Cloud computing continues to dominate discussions of enterprise IT. See where it’s been and where it’s headed.

CBPN's avatarCloud Computing Best Practices

CN_Tower_Lightning2Last year we began the process of organizing an event and white paper series entitled ‘Cloud Computing and the Drummond Report’.

Due to the volume of preparatory work required to make this a home run we had to put it on the back-burner for a while. This is now complete and we’re re-starting the project, stay tuned for further news.

The end result will be to establish Toronto as a lightning rod for attracting the best Cloud innovations in the world!

What’s Next Toronto?

The Drummond Report is the nickname given to a commissioned review of the state of Ontario’s finances by economist Don Drummond. (Read the full report here).

In short it’s been proposed that Ontario faces a bleak future due to a growing financial deficit and Drummond makes a number of cost-containment recommendations to address this situation.

Our goal for the white paper is to establish the link between…

View original post 627 more words

2012 in review

The WordPress.com stats helper monkeys prepared a 2012 annual report for this blog.

Here’s an excerpt:

600 people reached the top of Mt. Everest in 2012. This blog got about 3,300 views in 2012. If every person who reached the top of Mt. Everest viewed this blog, it would have taken 6 years to get that many views.

Click here to see the complete report.

Interim Final Rule Narrows the Circumstances Under Which Creditors Are Covered

The Federal Trade Commission today announced publication of an Interim Final Rule on identity theft “red flags” that narrows the circumstances under which creditors are covered by the Rule.

Congress directed the FTC, along with several banking agencies to develop regulations requiring “financial institutions” and “creditors” to develop and implement a written identity theft prevention program.   By identifying “red flags” for identity theft in advance, businesses can be better equipped to spot suspicious patterns that may arise — and take steps to prevent potential problems from escalating into a costly episode of identity theft.

Under the Rule, Red Flag Programs must have four parts.  First, the Program must include reasonable policies and procedures to identify signs – or “red flags” – of identity theft in the day-to-day operations of the business.  Second, the Program must be designed to detect the red flags of identity theft identified by the business.  Third, the Program must set out the actions the business will take upon detecting red flags.  Finally, because identity theft is an ever-changing threat, a business must re-evaluate its Program periodically to reflect new risks from this crime. 

The agencies promulgated the Red Flags Rule in 2007.  In December 2010, Congress enacted legislation narrowing the definition of “creditors” covered by the Rule.  The amended Red Flags Rule now provides that a creditor is covered only if, in the ordinary course of business, it regularly:

  • Obtains or uses consumer reports in connection with a credit transaction;
  • Furnishes information to consumer reporting agencies in connection with a credit transaction; or
  • Advances funds to or on behalf of a person, in certain cases.

The Commission is seeking comment on the Interim Final Rule for 60 days.  After the expiration of the 60-day comment period and a review of the comments received, the Interim Final Rule will become final.   

The Commission vote approving issuance of the Federal Register notice announcing the Interim Final Rule was 5-0.  The notice will be published in the Register shortly and can be found on the FTC’s Web site as a link to this press release.

Basic Tips for Social Media Regulatory Compliance in Financial Services SEC FINRA

Social Media and the Financial Services Industry.

From the Madoff scandal, to the Occupy Wall Street Movement, to Mitt Romney’s tax returns, the financial services sector is accustomed to the scrutiny and ire of the public and government regulators. Therefore it is no surprise that on January 4, 2012, the SEC’s Office of Compliance Inspections and Examinations, in coordination with other SEC staff, including in the Division of Enforcement’s Asset Management Unit and the Division of Investment Management, issued its “Investment Adviser Use of Social Media” paper. The paper begins by observing that although “many firms have policies and procedures within their compliance programs” governing use of social media” there is wide “variation in the form and substance of the policies and procedures.” The staff noted that many firms have multiple overlapping procedures that apply to advertisements, client communications or electronic communications generally, which may or may not specifically include social media use. Such lack of specificity may cause confusion as to what procedures or standards apply to social media use.

The SEC paper suggests that the following factors are relevant to determining the effectiveness of a Social Media compliance program:

  • Usage Guidelines
  • Content Standards
  • Monitoring
  • Frequency of Monitoring
  • Approval of Content
  • Firm Resources
  • Criteria for Approving Participation
  • Training
  • Certification
  • Functionality of web sites and updates thereto
  • Personal/Professional sites
  • Information security
  • Enterprise-wide web site content cross collateralization

Similarly, the Financial Industry Regulatory Authority (FINRA) has issued guidance for secutires brokerage firms. According to its web site, FINRA “is the largest independent regulator for all securities firms doing business in the United States.” FINRA protects American investors by ensuring fairness and honesty in the securities industry. In January 2010, FINRA issued Regulatory Notice 10-06, providing guidance on the application of FINRA rules governing communications with the public to social media sites and reminding firms of the recordkeeping, suitability, supervision and content requirements for such communications. Since its publication, firms have raised additional questions regarding the application of the rules. Key take aways from FINRA’s guidance include the flowing:

  • Brokerages have supervisory and record keeping obligations based on the content of the communications – whether it is business related – and not the media
  • Broker-dealers must track and supervise messages that deal with business
  • Firms must have systems in place to supervise and retain interactions with customers, if they are made through personal mobile devices
  • A broker must get approval from the firm if she mentions her employer on a social media site
  • Pre-approval for instant messages, also known as “unscripted interactions’ in legalese, is not necessary as long as supervisors are informed after the fact

International Trademark Searches Now Easier Through WIPO

The World Intellectual Property Organization just announced it’s new searchable trademark database. WIPO GOLD is a free public resource which provides a one-stop gateway to WIPO’s global collections of searchable IP data. It aims to facilitate universal access to IP information.

The database is available here: http://www.wipo.int/branddb/en/index.jsp