Transcript: Information Format Web Pages Web Pages A website is a collection of related web pages, including multimedia content, typically identified with a common domain name, and published on at least one web server. A website is a unique way to connect with the world. Whether you choose to create a website to share your passion for music, inform people of your business, sell products, or any other reason—there are no boundaries to what you can do. Blogs Blog A regularly updated website or web page, typically one run by an individual or small group, that is written in an informal or conversational style. The purpose of writing blogs could be promotion of a product or service, awareness about social issues, information sharing about any subject or purely passion for writing. ... Company Blogs: Many companies manage a blog and share about their business, products or services. Some blogs may not provide the information that they want and their could be quicker ways to access to information. Podcasts Podcast A digital audio file made available on the Internet for downloading to a computer or mobile device, typically available as a series, new instalments of which can be received by subscribers automatically. Unlike traditional mass media - which is in a constant struggle to grow the audience so that it can sell advertising for a higher premium, the beauty of Podcasting is that the best content is very niche and it's not always going to be relevant to that niche audience. Streamed Audio and Video Streamed Audio and Video Streaming media is video or audio content sent in compressed form over the Internet and played immediately, rather than being saved to the hard drive.. With streaming media, a user does not have to wait to download a file to play it. Because the media is sent in a continuous stream of data it can play as it arrives. Scope Scope Initiative 1 Initiative 1 Initiative 2 Initiative 2 Initiative 3 Initiative 3 Resources Resources Budget Budget Stakeholders Stakeholders Stakeholder 1 Stakeholder 1 Stakeholder 2 Stakeholder 2 Stakeholder 3 Stakeholder 3 Time Time Next Steps Next Steps Step 1 Step 1 Step 2 Step 2 Step 3 Step 3 Social and Media Social and Media Internet-based applications, ... users create service-specific profiles for the site or app that are designed and maintained by the social media organization, social media facilitate the development of online social networks by connecting a user's profile with those of other individuals or groups. Document Stores Document Store A document-oriented database, or document store, is a computer program designed for storing, retrieving and managing document-oriented information, also known as semi-structured data. RSS Feeds RSS Feeds RSS is a type of web feed which allows users to access updates to online content in a standardized, computer-readable format. These feeds can, for example, allow a user to keep track of many different websites in a single news aggregator.
Transcript: AICPA Code of Professional Conduct section 301 Prospective mysterious buyer calls and bid 15% on top of the last bid that Jim will receive Jim and the ethical dilemma for the waiver/bringing Bob on board/ talk to his hedge fund manager As hard as this situation is on Jim this time, we decided that he could struggle one more year and report the situation to the hedge fund manager. Jim has a strong sense of equality and sensibility in his ethical lenses and he would feel horrible to have people loose money and being fooled by a waiver in the investments papers. Email bids until 12:00 pm for a piece of land What is Confidential Information Case 3 He needs $10M more in his portfolio to be promoted as hedge fund manager Case 1 Confidential Information Confidentiality is an ethical principle associated with several professions Analysis 29% said that they believed financial services professionals may need to engage in unethical or illegal activities in order to be successful Its a persons duty not to disclose sensitive information Accounting Profession Activity Case One Arguments for legalizing insider trading We will present three different cases about Jim as he encounters different business related decisions Confidentiality dilemma while transferring between firms Analysis b. Illegal insider trading Insider trading is the trading of a public company's stock or other securities by individuals with access to non-public information about the company. Anyone who misappropriates (steals) information from their employer and trades on that information in any stock is guilty of insider trading. SEC Rule 10b5-1 created for insiders an affirmative defense if the insider can demonstrate that the trades conducted on behalf of the insider were conducted as part of a pre-existing contract or written binding plan for trading in the future. Bob calls him and wants to invest $4M Analysis Please break up into groups of 3 to 4 Based on Jim’s ethical lenses that focus on rationality and equality we decided that he should call his superior at his firm and ask for advice in order to not fall into a big mistake that could have a negative impact on his career. Jim is a stockbroker at Bridgewater Associates Insider Trading The Difficulty in framing insider trading Laws 28% said that they felt the financial service industry does not put the interest of clients first Jim is head of finance of Company B, his previous employer was Company A where he was a finance manager Transactions gives indication of insider trading Company B has major contracts with Company A and they are preparing a renewal contract with a competitive bid What is Insider Trading? The timing is just a little too good. The transaction is too large. the transaction is one that would be unreasonably risky. Ethics Insiders Market professionals Liquidity traders Investors Jim and Bob Insider Trading Dilemma Jim and the breach of confidentiality dilemma So if you think that people at Wall Street are acting or will act ethical....Think again Who Does Insider Trading Affect? Conflict of duties often arises when dealing in securities. Sanctions may be civil or criminal or both. Intent is usually an important factor in establishing guilt. • 52% — felt it likely their competitors had engaged in unethical or illegal activity to gain a market edge. And 24% felt company co-workers had done so. CPA's need to know everything a. Legal insider trading Legal trades by insiders are common, as employees of publicly traded corporations often have stock or stock options. In ethics and in law some types of communication between a person should not be discussed Confidential Breach Dilemma Also in this case we suggested Jim to reach out to his team and explain his situation. Breach of confidentiality is a high risk in this occasion and he can incur in a civil lawsuit with expensive fines and reimbursements. Case One Some economists argue insider trading based on material nonpublic information benefits investors. Friedman said: "You want more insider trading, not less. Legalization advocates question why "trading" is legal in other markets but not in the stock market. Definition: Privileged communication shared with only a few people for furthering certain purposes Insider Trading Breach of confidentiality dilemma for Jim Conclusion Case Conclusion Need to maintain confidentiality of client information 24% said they would likely engage in illegal insider trading to make $10M if they could get away with it Rule 301-"A member in public practice shall not disclose any confidential information without the specific consent of the client" Case 2
Transcript: Detail 4 Also known as Non-Disclosure Agreement A legal written agreement between two organizations or business entities that ensures sensitive information is protected from the public. Uses of Confidential Information Confidential Information Definition Often used when two businesses start working together and also provides an incentive of trust between the two partners. If valuable information is publicized, the legal agreement between the two entities can be referred to as evidence in court.
Transcript: Confidentiality Confidentiality differs from privacy in that with confidentiality a relationship has been established between the patient and the healthcare provider. Obtaining consent should include explaining to the patient what risks might be involved by releasing that information and its effect on privacy as well as what measures will be taken to protect that privacy. Resources HIPAA A healthcare provider has both a legal and ethical obligation to provide security for a patient's healthcare data and to prevent the disclosure of that information unless informed consent for release is provided by the patient. Consent Privacy is a state of mind in which the expectation of can only be defined by the individual. Confidentiality and Data Breaches Privacy Personal data included in the record should only be used for purposes specified and should not violate the Health Insurance Portability and Accountability Act of 1996 Privacy involves the right to determine what information is collected about an individual, how it is used, how that information should be gathered and who has authorization to access the collected information. Confidentiality breaches and data privacy issues can come from a variety of sources: Healthcare records Criminal justice proceedings Collections and financial records Social networking Confidential vs Private Information Confidential Health Information Privacy The HIPAA Privacy Rule. (2016). YouTube. Retrieved from Health Information Privacy The HIPAA Privacy Rule. (2016). YouTube. Hebda, T., & Czar, P. (2013). Handbook of Informatics for nurses and healthcare professionals (5th ed.). Boston, MA: Pearson. As healthcare networks continue to expand, security of patient information becomes increasingly critical. Personal Expectation Security & Confidentiality Protecting patient information should be a priority and releasing that information requires written consent. By: Andrea Barrett
Transcript: What do you know about Confidential Information security ? complete audit Company Me Information Security malware and passwords Locating and forensically securing potential evidence written confidentiality policy 1. Ang Wat Chin 1402086 2. Lim Yun Yan 1402196 3. Lee Yi Ling 1404111 4. Liew Chin Yee 1404552 5. Fong Yi Wei 1402767 Identifying potential sources of evidence 1. Specific legislation and identified as personal, 2. Personally identifiable information 3. Individually identifiable health information 4. Education records 5. Non-public information Confidential Information System Social Security number Physical description Home address Home telephone number Financial matters Performance evaluations Verbal or written statements made by or attributed to the individual Medical and employment history Assisting with collection of evidence from third parties Prevention Government Affected parties and consequences CIA Model Identify system characterization data flow analysis of networks connections to business partners and the Internet interconnections between internal and external systems Preserve Confidentiality Integrity Availability of Intervention Example Collegue Performing forensic analysis of the collected data Public What is Confidential Imformation Security
Transcript: NEVER PROVIDE the CONFIDENTIAL INFORMATION to a customer until you have validated the customer’s identity. -NEVER PROVIDE C.C. INFORMATION- COMBINATION security pin TF#48 proceed with the call... Keep going with the good practices WE CAN DO IT!! LAST REDEMPTION/REUP DATE A ONLY IF THE CUSTOMER HAS THE PHONE AND THE DEVICE IS ACTIVE DOUBTS OR QUESTIONS TOP SECRET Option B THE END FEB/2016 B QUIZTIME!!! OPTION C esn/min Confidential information TF# 48 why it is important to keep confidential information safe? 123456 6 digit sms AND ANY OF THE FOLLOWING... • Credit Card Information o Last 4 Digits o Credit Card Type o Credit Card Expiration Date o Billing Address o CVV Number o Name on the Card Just Verify (do not read back to the customer) PLEASE BE ADVISED Option A C • ESN/MIN • Name • Address • Contact Phone Number • E-mail Address • ESN/MIN • Name • Address • Contact Phone Number • E-mail Address • 4-digit Security PIN • Add/Remove an ESN • My Account password changes • Previous Redemption Date • Previously Redeemed Airtime PIN and/or SNP • Activation Zip Code • Month/Year of Initial Activation • Enrollment ID (SafeLink only) DATE OF BIRTH Activation Zipcode MONTH AND YEAR OF INITIAL ACTIVATION LAST 4 DIGITS OF CC. ON THE ACCOUNT LAST REDEMPTION/REUP TOTAL AMOUNT PAID OTHER PHONE NUMBER ON THE ACCOUNT Use the security code tool How the customer can access the account information... Answer the security questions Answer the security pin If the customer is still unable to PROVIDE this information... What if the customer cannot verify security questions or pin...
Transcript: Contingent Plans THANK YOU! CONS:- Contradiction of values, school,church vs casino, night club. The selected facilities built in the communities for the purpose of attracting investors from ipo or other method fail to attract the amount of investment needed for the remaining features to couplet the community. Fail to attract enrollment [ school] due to the lack of credibility in the educational industry. [ irrelevant public image] Project fail to achieve expected maret response, as a result, we are forced to compromise by sacrificing the original target social class toward lower purchase power social class.which will lead to a fundamental, if not breach of the original visionary due to the comparatively lower purchase power. Reference shopping center K ZONE. The lack of usage of black lions club due to the in completion of other community facilities and the residential area. Insufficient population of target segment due to the lack of statistical research. Unexpected competition [lack of knowledge of governments developing plans/ other unexpected competitions that. The promotional effect of the royal resdidency would be interfered by the insufficient amount of community user due to limited amount of facilities being built Noise pollution from night clubs and the impact on living quality. What is black lions club? Overall Opportunity cost Time Line :- Till 30th of January 2017, in order to create the flexible financial budget for the year. Situation analysis up to date Feasibility Study Investment Appraisal Research, development & Innovation Initial Investment To provide an exclusive residential area which contains all the basic facilities needed for a high quality standard of living to upper class citizens of Sri Lanka. The main purpose of this idea is to ensure that upper class citizens around srilanka have access to high end living so that Exclusive community Royal residencies Social class. Catering to upper class around Sri Lanka. First phase :- landscaping Second phase :- school, catholic church, black lion club “ functional center” Third phase :- attracting investments for other community facilities and condominiums. Fourth phase :- attracting investments for casino and night clubs. R & D Information Memorandum WILL THE INITIAL CONCEPT BE A SUCCESS? Summary Research Needed To Be Done CONCLUSION Why and Who Because research and development coupled with innovation creates value. It is crucial to understand and quantify all existing and unsuspecting risks. Ashan & Washington (Project Managers) Ogilvy PR (Marketing Firm) PROS:- Increase awareness and regular basis usage of the community via school, catholic church and black lion multifunctional exclusive membership club Promotional effect on the accommodation. Creating a codependent future business dynamic of academic, sport, other areas of outstanding excellency of personnel from exclusive social class and other diversified backgrounds via the 10% scholarship programme. To fill in a niche segment of the market to have a wedding ceremony in a church. More awareness of the land due to day and night activities. Improve KST corporation image. Improve public image Attracts higher purchase peer tourism. Avoid uncivilized behavior [ higher maintenance cost] Original Concept Eliminate casino (Investor becomes blacklist) Once investor becomes blacklist difficult to secure funds for other projects. Underground nightclubs Debt Private equity firms “Save for a rainy day” Amalgamate with prestigious education facilities. Increase branding and PR Open up segmented facilities to distinguish the social class and price. Bear the loss and reinvent an alternate concept to attracts more tourists. Destroy the highest fixed cost expenditure activities and rebuild for the middle class market by distinguishing geographically. Differentiate the product to gain competitive advantage Enhance quality through technology and eco friendly policies to create greater value. IN ORDER TO PROVE INITIAL CONCEPT BEING A SUCCESS RESEARCH HAS TO BE DONE, THEREFORE A SUBSTANTIAL AMOUNT FOR SPENDING HAS TO BE USED. Range needed to conduct the research Rs. 2,000,000 - Rs. 4,000,000 Pros & Cons
Description: The sky’s the limit. Boost your new sales initiative into orbit with an engaging and compelling SKO presentation. This template features a effective sales kickoff theme that makes it easy to be engaging. Like all Prezi SKO templates, it’s fully customizable with your own information.
Description: Add some color to your quarterly business review with this vibrant business presentation template. The bold visuals in this business template will make your next QBR a memorable one.
Description: Storytelling is at the heart of great service. Use this stunning, customizable business presentation template to highlight employees who do exceptional work or position your customers as the heroes of your business.
Description: Catch the eye and engage the imagination with this cool-looking Prezi proposal template. The bold, bright design and highly dynamic theme all but guarantee success for your next sales or marketing proposal. All Prezi presentation templates are easily customized.
Now you can make any subject more engaging and memorable