that build brand, loyalty and margin.
Promotion Suite Reach and engage today s shoppers on their terms, and deliver impactful promotions that build brand, loyalty and margin. Learn to Speak Customer. Technology-enabled and well connected,
More informationREQUEST FOR AUTHORIZATION TO CONTRACT WITH AMAZON DIGITAL SERVICES TO PROVIDE AN E-BOOK STOREFRONT
REQUEST FOR AUTHORIZATION TO CONTRACT WITH AMAZON DIGITAL SERVICES TO PROVIDE AN E-BOOK STOREFRONT Estimated Annual / Total Contract Amount Funding Source Contract Term Options Option Amount Procurement
More informationAuctions Quick-Start Guide
Auctions Quick-Start Guide Provided by AutoTec 01 Today, buyers rely on more auction locations than ever before. And with the growing popularity of social media and smartphones, we believe there s a tremendous
More information