One dimension of “access” is when you give or get access to information. Can you discriminate between players, giving one quicker access than the other?
“Boy, High-Frequency Lawsuit Was Dismissed in a Flash,” Wall Street Journal, April 30, 2015 C3. Dismissal of suit alleging high-frequency traders were given unfair access to information.
Not sure why suit was dismissed.
BTW- this is the 600th post on this blog.
Filed under Access, Business Case, Controls, Governance, Information, Interconnections, Internal controls, IT, Oversight, Risk, Value
You bought shares in a company and follow the company’s reports on performance. What happens when the company decides to stop reporting a statistic you thought was valuable? Why did they really drop it and what can you do, other than sell?
“Twitter Goes Off Message,” Wall Street Journal, April 29, 2015 C12. Twitter stock drops 18% on bigger-than-expected losses.
Leaving aside for now how the earnings information got leaked early (was it tweeted?), buried in the piece was the info that Twitter dropped reporting of “timeline views” as no longer relevant. As the Journal says, “it didn’t offer investors a substitute.”
The company has decided to stop reporting certain information to its shareholders. Is that, by itself, useful information? What obligations do the directors and company management have to share information with the shareholders?
Filed under Access, Board, Communications, Culture, Governance, Inform market, Inform shareholders, Information, Investor relations, Oversight, Value
I was tempted to post about how the costs of breaches like the one at Target are spread among the different participants (“Small Lenders Cry Foul Over Breach Costs,” Wall Street Journal, April 28, 2015 C1), but then I saw an article about hospitals. Not in Business & Technology or Money & Investing sections. In the Personal Journal.
“Researchers Map Where Hospital Pathogens Are Lurking,” Wall Street Journal, April 29, 2015 D3. Study of what pathogens exist where in a hospital.
Your company has millions or billions documents (paper and electronic). How do you track what you have and where you have it? How do you analyze all that information and determine what’s useful? How do you use it?
The hospitals gather a lot of data and analyze it to find out where bacteria live and prosper, with a view to preventing infection and keeping patients healthy (which is the core mission of a hospital). Parallel universe?
When we conduct or attend compliance training sessions, there’s a sign-in sheet. What if that gets fudged and someone gets a pass when he or she shouldn’t have?
“Tulsa Probe Eyed Reserve Deputy’s Certification,” Wall Street Journal, April 25, 2015 A2. Questions about the certification of the reserve deputy who allegedly shot and killed man. The reserve deputy may have mistaken his gun for his Taser.
One of the reasons companies do training is to prevent accidents. Another reason is to insulate the company from liability. If there is an accident, the company wants to prove it trained the employee and he or she didn’t follow that training. But what if the documents around that training, or the competence of the trainee, are ambiguous?
Is this part of information governance?
Filed under Business Case, Collect, Compliance, Compliance, Controls, Governance, Internal controls, Management, Oversight, Risk, Use
“Lehman Trader Taped Conversations,” Wall Street Journal, April 24, 2015 C2. Trader recorded discussions with his employer about what would happen to his Lehman bonus after he went to work for Barclays. Some ambiguity in conversations and subsequent contract with Barclays leads to lawsuit. Claim: $83 million.
How do manage and preserve what our employees say? How do we control what they record? Who owns the information contained in a discussion with an employee about salary and benefits? Is that proprietary to the company?
There’s an app for that.
Filed under Business Case, Collect, Communications, Controls, Definition, Duty of Care, Governance, Information, Internal controls, Management, Oversight, Ownership, Ownership, Policy, Protect, Protect assets, Risk, Use, Value
Is your computer code tangible property that can be stolen, especially if you still have it?
That’s one question in the “Secret Sauce” case.
“Jury Gets Goldman ‘Secret Sauce’ Case, Wall Street Journal, April 23, 2015 C3. Defendant raises technical defenses in criminal case involving theft of computer code from Goldman Sachs, arguing non-tangible binary data don’t/doesn’t have physical form.
Can you steal something the plaintiff still has? We’ll see. A not guilty verdict would raise a lot of questions about identity theft. Among other things.
Lot of focus this week on access to information, and how managing access is a key element of information governance. Here’s another one.
“Bloomberg Terminal Outage Roils Trading,” Wall Street Journal, April 18, 2015 B5. Traders worldwide scramble to communicate when one of their primary trading and communications platform shuts down for a few hours. Bloomberg provides a heavily used chat function in a heavily regulated industry.
Would your employees be able to continue to communicate if your email went down? Would that communication be captured and backed up? How would you find it later? Are there regulatory or policy prohibitions on the use of personal email or chat accounts for company business? Is it secure? It’s your company’s information, right?
Filed under Access, Business Case, Collect, Communications, Compliance, Compliance, Controls, Duty of Care, Governance, Information, Interconnections, Internal controls, IT, Management, Oversight, Ownership, Ownership, Protect, Protect assets, Risk, Use