IT Governance, Risk, and Compliance:

June, 2009

1

June 29, 2009  6:52 PM

Trans-border Communication Protection – Part II

Robert Davis Robert Davis Profile: Robert Davis

SSL is a protocol suite enabling in transit security through data encryption, server authentication, and message integrity at four Open Systems Interconnection (OSI) reference model layers. For Internet communications, SSL is normally utilized in conjunction with an entity's

June 25, 2009  7:43 PM

Trans-border Communication Protection – Part I

Robert Davis Robert Davis Profile: Robert Davis

Legal compliance with local, national and regional privacy requirements is complex and dynamic. Every problem on the local level compounds exponentially when private data is shared across multiple...


June 22, 2009  8:41 PM

Application Protection – Part IV

Robert Davis Robert Davis Profile: Robert Davis

The FCPA impacts IT control requirements of U.S. publicly held enterprises. Section 78m (b), in particular, documents the legislative rules and compliance requirements of internal control evaluation reporting with regard to management's assessment of internal controls. Section 78m (b) (2) through...


June 19, 2009  1:09 PM

Application Protection – Part III

Robert Davis Robert Davis Profile: Robert Davis

FCPA control measures for an adequate system of internal accounting controls include maintaining appropriate segregation of duties, allowing only authorized transaction execution, controlling access to assets, and reconciling documented assets to actual assets regularly. Completeness, accuracy,...


June 16, 2009  7:06 PM

Application Protection – Part II

Robert Davis Robert Davis Profile: Robert Davis

The FCPA codifies bribery of foreign officials as a criminal offense for U.S. publicly held companies, requires accurate financial-transactions accounting, and amends the Securities Exchange Act of 1934....


June 12, 2009  6:36 PM

Application Protection – Part I

Robert Davis Robert Davis Profile: Robert Davis

Legacy law or regulation replacement is a common occurrence within most governments when circumstances appear to discredit legal mandate enforcement. However, the U.S. Sarbanes-Oxley Act (SOX) of 2002...


June 9, 2009  9:33 PM

Digital Rights Management – Part IV

Robert Davis Robert Davis Profile: Robert Davis

IPR protection requirements shape complex and challenging management issues. Audio and visual material protection is especially problematic due to the existence of the various known vulnerabilities, and...


June 5, 2009  8:40 PM

Digital Rights Management – Part III

Robert Davis Robert Davis Profile: Robert Davis

DRM software is generally considered an access control technology deployed to limit unauthorized usage. However, arguably, a technology cannot in principle, know what legal restrictions and rights apply in...


June 2, 2009  3:44 PM

Digital Rights Management – Part II

Robert Davis Robert Davis Profile: Robert Davis

Intellectual property protection has ushered in an era of technological solutions that attempt to prevent asserted rights infringement. Digital Rights Management (DRM) can be considered a response to legal requirements which criminalize the...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: