显示标签为“security”的博文。显示所有博文
显示标签为“security”的博文。显示所有博文

2011年10月28日星期五

High-speed rail in China encounter security test

Through travel agents to pay bribes in the form of cross-border tourism. Shopping bag full of banknotes in the parking lot. United States Securities and Exchange Commission (SEC), just above year United States Asian government officials in many facilities for the IBM corporate bribery in two ways.

SEC settle in March, the multinational computer companies to $ 10 million fine, civil accusations against it. SEC complains, IBM attempted to China and Korea when its hardware products in government procurement, violated the foreign corrupt practices Act (Foreign Corrupt Practices Act).

IBM is not alone. Only 6 weeks ago, the United States Department of Justice, said California energy storage products manufacturer maikesiwei technology company (Maxwell technologies) to sell power to State-owned enterprises in China to the underlying device, bribed to exaggerate the contract price, the company paid nearly 15 million dollar fine to settle criminal and civil charges against themselves.

There are other examples of known companies, for example in 2009 France Alcatel-Lucent (Alcatel-Lucent), and United States regulators settle, which found that group Telecom was a group of Chinese officials visited the factory and training trip, most of the time spent in Disneyland (Disneyworld), Universal Studios (Universal Studios) or Las Vegas.

The United States authorities with unprecedented intensity, possible violations of the foreign corrupt practices Act investigations, attracted by reconciliation, publishing, and also fined is more and more, Weijia, New York law firm (Weil Gotshal & Manges), United States Department of Justice and the allegations of SEC brought a total of 74 last year, only 12 and 5 years ago. As part of the reason is that companies are increasingly in the Western world to indicate the countries whose economies are largely controlled by the Government. "It is part of globalisation," said a regulator. -When in the market of emerging countries, it is difficult to go from a compliance perspective. ”

But there is also another reason, namely surveys might be hard-pressed to provide federal financial matters also with regard to this pre-admits that harvest. WAI-Kay law firm (White & Case) study showed that within 3 years, target reconciliation brought revenue of us $ 3 billion to the Treasury. When the relevant bodies to get congressional approval when their larger budgets, this is a lot of "selling points". The global financial crisis and bonade · maduofu (Bernard Madoff), after the fraud, the supervisory authorities also felt the pressure to prove his ability to work. The foreign corrupt practices Act is a strong proof of the tool objectives.

As a result, for those companies that do business abroad--whether it is the largest transnational corporations, including the smallest investment institutions--the problem is becoming increasingly difficult. Also operate problem, organizing travel for customers or vendors, may also incur unsecured.

United States businesses complained about strict rules which constitute unfair barriers and United States complain businesses than United States regulators for cross-border jurisdiction. When under beike · maijian advokatbyr? (Baker & McKenzie), in fact, six cases in which foreign corrupt practices act in the largest settlement, 5 has its headquarters in the United States outside the company. Siemens AG (Siemens) to pay fines and up to ever profit recovery in the United States and Germany paid a total of 1.6 billion dollars, since companies in Argentina, Bangladesh, Iraq and other places undue payment of money to government officials to obtain contracts.

Other Governments would follow the United States. United Kingdom anti-bribery law entered into force on 1 July. The OECD (OECD) has several anti-bribery initiative, but transparency International (Ti) noted in 2011 survey, OECD member countries, only 7 countries to actively implement these initiatives, 21 countries which have failed to take action, or a very small, the other 9 countries had taken appropriate measures.


View the original article here

2011年7月13日星期三

Blogger security

I have heard many a blogger say that blogging fills a need. While blogging provides a humanizing effect on news and journal, he also opens a window into personal lives. Shared details on blogs was only available to a select group of friends, and while blogging has become common place, have risks that should not be ignored. Persecution is a new phenomenon that allows anonymous online predators prowl for victims. Online bloggers traditionally provide personal details about their lives. As a result, many women who blog are becoming victims. Most people are concerned about children on the Internet and configure strict posting guidelines for children, adolescents and teenagers, but few adults respects the warnings and often do not consider that they can also be targeted. Females, in particular, should have cared to circumnavigate blogosphere. If you are a blogger or contemplating an online journal, consider these tips to protect your identity: does not have an online profile.
Most services of blogs that bloggers to create an online profile. While it might be fun to post information about likes and dislikes, it is best to refrain from posting any personal details. Personal details often inadvertently provide information on physical location or habits. The aggregate information in a personal profile can also help someone interested in forming a individual. Post anonymously.
Manage your blog anonymously or adopt an alias for the release of everything online. This helps protect you in case you call unwanted attention. Avoid personal or identifying details.
Avoid any personal details or identification to the post on your blog. Do not publish in advance about the locations that you will be or on areas that you live close by. No photos.
Refrain from sending a photo. Photos can invite problems or unwanted attention. Avoid inappropriate dialogue.
Be careful not to start a dialogue that could be interpreted in a way that was not intended. Sometimes humorous threads can get out of hand. If the dialog degrades to an area that makes you uncomfortable, drop the dialogue and refrain from posting more. Also in making decisions about individuals online, consider your past behavior and try to consider posting their true intentions. Lurkers.
Always remember that just because you don't have a dialogue with someone doesn't mean they are not reading everything you write. Many people simply lurk in the line and not get involved in the publication of comments, but read what is written. Your audience could be much bigger than you think. Timeless.
Internet content is timeless and remember that even if you remove the content, can be filed or syndicated. If you do not want to read something, don't post it to the Internet. Schools, colleges and employers search the Internet to discern a story of individuals. Sordid details about a late night won't help achieve a coveted job. The internet is a haven for all kinds of predators. Always remember that just because someone says something is true doesn't mean it's Predatory. adopt personas that they think you want them to be. So how can we provide guidelines for small children, adults must be cautious and take precautions when posting online. While blogs can be a great outlet and channel and somehow immortalizing thoughts, it is important that safety is considered and blogging best practices are followed at all times. About the author:
Sharon Housley manages marketing for FeedForAll http://www.feedforall.com software to create, edit, publish RSS feeds and podcasts. In addition Sharon manages marketing for NotePage http://www.notepage.net a software company of wireless text messages.

View the original article here