Monday, April 1, 2013

Establish Security Guidelines

Security can be complex. It deals with user access to systems, data storage, Internet access, email retention, and many other operational processes. Yet, to a large extent, security for your call center work will be dependent on the network and operating systems established by your outsourcer. Hence, the need for guidelines.

Guidelines should define the topics used in a basic checklist. The checklist should define physical and technical safeguards that protect the confidentiality, integrity, and availability of the electronic information that the outsourcer creates, receives, maintains, and transmits on behalf of your company from any anticipated threats, hazards, or improper access or use.

Guidelines need to reflect your own security goals and, likewise, used to evaluate the security of any prospective outsourcer. Keep in mind that you are already obligated to protect the confidentiality and integrity of your customers. Your outsourcer should honor the same commitment. Not providing guidelines may inadvertently violate contracts, expose confidential data, reduce market credibility, or result in government imposed penalties.

Security goals may vary, but at a minimum, your guidelines should incorporate policies to maintain the confidentiality of data, protection of data being modified by unauthorized sources, levels of access for applications and associated data, and accountability to verify compliance with security policies.

Outline enforceable security requirements in any contractual or other form of agreement. Remember these requirements have a lifecycle through which policies will be generated, applied, audited, and revised.

Validate your outsourcer has a Chief Security Officer (CSO), or equivalent executive, that oversees security across their organization and periodically report on all aspects of security at his site.

Ensure your outsourcer has an organizational hierarchy that identifies who will have access to sensitive data or critical applications. Be sure you have established your own internal process for classifying data, and appropriate levels of security for each data class.

While your prospective outsourcer may independently submit the details of their security department in an RFP or other due diligence request, you should establish the security guidelines you expect to be followed. After all, it is your business.

As an example of what happens when guidelines are not enforced, consider the breach that Sony experienced between April 17 and April 19, 2011. After the breach, Sony informed the public that the names, addresses, and credit card numbers of 77 million of its users had been compromised.

Reuters later reported that Michael Pachter, Wedbush Securities Analyst, said "Sony probably did not pay enough attention to security when it was developing the software that runs its network. In the rush to get out innovative new products, security can sometimes take a back seat."

Guidelines need to define the process of any new technologies, products, or data uses and identify the potential security impact, whether recommended by you or your outsourcer. Guidelines should also include the process for your outsourcer to respond to security "alerts" released by software vendors.

When security breaches are discovered, guidelines should set forth penalties and the procedures to correct the breach as promptly as possible. Guidelines should stipulate an incident recovery/back-up plan, including backup software and a secondary site to maintain data, in case of any breaches in your information security systems. The guidelines should also mandate a process to eradicate data from equipment prior to disposal.

For the desktop, guidelines should mandate the use of virus protection programs and the regular updates of virus and software patches. When guidelines are not followed, you will need to identify how to handle and resolve disputes. Thus, your guidelines need to include a plan for resolution of disputes arising out of security breaches or alleged misuse of customer identifiable information.

(c) 2011 Geoffrey Best.

The Different Ways of Beetles

In their search for food and a safe place in which to lay their eggs, some beetles have acquired strange ways of life. Some live in ants' and termites' nests, and even look like them. Some, living in caves or under huge boulders embedded in the earth, have lost their eyes. Others can no longer fly, and have their outer wings joined together. There are beetles that live between the tides on the seashore, and are underwater whenever the tide comes in.

There are beetles that are found only in museums, eating the stuffed specimens; or in hides and furs, or even in the corks of poison bottles. The young of one kind is protected by ants, which it rewards by producing a drop of sweet liquid. This is the aphid. Beetles have many enemies-other insects, including flies, bees and wasps, birds and mammals, fish and reptiles, and human beings. For protection, apart from their hard shells, some beetles are colored so that they look like moss or dead twigs.

Weevils pretend to be dead when touched, and drop to the ground, where they lie still with legs folded, looking like a seed or a grain of soil. The bombardier beetle gives off a puff of blistering smoke at its tail end, like a miniature explosion, when it is disturbed. Other beetles emit an unpleasant smell. The wasp beetle deceives its enemies by looking like a wasp. The flea beetle leaps away out of danger, ground beetles run or burrow, and tiger beetles run or fly away. Some beetles can make a noise, squeaking by rubbing different parts of their bodies together, as the longicorn beetles do, or by grinding their teeth, as cockchafer grubs do. They may do this as a warning to other beetles, or to attract their mates. Fireflies ("lightning bugs") attract their mates by flashing their lights on and off; certain tropical kinds even have a special light that they turn on when landing on a leaf!

Colorectal Cancer Facts - This is a Preventable Disease

Do you know what the second leading cause of cancer death in the U.S. is?  Colorectal cancer - which is a very preventable disease.  Many people are not aware that screenings for this disease could save thousands of lives each year.  Unfortunately, these tests are not used as often as they could be.

It is thought that colorectal cancers take many years to develop, usually starting as a pre-cancerous polyp in the color or rectum.  Because they tend to take such a long time to develop, there is time to detect the growths and remove them before they become troublesome.  This is why colorectal cancer is a very preventable disease.

Steps To Take - Early Detection

As with all cancers, early detection is the key to survival.  The earlier you can detect a cancer, the better your chances of survival.  Colorectal cancer screenings can find most polyps before they become cancerous.  Removing the growths actually prevents cancer from occurring.  You can prevent this cancer or detect it early enough to remove it by using one of these procedures:

A Fecal Occult Blood Test (FOBT) is a very simple procedure that you can do at your home.  This procedure checks for hidden blood in the stool sample which can be a sign of cancer or polyps or some other disorder.

A Sigmoidoscopy allows doctors to see about one third of the entire length of the colon.  A small, flexible, hollow, lighted tube is used to detect cancer or polyps inside the rectum and lower colon.

A Colonoscopy is similar to a sigmoidoscopy, except it allows doctors to see along the entire length of the colon.

A double-contrast barium enema is an x-ray procedure that allows the doctor to see the entire colon.

Symptoms and Risk Factors

If you have symptoms such as persistent stomach cramps, rectal bleeding or sudden change in bowel habits - see your doctor very soon.  Risk factors for colorectal cancer are higher for people who have already had colorectal cancer or polyps, or for those who have inflammatory bowel disease like an ulcerative colitis.  Also, those who have a close blood relative who has had colorectal cancer or polyps.  If you have these risk factors, you may need to have the screening tests done more frequently.  Please visit with your doctor about your potential risk factors.

If doctors discover a polyp or other abnormality, then they will take a small tissue sample for examination.  If cancer is found, then surgery is often the next step.  Sometimes surgery will be combined with radiation therapy and chemotherapy was one of the most effective treatment methods.

Summary

Almost all colorectal cancers start as a polyp that grows into a cancerous tumor.  When polyps are discovered in the early stages (before they become cancerous), they can be surgically removed before cancer develops.  Because colorectal cancer usually takes such a long time to develop, it is considered a preventable cancer.  The key to success is early detection.  Also, eating a good low fat diet with an emphasis on fresh fruits and vegetables may also help to lower your risk of colorectal cancer.

Early detection is the key to winning the battle against all cancers - especially colorectal cancer.  Visit with your doctor and plan to have regular screenings.

Whistle Blowing

A person who informs on someone engaged in an illicit activity is considered as a whistle blower. The concept of whistle blowing can be found in visible situations as well as unnoticed ones. Their job is to report a violation of law, rule, regulation and/or a direct threat to public interest, such as fraud, health/safety violations, corruption, and plenty of others. These whistle blowers are not always in favorable situations, and things could be worst if they are not supported by the managers. People are criticized and disliked for it, which makes it a tough job.

Whistle blowing is present in positive as well as in discouraging situations. In an organization when an employee seeks to claim, revealing of inappropriate act and bringing it in front of their managers, could be taken as whistle blowing in positive conditions. But in a situation where an employee leek out information to the general public or to the competitors, this act can be taken as negative whistle blowing in terms of the company.

When a person usually blows the whistle, it's normally not a direct attack towards a person, rather it is simply that the illegal or unethical actions of that person to be stopped. All the employees are suppose to work as a team and no body would like to be seen as the person who turns their back on them. The person has to make a very strict and uncompromising choice to make, keeping in consideration that the loyalty to their fellow colleagues as well as towards the company. I personally favor the whistle blowers as it is one act which could help save a thousand.

People usually consider it as "back biting" or "tattle-tale-ing", however that is how plenty of jobs, our environment, the reputation of the company, or in some cases even lives. They don't realize that it is ethically and morally, actually their job towards the company, people and money. For example if someone is stealing from the company and the action not accounted could result in a loss of money to the company, and further proceeding could even result in removal of jobs. Whistle blowing has many positive effects, and if carefully considered it can lead to the end of unethical practices in business. It is a method of informing the concerned authorities before it's too late and lead to a disaster. Whistle blowing can be negative to some, but it is a needed action for today. A controversial factor could be that it makes people decide between right and wrong. And the easy way would be to stay out of it and let someone else take notice, but the right way would be to go forward and stop it.

How Domestic Violence Allegations Can Affect Child Custody

It is indisputable that many lives across the country are torn apart by domestic violence. Domestic violence has a terrible and lasting impact on every life it touches, whether the affected person is a witness or victim of the abuse. In the past, domestic violence often was treated as a private matter to be handled discreetly within the family. However, society's willingness to overlook abuse in the home has changed. With the change in societal attitude have come corresponding changes in the law.

The unfortunate consequence of passing tougher laws to protect victims of domestic violence has been a willingness among some people to take advantage of these laws and use them for their own gain. This has been particularly true in cases of divorce and child custody disputes.

Factors Affecting Child Custody in Illinois

In Illinois, the court will base its custody decision on the best interests of the child. Thus, the court will review the individual circumstances of the parents and child and determine what living and visitation arrangement will best meet and further the child's, rather than the parents', interests.

Although Illinois family courts have the authority to consider any relevant factor in determining what is in the best interests of the child, they generally look at the following eight factors before making a custody decision:

What are the parents' wishes What are the child's wishes What type of interactions and relationships does the child have with each parent, any siblings or other family members How well adjusted is the child to his or her home, school and community How is the mental and physical health of each parent and the child Has there been any physical violence or the potential for violence in the home, whether the violence was directed at the child or another person Are both parents willing and able to facilitate and encourage an ongoing relationship between the child and the other parent or is there animosity between the parents Have there been any occurrences of ongoing abuse, whether directed at the child or another person

There is a presumption that it is in the child's best interests to maintain as much contact and interaction as possible with both parents. However, this presumption is abandoned in cases where claims of domestic abuse and/or sexual abuse have been made against one of the parents. In these cases, it is presumed not to be in the child's best interest to live with the accused parent. Depending on the extent of the abuse alleged, the parent also may not be granted visitation rights, or the visitation may have to be supervised.

False Allegations of Abuse

Regrettably, many parents have discovered that alleging their soon-to-be ex-spouses abused them or the children is a surefire way to influence custody decisions. The Illinois Domestic Abuse Act (IDAA) - a law that was meant to protect victims of abuse - unwittingly has become a powerful tool for parents seeking to get custody of their children through whatever means necessary.

Under the IDAA, domestic abuse is defined quite liberally as any "physical abuse, harassment, intimidation of a dependent, interference with personal liberty or willful deprivation." While what constitutes physical abuse is more straightforward, the definitions of harassment, intimidation and interference with personal liberty are very subjective and open-ended, giving the court wide latitude to determine what is and is not domestic abuse under state law.

If a person successfully claims domestic abuse under the IDAA, he or she can receive a protection order against the alleged abuser. The protection order will entitle the accuser to sole occupation of the home, if they share a residence. Protection orders have been successfully used in custody hearings to deprive parents of not only physical custody of their children, but also visitation rights.

This is not to say that every allegation of abuse is false or fabricated. Certainly, there are parents and children who have suffered violence and sexual abuse in their homes.

However, this does not mean that every claim of domestic violence is legitimate or that there may not be an ulterior motive for making the claim. When people use false allegations of domestic violence as a tool to get what they want, it undermines the protections of the legal system and delegitimizes the valid claims of true victims of abuse. It also has the unacceptable consequence of stripping good, well-meaning parents of their rights to be involved as much as possible in their children's lives.

Conclusion

There are ways to fight against false allegations of domestic violence and protect your rights to be involved in your child's life. From attacking claims of abuse to bringing witnesses to testify on your behalf to raising questions about the true motivations for the allegations, a claim of domestic abuse does not have to be the end of your fight to get custody of your children. For more information, contact an attorney experienced in handling child custody and domestic violence matters.

Southern Identity and the Causes of the Civil War, German Identity and WWII

A true Southerner is classified by three distinct characteristics: a love of a fried food that people from the other regions of the country may respect, but will never understand; strong feelings about the superiority of their state university's football program; and finally, very certain beliefs about the true causes of the Civil War.

The common (and admittedly simplistic) belief is that the Civil War was over slavery: the racist, oppressive people in the South wanted to keep slavery legal, and the progressive freedom-loving Yankees knew that it was wrong and fought bravely for what was right.

But the issue isn't quite that, pardon the expression, black and white. Slavery did play a large role in the Civil War, but the reasons the North and South chose the sides they chose were more complex than simply loving slavery and believing that it's wrong. Slavery played a huge role in the burgeoning American economy, especially in the South. A lot of Southern landowners were not pleased with the election of President Abraham Lincoln, as they believed his beliefs (including his support of the emancipation of slaves) was in contrast to their economic interests. These beliefs lead to the South's desire to secede from the union.

The desire to secede and the belief that they were "rebels" is a crucial part of the Southern identity, even to this day. Much controversy has surrounded the flying of the Confederate in public places, including on top of state houses and other official buildings. Those who support the continued flying of the Confederate flag may argue that it's a crucial part of Southern history and identity and associate it strongly with the rebellious spirit that the South is known for. The counterargument is that, regardless of what other factors may have lead to the South's desire to secede and the war that would ensue because of it, slavery was a motivating factor, and that that part of this country's history should not be celebrated.

Just about any student studying for the AP US History exam will know something about the causes of the Civil War, as this major event in American history is a defining moment in the history of this country, and it unfortunately also entails an incredibly shameful portion of the collective American past.

Negotiating national pride with an awareness that the American past entails some truly incorrigible behavior is not uniquely American, Germans deal with similar issues of wanting to celebrate what is great about their country, while not giving the impression that they are proud of the Holocaust. Their dilemma is even more complicated as a strong sense of nationalism was a crucial part of the Nazi identity. As a result, many Germans are ashamed to fly their flag or publicly display pride in their country.

Any AP US Government student who's studied 20th and 21st century American foreign policy will know that the issue of loving one's country but disagreeing with one's government is something that is not limited to the Civil War era, or post-Hitler Germany. A lot of Americans felt uncomfortable displaying American flags in the wake of the Patriot Act and the war in Iraq. Then again, a lot of other Americans felt incredibly comfortable displaying it, considering a strong sense of patriotism a necessity in the wake of September 11.

Issues of regional and nationality identity may be complex and changing, but studying them helps to understand the people around the world and how they feel about the places they live.


Twitter Facebook Flickr RSS



Français Deutsch Italiano Português
Español 日本語 한국의 中国简体。