Nicole Say Kaitlyn Jones Justin Berry Section 1, Group 3.

Slides:



Advertisements
Similar presentations
Security+ All-In-One Edition Chapter 17 – Risk Management
Advertisements

© Pearson Prentice Hall 2009
Security Vulnerabilities and Conflicts of Interest in the Provider-Clearinghouse*-Payer Model Andy Podgurski and Bret Kiraly EECS Department & Sharona.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
The New Rules of F&I with Peter Jones The New Rules of F&I What are the Rules? Red Flag Rule Graham / Leach / Bliley Act Privacy Notice Safeguard Rule.
Governance of Privacy & Security: Balancing Compliance & Risks CSO Breakfast Club DC Chapter September 30, 2008 Jody R. Westby, Esq. CEO, Global Cyber.
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
The costs and benefits related to cyber security breaches Chapter 3 – Gordon & Loeb.
1 INTERNAL CONTROLS A PRACTICAL GUIDE TO HELP ENSURE FINANCIAL INTEGRITY.
Chapter 17 Controls and Security Measures
WELCOME Annual Meeting & Compliance Seminar. Code of Conduct - Impact on Corporate Culture by Andy Greenstein Knight Capital Group, Inc.
Chapter Extension 20 Outsourcing © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Computer Security and Liability Roxana Hernandez-Pastrana Ryan Herring Jinghua Luo Kevin Mack Shahram Rezaei Dec. 6, 2005.
IT Outsourcing Management
MIS 648 Lecture 131 MIS 648 Presentation Notes: Lecture 13 Managing IT Offshoring: Is it a good thing?
OUTSOURCING INFORMATION TECHNOLOGY BY AMANDA MORNEAULT ELVIS NORIEGA DANIEL MORALES 04/16/2007.
Corporate Ethics Compliance *
Marketing Essentials Section 3.1 Capitalism
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Workshop title: Risky Business: Working with Agents, Contracts & Other Third Parties Name: Adam Turteltaub Organisation: Society of Corporate Compliance.
Nicholas Beckworth Annie Billings Steven Blair Nimmida Kulwattanasopon Thomas Wootten.
OutsourcingOutsourcing. Is it Coming Back In September, financial services giant, JPMorgan Chase canceled the remaining portion of an outsourcing agreement.
MIS 262 – Velianitis Phil Devereux and James Pratt.
2014 IT Salary Survey: Security Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
Protecting Intellectual Property (IP) Evan Kuenzli Grant Miller.
Intrusion Detection MIS ALTER 0A234 Lecture 11.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
Social Media Jeevan Kaur, Michael Mai, Jing Jiang.
Software Development Outsourcing Oleg Gokhman. Definition Outsource Date: 1979 : to procure (as some goods or services needed by a business or organization)
Intro to Business CHAPTER TWO The New Ethical Environment.
The Free Enterprise System
Chapter 11 Information Systems Management. Q1:What are the responsibilities of the IS department? Q2:How is the IS department organized? Q3: What are.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
CS 110: Introduction to Computer Science Frequently asked questions about a CS major and CS career.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Close to Home An inquiry into older people and human rights in home care.
 The Free Enterprise System.  Traits of Private Enterprise.
World Intellectual Property Organization DCPPS 1 presented by Mr. Vladimir Yossifov WIPO NATIONAL WORKSHOP ON INNOVATION SUPPORT SERVICES AND THEIR MANAGEMENT.
Unit 1, Lesson 2 Globalization of Production and Markets AOF Business in a Global Economy Copyright © 2009–2012 National Academy Foundation. All rights.
Tim Walden Section: 004 NO!  Consumers have no legal alternative over defective software they buy off the shelf because of restrictions on liabilities.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
INTERNAL CONTROLS What are they? Why should I care?
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
A Strategically-Aligned Organizational Culture is the best Enabler of your strategy Culture: shared values and norms. Rules: Formal directives (SOPs).
Chapter 1 You and the World of WorkSucceeding in the World of Work The Changing Workplace 1.2 SECTION OPENER / CLOSER INSERT BOOK COVER ART Section 1.2.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
THE CHALLENGES OF GLOBALIZATION Today, the lowering of trade barriers by the World Trade Organization, accompanied by improvements in communications and.
IT Security CS5493(74293). IT Security Q: Why do you need security? A: To protect assets.
Chapter 11 Implementing Social Commerce Systems. Learning Objectives 1.Describe the major issues in the social commerce implementation landscape. 2.Discuss.
Copyright 2004, Juan I. Sanchez, Ph.D., All Rights Reserved 1 OUTSOURCING HR Summary of Mary F. Cook’s chapters 1 & 2 Why outsourcing? Why now? 1.Better.
Your Cyber Security: The scope of your risk is broad and growing To understand the nature of the risk landscape look at the presentations here today-begin.
Security Outsourcing Melissa Karolewski. Overview Introduction Definitions Offshoring MSSP Outsourcing Advice Vendors MSSPs Benefits & Risks Security.
From Lemons to Lemonade: Technical Writing Outsourcing as a Dream Come True Barry Saiff Founder and CEO, Saiff Solutions, Inc. Tagaytay City, Philippines.
The Privacy Symposium: Transferring Risk of a Privacy Event Paul Paray & Scott Ernst August 20, 2008.
April 19, IT Outsourcing overview and training cases.
Understanding Savings and Investing Economics – Chapter 16.
Risk or Reward Internal Threat External Threat.
Globalization Unit 5.
Sourcing in Developing Countries – Issues and Opportunities
Service Organization Control (SOC)
Privacy and Security in the Employment Relationship
The Changing Workplace
Information Security based on International Standard ISO 27001
Call Center Worker and Consumer Protection Act
Chapter 8 Developing an Effective Ethics Program
Lesson 1: Introduction to HIPAA
Application Outsourcing
Presentation transcript:

Nicole Say Kaitlyn Jones Justin Berry Section 1, Group 3

 As defined by the Information Technology Association of America, IT is… “the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware”

 A practice used by companies to reduce costs by transferring portions of work to outside suppliers rather than completing it internally.  Outsourcing in IT drastically increased around the time of Y2K because so many companies hired IT workers in foreign countries to de-bug their computer systems

 1) Offshore outsourcing is costing U.S. jobs.  2) There's a stigma to offshore outsourcing.  3) The cost benefits of outsourcing are overstated.  4) It's a buyer's market for IT workers right now anyway.

 5) There are huge cultural barriers.  6) What about the other risks of outsourcing (ie Expense of initial migration, fear of losing control, intellectual property issues)?  7) The ROI of outsourcing hasn't been proved.

 We felt that the average person does not truly understand what IT is about yet they may have some preconceived notions and know some buzzwords that the news media have focused on  Reputable Author

 Author of “Seven Myths about IT Outsourcing”  Serves as the CEO for Envision Financial Systems located in Tustin, CA  Founded by Mr. Gambhir in 1994, Envision Financial Systems has rose to become a leading provider of software systems for the financial industry  Envision was listed in 2005 and 2006 on the Software 500, a list comprised of the world’s most foremost software and service providers

ABC News "India Rising"

 All 3 of our other articles dealt with the security risks a company takes when outsourcing their IT.  We choose articles from a variety of sources in order to limit the amount of bias our information may be subjected to.

 Ivy Schmerken – Editor at large for Wall Street and Technology, a monthly publication that reaches over 21,000 businesses and IT executives.  Ariel Coro – A certified security engineer and President of The Aptive Group, a leading information security and compliance firm.  Chandradeo Bokhoree – Senior lecturer at the University of Technology, Mauritius.

 1) Personal, private data being sold or seen by unapproved personnel.  2) Hidden code written deep within a software program that opens a back door to a hacker or allows the program to do something it was never intended to do.  3) Other countries may not have the same privacy protection laws as the U.S. so if a security breach were to happen, a company may not be able to prosecute or sue for damages.

 1) Get Your House in Order  2) Choose Vendors Carefully  3) Principle of Least Usage  4) Understand the Privacy and Intellectual Property Mindset  5) Use Protection

 6) Monitor Traffic  7) Provide Education  8) Conduct Security Audits  9) Review Prevention Technologies

CBS News Video – Military Software Security

 While none of you may be MIS majors and have a direct future in IT, outsourcing of IT impacts many areas of a business outside of just the IT Department  Financial managers have to decide whether the reward of outsourcing outweighs the potential risks and if a company does decide to outsource, it is essential for you to know the proper steps to protect your company and your career