https://www.facebook.com/itzonepakistan
×

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2021
  • February 2021
  • December 2020
  • November 2020
  • April 2019

Categories

  • Business
  • DMS
  • Networking
  • Technology
  • Tips
  • Uncategorized

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

HOW TO SHOP

1 Login or create new account.
2 Review your order.
3 Payment & FREE shipment

If you still have problems, please let us know, by sending an email to support@website.com . Thank you!

SHOWROOM HOURS

Mon-Fri 9:00AM - 6:00AM
Sat - 9:00AM-5:00PM
Sundays by appointment only!
social sharing

SIGN IN YOUR ACCOUNT TO HAVE ACCESS TO DIFFERENT FEATURES

FORGOT YOUR PASSWORD?

FORGOT YOUR DETAILS?

AAH, WAIT, I REMEMBER NOW!
IT Zone Pakistan
IT Zone Pakistan
QUESTIONS? CALL: 03144 166 777
  • LOGIN
  • SUPPORT

IT Zone Pakistan

IT Zone Pakistan

IT ZONE PAKISTAN – Secure Document Scanning, DMS Retrieval, Shredding Services & IT Recycling

T (31) 44 166 777
Email: sales@itzonepakistan.com

IT Zone Pakistan
II Chundriger Road Uni Plaza Karachi-Pakistan

Open in Google Maps
  • Home – IT Zone
  • About Us
  • Our Services
    • Office Paper Shredding Service – Free of Charge!
    • Document Scanning Services
    • Document Management Software
    • Office Computer Scrap Buying
  • Shop
  • BLOG & STORIES
    • EVENTS
  • Contact Us
  • MY CART
    No products in cart.
FREEQUOTE
  • Home
  • 2023
  • January
  • Page 15
August 3, 2025

Month: January 2023

Medical Document Management Systems Market Statistics, Trends, Analysis Size and Growth Factors by 2032 | 3M, – openPR

Thursday, 05 January 2023 by admin

Medical Document Management Systems
Permanent link to this press release:

All 5 Releases

source

Read more
  • Published in Uncategorized
No Comments

Protecting Your Data with Digital Document Management | By Mano … – Hospitality Net

Thursday, 05 January 2023 by admin

For various reasons, hotel companies are compelled and required to keep an incredible amount of records about their daily business operations. The night audit pack alone – which includes daily documents such as a Transactions Report, Financial Report, Tax Report, Revenue Report, Departures Report, etc. – can be hundreds of pages.

Federal and state tax laws require hotels to keep these records on file, on location, for various amounts of time (typical retention period is seven years). More recent regulations, in fact, require storage in multiple locations to avoid a “single point of failure.” And having these records on hand is helpful: Should a guest call years after their stay to dispute a charge, for example, the hotel should have access to all related documents for verification.
For these reasons, believe it or not, many hotels still print these documents at the end of each day and file them away in a manilla envelope in a storage area, such as a closet, a back office or an attic. A growing number of hotels have adopted some type of digital storage – whether on a USB drive or a cloud-based shared drive, like Sharepoint or Google Docs – which is a step in the right direction but can create its own set of challenges.
For those who haven’t adopted digital document management, the time is now. However, while moving your night audits and other accounting reports from paper to digital might seem like a no-brainer, there are right and wrong approaches. Choosing the wrong approach could lead to inefficient processes and leave your data open to intrusion.
Below, we’ll identify two critical areas of focus to ensure you’re building the right document management strategy that will serve as the framework for future digital transformation.

1) Digital Doesn’t Always Mean Secure

One would think that any digital approach to storing confidential documents would be safer than printing and storing boxes of reports in a storage closet. But that’s not necessarily the case – adopting digital storage without the proper procedures in place can be equally dangerous.
First, storing documents on a USB drive opens up the likelihood that the device will be lost, and losing important documents is never good. Should an employee accidentally leave a USB drive at the coffee station, for example, someone who is not meant to have access to those files could potentially copy the contents of the drive and return it without anyone noticing. In the end, USB storage provides little more protection than lock-and-key.
Storing daily reports in a Google Drive or Sharepoint environment can be beneficial but has its drawbacks. First, login issues and the ability to share with email addresses outside the company often open up vulnerabilities. Also, cloud drives act only as storage units, and often documents will sit for long periods of time with no action. Should your documents need to go through approval and signature processes and ultimately delivered to a central location, there are more efficient tools available.
At the end of the day, operators must ensure the right employees within their organization – on property and at headquarters – have easy access to these documents, but at the same time access is strictly restricted to outsiders. A Digital Document Management system can be integrated with your enterprise authentication solution, resulting in one secure login controlled by your enterprise controls. For example, when a General Manager logs in, his or her credentials can be verified in your system before access is granted. This allows leaders to grant function-based access; for example, the GM might be authorized to sign the signature pack but cannot delete files, and the night auditor can submit reports but not edit them.
A secure Digital Document Management solution will operate in a virtual private cloud environment, which restricts all ports by default and acts like a blanket firewall that protects the system. At MDO, for example, our server infrastructure is built in an AWS Cloud environment, which utilizes modern security and monitoring tools that comply with industry standards. We take the following steps to ensure we provide maximum protection for the data we store and process within the environment:

  • Maximize the use of AWS identity and access management, along with zero-trust security architecture, to reduce possibility of data breach
  • Intrusion Prevention System to take action when a potential attack, malicious behavior, or an unauthorized user is detected
  • Intrusion Detection System to detect malicious behavior or unauthorized access and alert security teams
  • Antivirus protection, including zero-day exploits detection using Machine Learning
  • Integrated incident management system that combines alerts from all distributed tools but allows unified monitoring and responding

2) The Key is Compliance

Another reason public drives like Google and Sharepoint aren’t ideal for storing and sharing your daily reports: They’re lacking a compliance component.
Using a Digital Document Management solution ensures your files are indexed properly, with automated naming conventions and deep search functionality, to ensure they’re filed away in the right spot for easy retrieval. The learning algorithm recognizes and categorizes each document appropriately, with little human oversight. This eliminates human error, allowing Digital Document Management solutions to process hundreds of thousands of reports per day without users needing to open and save a single document.
Search functionality is essential. For example, should a guest call with a question about a charge on their folio, agents should be able to find specific details from the correlating daily report within a few clicks. This helps solve guest issues immediately, rather than taking their information, finding a solution, and returning their call in a clearly less efficient manner.

Sharing Secure Data

The COVID pandemic accelerated an oncoming shift in hotel operations: Many organizations are removing accounting and other back-office functions from the property level, instead moving those tasks to a central location at the regional or corporate level. This provides property-level staff the ability to focus solely on serving the guest and providing an exceptional guest experience. Cloud technology is empowering this shift, enabling access to tools and data from anywhere employees can connect to the internet.
Storing your documents centrally is only the first step; a true Digital Document Management solution will provide the necessary workflows to ensure documents are signed and approved, and simple summary sheets and checklists will help keep the entire team accountable. As you navigate the evolving landscape of digital adoption, be sure to choose long-term solutions that place top priority on ensuring your company and guest data is secure.
Join MDO on Wednesday, Nov. 16, to learn how smart hotel companies are improving their data strategy by going paperless. Digital Document Management provides significant and measurable results for your organization, as well as reduces your environmental impact. Register here.
myDigitalOffice (MDO) is the world’s fastest growing hotel data platform, providing customers with centralized, digital access to all of their hotel’s most critical documents and cross-functional performance metrics. The visibility, connectivity, and control delivered by our award-winning cloud-based dashboards, document management software, and integrated data feeds allow teams to reach greater levels of productivity, budget, and forecast, and reduce environmental impact while optimizing profitability. Learn more at mdo.io.
View source
Hospitality Net membership explained

source

Read more
  • Published in Uncategorized
No Comments

EdTech And Smart Classrooms Global Market Report 2022 … – Business Wire

Thursday, 05 January 2023 by admin

DUBLIN–(BUSINESS WIRE)–The “EdTech And Smart Classrooms Global Market Report 2022: Ukraine-Russia War Impact” report has been added to ResearchAndMarkets.com’s offering.

The global edtech and smart classroom market is expected to grow from $121.19 billion in 2021 to $141.43 billion in 2022 at a compound annual growth rate (CAGR) of 16.7%. The edtech and smart classroom market is expected to grow to $263.94 billion in 2026 at a compound annual growth rate (CAGR) of 16.8%.
North America was the largest region in the edtech and smart classroom market in 2021. Asia-Pacific is expected to be the fastest-growing region in the forecast period. The regions covered in edtech and smart classroom market report are Asia-Pacific, Western Europe, Eastern Europe, North America, South America, Middle East and Africa.
The growing investment in eLearning and EdTech is driving the growth of edtech and smart classrooms market going forward. E-learning stands for electronic learning and it allows people to learn via electronic media, typically on the internet. It allows users to take courses online using electronic devices, such as a computer, tablets, and even smartphones. E-learning uses EdTech that is the use of technology and technology processes to facilitate learning and improve performance.
During the covid-19 pandemic in 2019-20, the subsequent lockdowns resulted in schools being shut. Therefore, this has presented an opportunity for e-learning & edtech providers to capture the market thereby prompting increased investments in the sector. For Instance, according to a report by Tracxn an India-based platform for tracking start-ups and private companies, Indian ed-tech companies have raised $248 million in January to July 2022 from different sources. The Indian ed-tech companies raised $101 during January to July in 2021, and $251 million annually in 2021. Global ed-tech investments are worth $1.21 billion in 2022. Therefore, the growing investment in eLearning and EdTech will drive the edtech and smart classrooms market.
Technological advancement is a key trend gaining popularity in the edtech and smart classrooms market. Major players operating in the market are concentrating their efforts on creating innovative technologies like the Virtual Learning Environment (VLE) app that uses AI (Artificial Intelligence).
For instance, in December 2021, Microsoft corporation, a US-based technology company, and the Oliver Group an Ireland-based EdTech company jointly launched a new virtual learning environment app. This app that runs on the Microsoft Teams application is an intuitive software platform that delivers a wide range of interactive digital content and offers the user a more user-centric learning experience. It features a wide range of interactive digital content and currently encompasses 250 million global Microsoft Teams daily active users. This product, therefore, offers its users seamless student-tutor interaction through easy-to-use interactive tools.
Reasons to Purchase
Scope
Markets Covered:
1) By Education System: Learning Management System; Student Information and Administration System; Student Collaboration System; Student Response System; Learning and Gamification; Test Preparation; Classroom Management System; Document Management System; Talent Management System
2) By Deployment Type: Cloud; On-Premises
3) By Hardware: Interactive Displays; Interactive Projectors
4) By Component: Hardware; Software; Services
5) By End-Use: K-12; Higher Education
Key Topics Covered:
1. Executive Summary
2. EdTech And Smart Classrooms Market Characteristics
3. EdTech And Smart Classrooms Market Trends And Strategies
4. EdTech And Smart Classrooms Market – Macro Economic Scenario
5. EdTech And Smart Classrooms Market Size And Growth
6. EdTech And Smart Classrooms Market Segmentation
7. EdTech And Smart Classrooms Market Regional And Country Analysis
8. Asia-Pacific EdTech And Smart Classrooms Market
9. China EdTech And Smart Classrooms Market
10. India EdTech And Smart Classrooms Market
11. Japan EdTech And Smart Classrooms Market
12. Australia EdTech And Smart Classrooms Market
13. Indonesia EdTech And Smart Classrooms Market
14. South Korea EdTech And Smart Classrooms Market
15. Western Europe EdTech And Smart Classrooms Market
16. UK EdTech And Smart Classrooms Market
17. Germany EdTech And Smart Classrooms Market
18. France EdTech And Smart Classrooms Market
19. Eastern Europe EdTech And Smart Classrooms Market
20. Russia EdTech And Smart Classrooms Market
21. North America EdTech And Smart Classrooms Market
22. USA EdTech And Smart Classrooms Market
23. South America EdTech And Smart Classrooms Market
24. Brazil EdTech And Smart Classrooms Market
25. Middle East EdTech And Smart Classrooms Market
26. Africa EdTech And Smart Classrooms Market
27. EdTech And Smart Classrooms Market Competitive Landscape And Company Profiles
28. Key Mergers And Acquisitions In The EdTech And Smart Classrooms Market
29. EdTech And Smart Classrooms Market Future Outlook and Potential Analysis
30. Appendix
Companies Mentioned
For more information about this report visit https://www.researchandmarkets.com/r/cc4emx
ResearchAndMarkets.com
Laura Wood, Senior Press Manager
press@researchandmarkets.com
For E.S.T Office Hours Call 1-917-300-0470
For U.S./ CAN Toll Free Call 1-800-526-8630
For GMT Office Hours Call +353-1-416-8900
ResearchAndMarkets.com
Laura Wood, Senior Press Manager
press@researchandmarkets.com
For E.S.T Office Hours Call 1-917-300-0470
For U.S./ CAN Toll Free Call 1-800-526-8630
For GMT Office Hours Call +353-1-416-8900

source

Read more
  • Published in Uncategorized
No Comments

Forensic Accounting Skills – Global Investigations Review

Thursday, 05 January 2023 by admin

04 January 2023
The purpose of this chapter is to explain key concepts and leading practices in investigations from an accounting (and books and records) perspective. The term ‘forensic’, as defined in Webster’s Dictionary, means ‘belonging to, used in or suitable to courts of judicature or to public discussion and debate’. Accordingly, forensic accounting involves the application of specialised knowledge and investigative skills and tools to matters in anticipation of possible litigation or dispute resolution, including in civil, regulatory, administrative and criminal enforcement matters. Forensic accounting skills can be applied to a wide variety of investigations into alleged corporate and individual wrong­doing, including:
In this chapter we may refer to fraud in general terms as well as non-compliance. Non-compliance often lacks the intent of fraud and may manifest itself in the violation of an agreement, policy or otherwise acceptable behaviour. Investigations may focus on allegations of fraud or non-compliance.
The range of specialisations in the field of forensic accounting is diverse, but at the core is a focus on accounting systems, processes, transactions, records, data policies, internal controls and reports. A logical order in which forensic accountants will proceed in a typical investigation is as follows:
Many of the most important steps involved in this process are explained in this chapter.
The US Department of Justice (DOJ) has set forth additional guidance[2] on how it evaluates corporate compliance programmes for assessment and sentencing purposes. Forensic accountants are well suited to help to develop effective compliance programmes or to evaluate and strengthen the efficacy of existing programmes. The DOJ guidance represents an authoritative road map for the building or enhancement of a programme, and adds detail and emphasis to the April 2019 guidance.[3] It remains centred on three primary questions: (1) Is the programme well designed? (2) Is the programme adequately resourced and empowered to function effectively? (3) Does the programme work in practice?
The context of the DOJ’s guidance is to assist prosecutors in evaluating a corporation’s compliance programme in determining the form of any resolution or prosecution, monetary penalties and further compliance obligations such as a monitorship. Corporations, however, may use the guidance as a resource for building or enhancing their compliance programme. The DOJ guidance challenges the compliance professional with several hundred questions related to their existing programme. Although forensic accounting professionals collaborate with attorneys, auditors and several departments at the company to assist in-house compliance professionals with practically all aspects of their compliance programme, the DOJ’s revised guidance addresses the following key factors most applicable to forensic accounting:
The DOJ’s additional guidance on how it evaluates corporate compliance programmes demonstrates that there are numerous opportunities for forensic accountants working with legal and compliance teams to add significant value in building and enhancing the corporate compliance function.
Turning to the specific steps where a forensic accountant can assist, an important consideration at the outset of an investigation is to identify the necessary steps to mitigate loss of funds or other assets and to preserve data and relevant records. This may entail closing of bank accounts, freezing of email and other communications, deactivating user passwords and other steps to deny targets of the investigation access. Where the nature of the investigation requires it, financial and accounting information will need to be preserved and stabilised. Physical documents in this category may include a wide variety of records, such as purchase orders, invoices, customer orders, delivery records, etc. Every step of the transaction cycles involved in the scheme under investigation should be considered at this stage to identify all potentially relevant documents and electronic records (including audio).
Owing to the proliferation of electronic data, an increasingly important early step in many investigations is to determine what relevant information exists, in what form (paper or electronic), where it is located (e.g., an on-site data centre, off-site at vendors, in the cloud), what security measures are in place over the data, and what the organisation’s standard record retention and destruction policies and practices are. The process of identifying, taking inventory of and preserving relevant data that may be of use in an investigation is often referred to as e-discovery.
In addition, as soon as it becomes apparent that an investigation in anticipation of litigation is necessary, a litigation or preservation hold notice should be issued. These notices require the suspension of any destruction or deletion of paper or electronic records that could be relevant to the investigation. Proper communication of a litigation or preservation hold to all pertinent individuals and departments, which may include third parties who, for example, are responsible for archiving the organisation’s data off-site, is important to avoid accidental destruction of critical records.
An important part of an investigation is establishing whether the wrongdoing or non-compliance was intentional. Demonstrating that an employee or third party was aware of and violated the code of conduct or a documented, well-established policy or internal control is often a relevant factor. For example, determining how an internal control was circumvented or otherwise violated is also an important part of understanding how fraud or corruption was perpetrated. Establishing that a subject intentionally violated internal controls can be important in connection with criminal prosecution or the regulatory enforcement process. Understanding precisely how internal controls were violated is critical to developing a remediation plan to enhance controls and to prevent future occurrences. In addition, understanding how internal controls were bypassed or overridden will often provide critical insight into who may have been involved in the scheme, who knew or should have known about the scheme and when the scheme took place.
The first step in determining whether policies or procedures were violated is to gain a thorough understanding of the accounting behind the controls as well as the identities of employees responsible for accounting, internal controls and the business activities and processes being investigated. Upon gaining this basic knowledge, we identify the established policies and procedures (the current state). This normally entails reviewing documented policies and procedures, and conducting walkthroughs and fact-gathering interviews with employees to help clarify any ambiguities in the documentation or process. Some considerations include:
It may also be important to review any training programmes that the subject of the investigation received or certifications they approved. Doing so can establish more firmly that the subject had an understanding of the proper method of handling the transactions and policies.
Most accounting cycles, such as procurement, disbursement of funds and payroll, include many steps. Some of these are evidenced manually, such as with written approvals by signature and supporting documents such as invoices and delivery confirmations. Other steps require analysis of electronic records. Examples of critical pieces of electronic evidence related to internal controls include the following:
Physical documents are often important pieces of evidence in an investigation. But electronic evidence associated with a transaction cycle tends to be equally or more important. Proper analysis of this evidence enables an investigator to draw conclusions and gain insight that would be impossible in an entirely paper-based system. For example, a paper copy of a vendor invoice can be analysed to establish whether a subject signed or initialled it, and perhaps whether any alterations were made to the document. But if the organisation’s vendor invoice approval and payment system is electronic, the investigator can also determine with precision the date and time of the approval of the invoice and perhaps even where the subject performed these steps (from home, from a workstation in the office, etc.).
Forensic data science refers to using a scientific method for the identification, collection, analysis and reporting of electronically stored information. This includes both structured data, such as financial records in a database, and unstructured data, such as files on a file server. The most commonly analysed data in forensic accounting investigations is financial, but several non-financial categories of data are also very useful to investigators. Each is explored below.
Data analysis generally has three applications in the investigative process:
Each of these will be explained further. But first, a few important points about data analytics are essential.
Data analytics rarely prove that fraud or non-compliance occurred. Rather, data analysis identifies transactions or activities that have the characteristics of fraud or non-compliance, so that they can be examined further. These are often referred to as anomalies in the data.
If an investigation ultimately leads to employee terminations or legal proceedings to recover losses, it is critical to have properly analysed the anomalies that data mining has identified. Could the anomaly in the data, or an anomaly in a document, while often identified as a characteristic of fraud, also simply indicate a benign deviation? Failing to investigate and rule out non-fraudulent explanations for anomalies can have consequences that many investigators have learned about the hard way.
Identifying and exploring all realistically possible non-fraudulent, non-corrupt explanations for an anomaly is also called reverse proof. Examining and eventually ruling out all of the valid possible non-fraudulent explanations for an anomaly in the data or documentation can prove that the only remaining reasonable explanation is fraud or corruption.
Careful consideration of alternative theories for data and document anomalies is critical to protecting the organisation and the investigator from liability stemming from falsely accusing someone of wrongdoing.
Depending on which application or phase of the investigative process is involved, the nature of forensic data analysis can vary. For example, as an initial detector of fraud or non-compliance through ongoing monitoring, forensic data analytics usually takes one of two broad, but opposite, approaches: identification of any activity that deviates from expectations, or identification of activity that possesses specific characteristics associated with fraudulent or corrupt behaviour or other non-compliant conduct.
The former approach is taken when acceptable behaviour is narrowly defined, such that the slightest deviation warrants investigation. The latter approach is the more common one. It is driven by a risk assessment and is based on what this type of fraud or non-compliance would look like in the data. For example, a shell company scheme might evidence itself by an address in the vendor master file matching an address in the employee master file. Any instances of such a match should be investigated.
In some cases, basing the ‘investigate’ or ‘don’t investigate’ decision on a single characteristic in the data can result in numerous false positives. For this reason, more sophisticated data analytics often rely on the consideration of multiple characteristics in assessing the risk of activity being fraudulent or corrupt. These characteristics can be combined into a singular risk score per transaction that can be aggregated by vendor, geography or other grouping. Risk scoring or risk ranking transactions can be useful for prioritising where to focus in the data.
Regardless of which of these two approaches is taken, data analytics often represents an essential tool for gathering evidence to lay the foundation for substantive examination of books, records and other evidence. Following the reverse-proof concept described above is critical once anomalies indicative of possible wrong­doing are uncovered.
As a method of corroborating an allegation that has been received, data analysis can be of great value. It is a significant advantage to the investigator because, more often than not, it can be performed on electronic data without alerting the subject of the allegation. In this application, the allegation is first assessed in terms of what impact the alleged fraudulent or corrupt act would have on financial or non-financial data. It is important to understand how data flows through the organisation from the point of origination, through multiple hops in different departments, for example how an invoice will flow from a business unit to finance and back to the business unit. The data can change quite a bit throughout different business processes and this will need to be understood for a robust analysis to take place. To illustrate, take the example of an allegation that workers in the shipping department of a warehouse are stealing inventory by short shipping orders to customers. There are numerous sources of data, both financial and non-financial, that could be analysed to assess the validity of this allegation:
This is a simple example, but one that illustrates that for every allegation, there likely exists data associated with either the perpetration or concealment of the fraud or non-compliance. And this data normally exhibits one or more anomalies in comparison with data from similar transactions that do not involve fraud or non-compliance.
The final application of forensic data analysis is performed during the investi­gation itself. Once an anomaly has been found to involve fraud or non-compliance, additional forensic data analysis, along with substantive forensic examination of the evidence, may be performed to:
Determining who is involved in the fraud as well as who possessed knowledge of it is critical to the mitigation and control enhancement objectives. According to a 2022 report by the Association of Certified Fraud Examiners (ACFE), nearly 58 per cent of all fraud and corruption schemes investigated involved multiple perpetrators.[4] Typically, losses tend to increase with multiple perpetrators, particularly when three or more individuals conspire to commit fraud. This figure has been steadily rising since the ACFE began studying fraud. The 58 per cent includes cases involving multiple internal perpetrators and those involving collusion between insiders and outsiders, such as vendors or customers.
Point 4, above, may also come as a surprise to some. The ACFE report indicates that 35 per cent of occurrences of fraud (especially with respect to asset misappropriations) are perpetrated through multiple methods. The allegation or investigation may have initially focused on only one specific method. Exploring what other activities the subject might have the capability of engaging in is an integral element of the investigation. Investigators and victims attempt to ‘put a fence around the fraud’ as early in the investigative process as possible. Understanding the responsibilities of the subject and the potential for unrelated schemes is essential for erecting the fence. Victims often desire a narrow investigative scope – a sort of wishful thinking. An investigator’s worst-case scenario is missing a scheme perpetrated by a subject despite investigating the subject.
The question of who knew what and when can be particularly important in satisfying auditors in the context of financial reporting fraud. In addition to quantifying the financial statement impact from fraud, auditors rely on representations from management. Knowledge of whether previous representations came from fraudsters and the auditor’s assessment of management’s integrity are often important aspects of financial reporting fraud investigations.
In the next sections, the distinction between financial and non-financial data will be explored, followed by a discussion of internal versus external data.
Most analyses of internal data relevant to an investigation begin with financial data, much of which comes from the organisation’s accounting system. Accounting data can exist in several separate systems, such as:
Performing an investigation often requires the extraction and analysis of data from all these systems to see the big picture or to properly trace the history of a transaction or series of activities. The days of manually maintained books of original entry are gone. The vast majority of organisations now use electronic accounting and financial software, and in larger organisations these systems are included as part of a broader ERP (enterprise resource planning) system.
Some systems are hybrids of financial and non-financial information. Examples of these systems include the following:
Legal and data privacy considerations associated with each of these sources of internal data vary from one jurisdiction to another, particularly with respect to payroll and personnel information. Domestic and foreign data privacy regulations must be considered before embarking on any use of such data in an investigation.
Increasingly, non-financial data is being analysed as a standard element of an investigation. Non-financial data can be classified into two broad categories: structured and unstructured.
Structured data is the type of data that generally conforms to a database format. It is often numeric (e.g., units in inventory, hours worked by an employee, calendar dates), but can involve alpha data as well (e.g., codes associated with types of customers or employees, certain elements of an address).
Structured non-financial data is found in many systems, including those that include financial data mentioned above. Other systems, however, are entirely non-financial, but provide data that can be important to an investigation. Examples of non-financial systems commonly used for investigative purposes include the following:
Unstructured data refers to data that does not readily conform to a database or spreadsheet format. Text associated with messages in emails, explanations for journal entries and other communications are the most common. Unstructured data also includes photographic images, video and audio files.
Emails and text messages of interest to an investigator may involve messages within the organisation, between employees and communications between organisation employees and vendors, customers or other third parties.
Similar to other electronic data, when a user ‘deletes’ this information, a backup or archive version is often left behind and is available to an investigator. Understanding an organisation’s backup, archiving and storage practices is crucial to this part of an investigation.
Careful review of email, instant messaging or text message chains (and, if available, recordings of telephone calls) is vital to most investigations and can provide an investigator with vital clues, such as:
Establishing a timeline can be one of the most important requirements of an investigation. A complete timeline of events can often be established by inte­grating the separate timelines learned from a review of:
Email review is of particular importance in establishing intent. Intent, particularly to a civil standard, may be inferred from communications that indicate an awareness that planned transactions or activities are in conflict with established policies and procedures or treatment of similar transactions. Email, although a rich source of behavioural history, can quickly become overwhelming from a volume standpoint. There are many modern techniques for prioritising and culling this type of information. Sentiment analysis, a form of artificial intelligence (AI), can assist with identifying the writer’s emotional state. Other forms of AI, typically referred to as natural language processing (NLP), can help correct for potential biases that investigators naturally bring to their review. For example, an investigator may select a list of search terms to run against email data to reduce the population for further review and bring the most important messages to the forefront. By creating these search terms, the investigator has leveraged what he or she knows about the case and this inflects a natural bias. By using AI, NLP, predictive analytics and machine learning, coupled with limited manual set-up, analysis and review, the data is allowed to speak for itself, and computer algorithms will cluster statistically relevant information. Typically, a combination of search terms and NLP is used. These types of analyses can identify pressures or rationalisations associated with fraudulent or corrupt behaviour. For example, an employee stating in communications that he or she feels unfairly treated or resentment towards management might be expressing a rationalisation for stealing from an organisation.
One example of the use of both financial and non-financial data is in the investigation of alleged financial statement fraud. When an allegation is made that a company’s financial statements have been intentionally manipulated, any of a large number of schemes come to mind. The most common fraudulent financial reporting schemes involve improper recognition of revenue, inflating sales through fictitious transactions or accelerating the recognition of legitimate transactions. So, a revenue inflation scheme will serve as our example.
To establish that the financial statements improperly reflect sales, electronic data from the sales and accounts receivable systems will need to be analysed in conjunction with physical or electronic records associated with customer orders, inventory, shipping and delivery, among other things. By analysing these records, the investigator may establish that sales recognised by the company failed to conform to applicable accounting standards (e.g., International Financial Reporting Standards).
But accounting mistakes are common. For this scheme to be fraudulent, the subjects’ dishonest intent to violate the accounting rules must be established. This is where analysis of emails and other electronic communications may be valuable. Perhaps email exchanges can be located documenting discussions of revenue shortfalls and methods of meeting budgeted figures. In this case, analysis of unstructured non-financial data may be one of the keys, along with interviews of subjects, to proving that the company intentionally violated its own policies and pertinent accounting principles.
Analysis of both financial and non-financial data is an important step in preparing to interview witnesses and subjects. Reading and analysing email and other communication chains before conducting the interview allows an investigator to plan the order and structure of questions to put the interviewer in the best position to identify conflicting statements and to obtain an admission of wrongdoing.
Other investigation scenarios in which analysis of unstructured data association with communications between individuals include:
Most data and documentation used in an investigation is internally generated – it comes from within the organisation or (in the case of invoices from a vendor) is otherwise readily available within the organisation. Occasionally, however, data or documentation that is only available from external sources becomes essential. External sources of data fall into two broad categories: public and non-public.
Public data and documents are those that are usually available to the general public either by visiting a website or facility or on request from the holder of the records. In many instances, public records are maintained by government agencies. Examples of public records vary significantly from one jurisdiction to another, but some that may be useful to investigators are:
Availability and the extent of these records can differ markedly as an investigator seeks information from different parts of the world.
Increasingly, public records may also include information that an individual voluntarily makes publicly available. For example, when an individual posts photos or makes statements on social media, this information might be readily available to any and all viewers. Once again, investigators should always use caution when accessing this information, especially if the information is only available to ‘friends’ or other contacts that the individual has granted special access to. But when social media information is made fully available to the general public, it can provide a treasure trove of information about a subject, such as:
Another public source of information involves websites that do not require special password or other access privileges. For example, a company’s website, or that of a trade association or other membership group with which a subject might be involved, could provide clues about the subject’s relationships, travels and past.
Even information that is no longer on a website might still be available to an investigator. The Wayback Machine at www.archive.org is an archive of more than 725 billion past pages on the internet (as at August 2022). Simply typing the URL of a website into the Wayback Machine will produce an index by date of prior versions of that website which have been archived and are available for viewing. Accordingly, an investigator may be able to find useful information from past editions of websites long after the information has been deleted.
Non-public records are private and confidential. Holders of these records are under no obligation to produce these records unless they have provided their consent or they are compelled to do so as a result of a legal process, such as a court order or subpoena. Records such as personal bank statements of individuals who may be the subject of an investigation fall into this category. Investigators normally do not have ready access to these records.
Another challenging and practically untraceable medium adopted by cybercriminals is the dark web, a small section of the deep web (content on the internet that is not readily accessible or visible through search engines) designed so it cannot be accessed through standard web browsers.[5] It allows anonymous private communications for legitimate reasons (e.g., protection of free speech), but also for the distribution of harmful information and purchase of illegal goods and services that law enforcement agencies have difficulty tracing. For example, once an organisation’s network has been breached, the intruder may extract sensitive information such as customer data, logins and passwords, banking details, taxpayer identification and social security numbers, and credit card details, and then sell this confidential information anonymously on dark web marketplace and forum websites to buyers across the world.
There are no anti-money laundering or know-your-customer (KYC)controls on the dark web. Most dark web sites are anonymous and difficult to attribute to an owner because these sites use a ‘.onion’ domain suffix, which can only be accessed via a Tor (The Onion Router) browser. Website traffic is bounced through randomly selected Tor entry, relay and exit nodes using separate embedded layers of data encryption for each hop in the network circuit (hence the term ‘onion’). In addition, perpetrators are increasingly using cryptocurrencies to conduct illicit financial transactions via the dark web while hiding their identities.
Dark web investigations therefore require specialist forensic investigative tools, such as a secure dark web browsing platform with network and malware protection (e.g., firewalls and virus scanning), and secured data storage that maintains a strong custody chain for digital evidence, backed by strict and auditable compliance controls. Such tools can be used to search and monitor dark web communications, capture cryptocurrency information (e.g., blockchain wallet addresses) and attempt to identify and locate cyber fraudsters while capturing and analysing digital evidence in a forensically sound manner.
When assisting counsel with preparing a request for a subpoena or other court-ordered production of private records, an investigator should be as detailed and specific as possible. Overly broad requests are normally either denied or result in potentially lengthy delays. The format of the records and the tools available to the investigator to analyse them should also be considered. For example, if records associated with a bank account are requested, rather than requesting ‘all records associated with the account’, it is normally better to itemise a list of those records, such as by requesting copies of:
A vendor’s internal records would normally be non-public and the vendor may be under no obligation to provide them to an investigator. However, a properly worded right-to-audit or access-to-records provision included in the contract between the organisation and the vendor may provide access to some of the most important records an investigator might need if fraud or corruption involving a vendor is suspected. Well-crafted access-to-records and right-to-audit clauses can enable an investigator to request and view a wide variety of records, including:
If a vendor is suspected of inflating their billings to the organisation in any manner, or there are indications of collusion between an organisation employee and a vendor, one of the first steps an investigator should perform is to carefully review the terms of the contract to assess the organisation’s rights to access or audit these records.
Studying the processes and internal controls involved in the transaction cycle in the investigation and the results from data analytics and email review will result in a population of documents and electronic records that are relevant. For example, in a corruption investigation, several paper documents or records may need to be reviewed:
These records might be reviewed for many different reasons. Among the most common are:
Testing for authenticity of the record itself or of individual signatures on documents normally involves a highly specialised skill, unless an anomaly is obvious. Accordingly, if an investigator suspects that a document on file is fraudulent or has been physically altered, or that a signature is not authentic, the document should be protected until someone with the specialised skills necessary can assess its authenticity. Examples of obvious deficiencies in documentation include:
In a corruption investigation, the authenticity or business purpose of an inter­mediary may be in question. The investigator should determine:
If the subject has misappropriated cash (via intercepting incoming funds intended for the organisation, stealing cash on hand, or fraudulently transferring funds from the organisation in connection with a disbursement fraud) one of the goals of most investigations is to secure the return of the funds. To do so, the investigation team must determine what the subject did with the money. Other sources of recovery may include culpable outside parties, including but not limited to collusive vendors, customers, agents and family members. Coverage for employee dishonesty losses under insurance policies and fidelity bonds may also be possible.
If the subject misappropriates other assets, a similar question must be addressed – where are the assets? Often, when they are stolen, the subject’s goal is a conversion to cash by selling them. In other cases, the stolen asset itself may be of use to the subject.
Depending on how assets were stolen, varying degrees of a trail might be left by the perpetrator, enabling the investigation team to forensically determine the flow of money after it has left the organisation. The trail may begin with the company’s books and records. However, it is usually intentionally made opaque by fraudsters through money laundering techniques such as layering, transfers to shell companies, nominee shareholders and the use of clandestine communication techniques, cryptocurrencies, and tax havens where criminal law enforcement assistance may be less effective. Many of the records necessary to fully trace assets are non-public. But investigators are sometimes surprised to learn that a subject has left a public trail of valuable clues regarding the disposition or location of illegally obtained funds or assets that can be identified through indirect techniques, such as social media and internet due diligence, interviews of people in the know, establishing connections to the fraudster’s other assets in more vulnerable venues and through multinational co-operation of law enforcement agencies.
Cryptocurrencies present unique challenges and new opportunities for investigators seeking to trace them and attempt their recovery. Bitcoin, Ethereum and many other emerging cryptocurrencies are easily accessible and widely accepted to the degree that fraudsters can, with minimal effort and risk, rely on them to move funds for the same purpose fiat currencies have long been used to transfer and conceal the source, nature and ownership of illicit funds. The added advantages of cryptocurrencies not requiring physical contact or interaction with banks has made them the payment method of choice for perpetrators of ransomware attacks and other schemes aimed directly at defrauding victims (e.g., internet-based advanced fee schemes). Therefore, forensic investigators must still follow the money trail and will be doing so more often with cryptocurrencies; however, there is another side to the coin, so to speak. While cryptocurrencies provide a degree of pseudonymity, especially those designed to provide enhanced privacy (e.g., Monero, Zcash), they do not provide complete anonymity. On the contrary, cryptocurrencies by design create an immutable public blockchain record of transactions that investigators can exploit to follow the money to a certain extent, provided they have the right tools and training.
As new cryptocurrencies are developed on different blockchains, investigators must also learn to follow transfers across them because fraudsters are already using cross-chain transfers to launder funds. This also requires the investigative blockchain data analysis tools (e.g., TRM Labs, Chainalysis) to be continually adapted and advanced to enable cross-chain analysis.
Although the on-blockchain transactions in cryptocurrencies can be traced using public blockchain data, for digital asset tracing to be successful for asset recovery or prosecution purposes investigators must be able to trace trans­actions beyond the blockchain to identify the counterparties and the ultimate beneficiaries. This requires identifying and pursuing additional information from virtual asset service providers (VASPs) such as cryptocurrency exchanges, hosted wallet platforms and financial institutions providing custodial services for crypto­currencies – the on-ramps and off-ramps to blockchains. These entry and exit points for cryptocurrencies are essential to fraudsters because for crypto­currencies to be more useful to the ultimate beneficiaries, the digital asset value must still be converted to or from fiat currency, or other tangible assets. Therefore, a key goal of blockchain data analysis is to correlate known blockchain addresses for on-ramps and off-ramps with blockchain data on suspect transactions to develop leads as to where cryptocurrency funds were converted. If this was a legitimate or regulated VASP, KYC information may have been recorded and more traditional investigative steps could be followed, such as the use of subpoenas, search warrants, regulatory inquiry or examination, witness interviews, etc.
A challenge for cryptocurrency-related investigations is the existence of illicit, unlicensed peer-to-peer exchanges that offer a way to convert fiat currencies to and from cryptocurrencies through unregulated entities that do not collect KYC information. There are also providers of cryptocurrency laundering services known as ‘mixers’ that offer a way for money launderers to obfuscate the actual parties to a blockchain transaction by mixing the cryptocurrency value with large numbers of other blockchain transactions going through the mixer. Even transactions flowing in and out of a legitimate exchange can become untraceable using blockchain data (without co-operation from the exchange to obtain internal account data) due to the sheer volume of transactions flowing through a large exchange (e.g., Coinbase).
In summary, investigating financial crimes involving cryptocurrency and digital asset tracing will require specialist blockchain analysis and intelligence tools and services, as described above, to identify leads to follow beyond the public blockchain. This may be easier to do when dealing with cryptocurrency compared to fiat currency that is physically transferred, but it also presents new challenges. Understanding these challenges and how to identify potential sources of additional attribution data for cryptocurrency transactions is essential. This will continue to be a changing landscape for investigators given the continually evolving technology and expanding array of new forms of blockchain-based cryptocurrencies and emerging decentralised finance (DeFi) platforms that promise to offer an even greater variety of financial services based on blockchain technology.
From an investigations perspective, one of the primary issues with reporting on environmental, social and governance (ESG) matters is the prevalence of greenwashing. Also, given there are multiple international standards and frameworks for ESG, without a single universal standard, the potential for errant reporting is an issue.
Increasing regulatory and stakeholder pressure to address and report on ESG factors creates risks of financial reporting fraud since ESG metrics and claims can be challenging to verify given the lack of a standardised reporting framework. In addition, demands are high for companies to demonstrate to their stakeholders – including not just investors, but also customers and vendors – that they are making progress on meeting ESG targets and initiatives. Forensic accountants will play an important role in identifying and addressing both internal and external ESG fraud risks. While it is too soon to ascertain the impact ESG will have on public and private companies, new and existing fraudulent activities are coming to the forefront in this context. ESG-related issues forensic accountants might investigate include the following:
Companies will be looking to forensic accountants to play a critical role in assessing fraud risks and investigating allegations related to ESG.
The rapid conversion of accounting and other records from paper-based systems to electronic systems, coupled with the explosion in the quantity and types of electronic data, has resulted in many changes in the field of forensic accounting and the requirements for investigations. Expertise in the evaluation and handling of electronic evidence is just one way in which forensic accounting has evolved. Focused and efficient use of data analytics as well as the ability to mine a universe of publicly available yet critical information regarding subjects, companies and their relationships are two additional ways in which forensic accounting has matured. On the other hand, operating within a web of global data privacy and other complex regulatory constraints can complicate the job of the forensic accountant. All in all, today’s forensic accountants are significantly more successful in identifying, investigating and mitigating fraud than in the past.
[1] Glenn Pomerantz and Paul Peterson are partners at BDO USA, LLP.
[2] U.S. Dep’t of Justice, Criminal Division, Evaluation of Corporate Compliance Programs (Updated June 2020).
[3] U.S. Dep’t of Justice, Criminal Division, Evaluation of Corporate Compliance Programs (Updated April 2019).
[4] Occupational Fraud 2022: A Report to the Nations, Association of Certified Fraud Examiners, available at https://acfepublic.s3.us-west-2.amazonaws.com/2022+Report+to+the+Nations.pdf.
[5] In addition to the dark web as a means to hide tracks, we are seeing an increase in the use of ephemeral messaging apps such as Signal and Telegram. These messaging apps allow users to hide communications and permanently delete messages.
Author | Partner
Author | Partner
Judith Seddon, Eleanor Davison, Christopher J Morvillo, Luke Tolaini, Celeste Koeleveld, F Joseph Warin and Winston Y Chan
Dechert LLP, Fountain Court Chambers, Clifford Chance and Gibson Dunn & Crutcher
Judith Seddon, Eleanor Davison, Christopher J Morvillo, Luke Tolaini, Celeste Koeleveld, F Joseph Warin and Winston Y Chan
Dechert LLP, Fountain Court Chambers, Clifford Chance and Gibson Dunn & Crutcher LLP
William H Devaney, Joanna Ludlam, Mark Banks and Aleesha Fowler
Baker McKenzie
Judith Seddon and Andris Ivanovs
Dechert LLP
F Joseph Warin, Winston Y Chan, Chris Jones and Duncan Taylor
Gibson Dunn & Crutcher
Alison Wilson, Sinead Casey, Elly Proudlock and Nick Marshall
Linklaters
Daniel Silver and Benjamin Berringer
Clifford Chance
Simon Airey and James Dobias
McDermott Will & Emery UK LLP
Bruce E Yannett and David Sarratt
Debevoise & Plimpton LLP
Nichola Peters, Michelle de Kluyver and Jaya Gupta
Addleshaw Goddard LLP
Avi Weitzman, John Nowak, Jena Sold and Amanda Pober
Paul Hastings LLP
Stuart Alford KC, Serrin A Turner, Gail E Crawford, Hayley Pizzey, Mair Williams and Matthew Valenti
Latham & Watkins LLP
Caroline Day and Louise Hodges
Kingsley Napley
John Nathanson, Katherine Stoller and Cáitrín McKiernan
Shearman & Sterling LLP
Glenn Pomerantz and Paul Peterson
BDO LLP
Matthew Bruce, Ali Kirby-Harris, Ben Morgan and Ali Sallaway
Freshfields Bruckhaus Deringer LLP
John D Buretta and Megan Y Lew
Cravath Swaine & Moore
Caroline Black, Clare Putnam Pozos, Chloe Binding and Carla Graff
Dechert LLP
Tamara Oppenheimer KC, Rebecca Loveridge and Samuel Rabinowitz
Fountain Court Chambers
Richard M Strassberg and Meghan K Spillane
Goodwin
Nicholas Purnell KC, Brian Spiro, Jessica Chappatte and Eamon McCarthy-Keen
Herbert Smith Freehills
Nicolas Bourtin
Sullivan & Cromwell LLP
Nichola Peters and Michelle de Kluyver
Addleshaw Goddard LLP
Sam Amir Toossi and Farhad Alavi
Akrivis Law Group, PLLC
Robin Barclay KC, Nico Leslie, Christopher J Morvillo, Celeste Koeleveld, Meredith George and Benjamin Berringer
Fountain Court Chambers and Clifford Chance
Tom Epps, Andrew Love, Julia Maskell and Benjamin Sharrock
Cooley LLP
Matthew Kutcher, Alexandra Eber, Matt K Nguyen, Wazhma Sadat and Kimberley Bishop
Cooley LLP
Jessica Lee and Chloë Kealey
Brown Rudnick LLP
James P Loonam and Ryan J Andreoli
Jones Day
Rita Mitchell, Simon Osborn-King and Yannis Yuen
Willkie Farr & Gallagher LLP
David Mortlock, Britt Mosman, Nikki Cronin and Ahmad El-Gamal
Willkie Farr & Gallagher LLP
Francesca Titus, Andrew Thornton-Dibb, Mehboob Dossa, William Boddy and Oscar Ratcliffe
McGuireWoods
Emily Goddard, Anna Kirkpatrick and Ellen Lake
Clifford Chance
Alison Pople KC, Johanna Walsh and Mellissa Curzon-Berners
Cloth Fair Chambers and Mishcon De Reya LLP
Kevin Roberts, Duncan Grieve and Charlotte Glaser
Cadwalader, Wickersham & Taft LLP
Jodi Avergun and Cheryl Risell
Cadwalader, Wickersham & Taft LLP
James Carlton, Sona Ganatra and David Murphy
Fox Williams LLP
Milton L Williams, Avni P Patel and Jacob Gardener
Walden Macht & Haran LLP
Natalie Sherborn, Carl Newman, Perveen Hill, Anthony Hanratty and Sophie Gilford
Withersworldwide
Christopher LaVigne, Martin Auerbach and Georges Lederman
Withersworldwide
Richard Sallybanks, Anoushka Warlow and Greta Barkle
BCL Solicitors LLP
Amanda Raad, Michael McGovern, Meghan Gilligan Palermo, Abraham Lee, Chloe Gordils and Ross MacPherson
Ropes & Gray
Elizabeth Robertson, Vanessa McGoldrick and Jason Williamson
Skadden, Arps, Slate, Meagher & Flom (UK) LLP
Victoria L Weatherford and Tera N Coleman
Baker & Hostetler
Ben Brandon and Aaron Watkins
Mishcon De Reya LLP and Kingsley Napley
Judith Seddon, Eleanor Davison, Christopher J Morvillo, Luke Tolaini, Celeste Koeleveld, F Joseph Warin and Winston Y Chan
Dechert LLP, Fountain Court Chambers, Clifford Chance and Gibson Dunn & Crutcher LLP
Kyle Wombolt and Pamela Kiesselbach
Herbert Smith Freehills
Robert Dalling and Karam Jardaneh
Jenner & Block
María González Calvet
Ropes & Gray
Michael S Diamant
Gibson Dunn & Crutcher LLP
Gustavo Morales Oliver, María Lorena Schiariti and María Agustina Testa
Marval, O’Farrell & Mairal
Tim Grave and Lara Gotti
Clifford Chance
Jonathan D King, Ricardo Caiado Lima, Antonio Tovo, André Sampaio Lacerda Ferraz and Mellina Bulgarini Gerhardt
DLA Piper LLP (US) and Campos Mello Advogados in Cooperation with DLA Piper
Sabrina A Bandali, Emrys Davis, Alan P Gardner, Laura Inglis, Amanda C McLachlan, Ruth E Promislow and Nathan J Shaheen
Bennett Jones
Rafael Collado González, Lucía Álvarez Galvez, Josefa Zamorano Quiroga and Camilo León Millones
FerradaNehme
Kyle Wombolt, Helen Tang and Tracey Cui
Herbert Smith Freehills
Marcela Cristina Blanco and Marcelo Buendía Vélez
Díaz Reus Abogados
Stéphane de Navacelle, Thomas Lapierre and Julie Zorrilla
Navacelle
Eike W Grunert, Michael Reich, David Stoppelmann and Stephan Appt
Pinsent Masons
Ilias Anagnostopoulos, Jerina Zapanti and Alexandros Tsagkalidis
Anagnostopoulos
Donna Wacker, Jonathan Wong, Anita Lam and Michael Wang
Clifford Chance
Sherbir Panag, Tanya Ganguli and Lavanyaa Chopra
Law Offices of Panag & Babu
Karen Reynolds and Connor Cassidy
Matheson
Giuseppe Fornari, Enrico Di Fiorino, Emanuele Angiuli and Lorena Morrone
Fornari e Associati
Antonio Cárdenas Arriola, Jonathan D King, Daniel González Estrada and Yesica L Garduño Sandoval
DLA Piper
William Fotherby and Caitlin Anyon-Peters
Meredith Connell
Dayo Adu, Temiloluwa Dosumu and Esther Randle
Famsville Solicitors
Alberto Rebaza, Augusto Loli, Héctor Gadea, María Haydée Zegarra and Sergio Mattos
Rebaza, Alcázar & de las Casas
Kabir Singh, Janice Goh and Joey Ng
Clifford Chance LLP
Edward James, Deirdré Simaan, Adam Gunn, Thorne Godinho, Sarah Burford and Jazquelyn Govender
Pinsent Masons
Jaime Alonso Gallo
Uría Menéndez
Flavio Romerio, Claudio Bazzani, Katrin Ivell and Reto Ferrari-Visca
Homburger
Burcu Tuzcu Ersin, E Benan Arseven and Z Ertunç Şirin
Moroğlu Arseven
Simon Airey, James Dobias and William Merry
McDermott Will & Emery UK LLP
Bradley J Bolerjack and Francisca M Mok
Reed Smith LLP
Get more from GIR
Sign up to our daily email alert

Sign up

Unlock unlimited access to all Global Investigations Review content

source

Read more
  • Published in Uncategorized
No Comments

Executive Order on Advancing Biotechnology and Biomanufacturing … – The White House

Thursday, 05 January 2023 by admin

The White House
1600 Pennsylvania Ave NW
Washington, DC 20500
By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby ordered as follows:
Section 1.  Policy.  It is the policy of my Administration to coordinate a whole-of-government approach to advance biotechnology and biomanufacturing towards innovative solutions in health, climate change, energy, food security, agriculture, supply chain resilience, and national and economic security.  Central to this policy and its outcomes are principles of equity, ethics, safety, and security that enable access to technologies, processes, and products in a manner that benefits all Americans and the global community and that maintains United States technological leadership and economic competitiveness.
Biotechnology harnesses the power of biology to create new services and products, which provide opportunities to grow the United States economy and workforce and improve the quality of our lives and the environment.  The economic activity derived from biotechnology and biomanufacturing is referred to as “the bioeconomy.”  The COVID-19 pandemic has demonstrated the vital role of biotechnology and biomanufacturing in developing and producing life-saving diagnostics, therapeutics, and vaccines that protect Americans and the world.  Although the power of these technologies is most vivid at the moment in the context of human health, biotechnology and biomanufacturing can also be used to achieve our climate and energy goals, improve food security and sustainability, secure our supply chains, and grow the economy across all of America.
For biotechnology and biomanufacturing to help us achieve our societal goals, the United States needs to invest in foundational scientific capabilities.  We need to develop genetic engineering technologies and techniques to be able to write circuitry for cells and predictably program biology in the same way in which we write software and program computers; unlock the power of biological data, including through computing tools and artificial intelligence; and advance the science of scale‑up production while reducing the obstacles for commercialization so that innovative technologies and products can reach markets faster.
Simultaneously, we must take concrete steps to reduce biological risks associated with advances in biotechnology.  We need to invest in and promote biosafety and biosecurity to ensure that biotechnology is developed and deployed in ways that align with United States principles and values and international best practices, and not in ways that lead to accidental or deliberate harm to people, animals, or the environment.  In addition, we must safeguard the United States bioeconomy, as foreign adversaries and strategic competitors alike use legal and illegal means to acquire United States technologies and data, including biological data, and proprietary or precompetitive information, which threatens United States economic competitiveness and national security.
We also must ensure that uses of biotechnology and biomanufacturing are ethical and responsible; are centered on a foundation of equity and public good, consistent with Executive Order 13985 of January 20, 2021 (Advancing Racial Equity and Support for Underserved Communities Through the Federal Government); and are consistent with respect for human rights.  Resources should be invested justly and equitably so that biotechnology and biomanufacturing technologies benefit all Americans, especially those in underserved communities, as well as the broader global community.
To achieve these objectives, it is the policy of my Administration to:
(a)  bolster and coordinate Federal investment in key research and development (R&D) areas of biotechnology and biomanufacturing in order to further societal goals;
(b)  foster a biological data ecosystem that advances biotechnology and biomanufacturing innovation, while adhering to principles of security, privacy, and responsible conduct of research;
(c)  improve and expand domestic biomanufacturing production capacity and processes, while also increasing piloting and prototyping efforts in biotechnology and biomanufacturing to accelerate the translation of basic research results into practice;
(d)  boost sustainable biomass production and create climate-smart incentives for American agricultural producers and forest landowners;
(e)  expand market opportunities for bioenergy and biobased products and services;
(f)  train and support a diverse, skilled workforce and a next generation of leaders from diverse groups to advance biotechnology and biomanufacturing;
(g)  clarify and streamline regulations in service of a science- and risk-based, predictable, efficient, and transparent system to support the safe use of products of biotechnology;
(h)  elevate biological risk management as a cornerstone of the life cycle of biotechnology and biomanufacturing R&D, including by providing for research and investment in applied biosafety and biosecurity innovation;
(i)  promote standards, establish metrics, and develop systems to grow and assess the state of the bioeconomy; to better inform policy, decision-making, and investments in the bioeconomy; and to ensure equitable and ethical development of the bioeconomy;
(j)  secure and protect the United States bioeconomy by adopting a forward‑looking, proactive approach to assessing and anticipating threats, risks, and potential vulnerabilities (including digital intrusion, manipulation, and exfiltration efforts by foreign adversaries), and by partnering with the private sector and other relevant stakeholders to jointly mitigate risks to protect technology leadership and economic competitiveness; and
(k)  engage the international community to enhance biotechnology R&D cooperation in a way that is consistent with United States principles and values and that promotes best practices for safe and secure biotechnology and biomanufacturing research, innovation, and product development and use.
The efforts undertaken pursuant to this order to further these policies shall be referred to collectively as the National Biotechnology and Biomanufacturing Initiative.
Sec. 2.  Coordination.  The Assistant to the President for National Security Affairs (APNSA), in consultation with the Assistant to the President for Economic Policy (APEP) and the Director of the Office of Science and Technology Policy (OSTP), shall coordinate the executive branch actions necessary to implement this order through the interagency process described in National Security Memorandum 2 of February 4, 2021 (Renewing the National Security Council System) (NSM-2 process).  In implementing this order, heads of agencies (as defined in section 13 of this order) shall, as appropriate and consistent with applicable law, consult outside stakeholders, such as those in industry; academia; nongovernmental organizations; communities; labor unions; and State, local, Tribal, and territorial governments to advance the policies described in section 1 of this order.
Sec. 3.  Harnessing Biotechnology and Biomanufacturing R&D to Further Societal Goals.  (a)  Within 180 days of the date of this order, the heads of agencies specified in subsections (a)(i)-(v) of this section shall submit the following reports on biotechnology and biomanufacturing to further societal goals related to health, climate change and energy, food and agricultural innovation, resilient supply chains, and cross-cutting scientific advances.  The reports shall be submitted to the President through the APNSA, in coordination with the Director of the Office of Management and Budget (OMB), the APEP, the Assistant to the President for Domestic Policy (APDP), and the Director of OSTP.
(i)    The Secretary of Health and Human Services (HHS), in consultation with the heads of appropriate agencies as determined by the Secretary, shall submit a report assessing how to use biotechnology and biomanufacturing to achieve medical breakthroughs, reduce the overall burden of disease, and improve health outcomes.
(ii)   The Secretary of Energy, in consultation with the heads of appropriate agencies as determined by the Secretary, shall submit a report assessing how to use biotechnology, biomanufacturing, bioenergy, and biobased products to address the causes and adapt to and mitigate the impacts of climate change, including by sequestering carbon and reducing greenhouse gas emissions.
(iii)  The Secretary of Agriculture, in consultation with the heads of appropriate agencies as determined by the Secretary, shall submit a report assessing how to use biotechnology and biomanufacturing for food and agriculture innovation, including by improving sustainability and land conservation; increasing food quality and nutrition; increasing and protecting agricultural yields; protecting against plant and animal pests and diseases; and cultivating alternative food sources.
(iv)   The Secretary of Commerce, in consultation with the Secretary of Defense, the Secretary of HHS, and the heads of other appropriate agencies as determined by the Secretary of Commerce, shall submit a report assessing how to use biotechnology and biomanufacturing to strengthen the resilience of United States supply chains.
(v)    The Director of the National Science Foundation (NSF), in consultation with the heads of appropriate agencies as determined by the Director, shall submit a report identifying high-priority fundamental and use‑inspired basic research goals to advance biotechnology and biomanufacturing and to address the societal goals identified in this section.
(b)  Each report specified in subsection (a) of this section shall identify high-priority basic research and technology development needs to achieve the overall objectives described in subsection (a) of this section, as well as opportunities for public-private collaboration.  Each of these reports shall also include recommendations for actions to enhance biosafety and biosecurity to reduce risk throughout the biotechnology R&D and biomanufacturing lifecycles.
(c)  Within 100 days of receiving the reports required under subsection (a) of this section, the Director of OSTP, in coordination with the Director of OMB, the APNSA, the APEP, the APDP, and the heads of appropriate agencies as determined through the NSM-2 process, shall develop a plan (implementation plan) to implement the recommendations in the reports.  The development of this implementation plan shall also include the solicitation of input from external experts regarding potential ethical implications or other societal impacts, including environmental sustainability and environmental justice, of the recommendations contained in the reports required under subsection (a) of this section.  The implementation plan shall include assessments and make recommendations regarding any such implications or impacts.
(d)  Within 90 days of the date of this order, the Director of OMB, in consultation with the heads of appropriate agencies as determined through the NSM-2 process, shall perform a budget crosscut to identify existing levels of agency spending on biotechnology- and biomanufacturing-related activities to inform the development of the implementation plan described in subsection (c) of this section.
(e)  The APNSA, in coordination with the Director of OMB, the APEP, the APDP, and the Director of OSTP, shall review the reports required under subsection (a) of this section and shall submit the reports to the President in an unclassified form, but may include a classified annex.
(f)  The APNSA, in coordination with the Director of OMB, the APEP, the APDP, and the Director of OSTP, shall include a cover memorandum for the reports submitted pursuant to subsection (a) of this section, along with the implementation plan required under subsection (c) of this section, in which they make any additional overall recommendations for advancing biotechnology and biomanufacturing.
(g)  Within 2 years of the date of this order, agencies at which recommendations are directed in the implementation plan required under subsection (c) of this section shall report to the Director of OMB, the APNSA, the APEP, the APDP, and the Director of OSTP on measures taken and resources allocated to enhance biotechnology and biomanufacturing, consistent with the implementation plan described in subsection (c) of this section.
(h)  Within 180 days of the date of this order, the President’s Council of Advisors on Science and Technology shall submit to the President and make publicly available a report on the bioeconomy that provides recommendations on how to maintain United States competitiveness in the global bioeconomy.
Sec. 4.  Data for the Bioeconomy.  (a)  In order to facilitate development of the United States bioeconomy, my Administration shall establish a Data for the Bioeconomy Initiative (Data Initiative) that will ensure that high-quality, wide-ranging, easily accessible, and secure biological data sets can drive breakthroughs for the United States bioeconomy.  To assist in the development of the Data Initiative, the Director of OSTP, in coordination with the Director of OMB and the heads of appropriate agencies as determined by the Director of OSTP, and in consultation with external stakeholders, shall issue a report within 240 days of the date of this order that:
(i)    identifies the data types and sources, to include genomic and multiomic information, that are most critical to drive advances in health, climate, energy, food, agriculture, and biomanufacturing, as well as other bioeconomy-related R&D, along with any data gaps;
(ii)   sets forth a plan to fill any data gaps and make new and existing public data findable, accessible, interoperable, and reusable in ways that are equitable, standardized, secure, and transparent, and that are integrated with platforms that enable the use of advanced computing tools;
(iii)  identifies — based on the data types and sources described in subsection (a)(i) of this section — security, privacy, and other risks (such as malicious misuses, manipulation, exfiltration, and deletion), and provides a data-protection plan to mitigate these risks; and
(iv)   outlines the Federal resources, legal authorities, and actions needed to support the Data Initiative and achieve the goals outlined in this subsection, with a timeline for action.
(b)  The Secretary of Homeland Security, in coordination with the Secretary of Defense, the Secretary of Agriculture, the Secretary of Commerce (acting through the Director of the National Institute of Standards and Technology (NIST)), the Secretary of HHS, the Secretary of Energy, and the Director of OMB, shall identify and recommend relevant cybersecurity best practices for biological data stored on Federal Government information systems, consistent with applicable law and Executive Order 14028 of May 12, 2021 (Improving the Nation’s Cybersecurity).
(c)  The Secretary of Commerce, acting through the Director of NIST and in coordination with the Secretary of HHS, shall consider bio-related software, including software for laboratory equipment, instrumentation, and data management, in establishing baseline security standards for the development of software sold to the United States Government, consistent with section 4 of Executive Order 14028.
Sec. 5.  Building a Vibrant Domestic Biomanufacturing Ecosystem.  (a)  Within 180 days of the date of this order, the APNSA and the APEP, in coordination with the Secretary of Defense, the Secretary of Agriculture, the Secretary of Commerce, the Secretary of HHS, the Secretary of Energy, the Director of NSF, and the Administrator of the National Aeronautics and Space Administration (NASA), shall develop a strategy that identifies policy recommendations to expand domestic biomanufacturing capacity for products spanning the health, energy, agriculture, and industrial sectors, with a focus on advancing equity, improving biomanufacturing processes, and connecting relevant infrastructure.  Additionally, this strategy shall identify actions to mitigate risks posed by foreign adversary involvement in the biomanufacturing supply chain and to enhance biosafety, biosecurity, and cybersecurity in new and existing infrastructure.
(b)  Agencies identified in subsections (b)(i)-(iv) of this section shall direct resources, as appropriate and consistent with applicable law, towards the creation or expansion of programs that support a vibrant domestic biomanufacturing ecosystem, as informed by the strategy developed pursuant to subsection (a) of this section:
(i)    the NSF shall expand its existing Regional Innovation Engine program to advance emerging technologies, including biotechnology;
(ii)   the Department of Commerce shall address challenges in biomanufacturing supply chains and related biotechnology development infrastructure;
(iii)  the Department of Defense shall incentivize the expansion of domestic, flexible industrial biomanufacturing capacity for a wide range of materials that can be used to make a diversity of products for the defense supply chain; and
(iv)   the Department of Energy shall support research to accelerate bioenergy and bioproduct science advances, to accelerate biotechnology and bioinformatics tool development, and to reduce the hurdles to commercialization, including through incentivizing the engineering scale-up of promising biotechnologies and the expansion of biomanufacturing capacity.
(c)  Within 1 year of the date of this order, the Secretary of Agriculture, in consultation with the heads of appropriate agencies as determined by the Secretary, shall submit a plan to the President, through the APNSA and the APEP, to support the resilience of the United States biomass supply chain for domestic biomanufacturing and biobased product manufacturing, while also advancing food security, environmental sustainability, and the needs of underserved communities.  This plan shall include programs to encourage climate-smart production and use of domestic biomass, along with budget estimates, including accounting for funds appropriated for Fiscal Year (FY) 2022 and proposed in the President’s FY 2023 Budget.
(d)  Within 180 days of the date of this order, the Secretary of Homeland Security, in coordination with the heads of appropriate agencies as determined by the Secretary, shall:
(i)   provide the APNSA with vulnerability assessments of the critical infrastructure and national critical functions associated with the bioeconomy, including cyber, physical, and systemic risks, and recommendations to secure and make resilient these components of our infrastructure and economy; and
(ii)  enhance coordination with industry on threat information sharing, vulnerability disclosure, and risk mitigation for cybersecurity and infrastructure risks to the United States bioeconomy, including risks to biological data and related physical and digital infrastructure and devices.  This coordination shall be informed in part by the assessments described in subsection (d)(i) of this section.
Sec. 6.  Biobased Products Procurement.  (a)  Consistent with the requirements of 7 U.S.C. 8102, within 1 year of the date of this order, procuring agencies as defined in 7 U.S.C. 8102(a)(1)(A) that have not yet established a biobased procurement program as described in 7 U.S.C. 8102(a)(2) shall establish such a program.
(b)  Procuring agencies shall require that, within 2 years of the date of this order, all appropriate staff (including contracting officers, purchase card managers, and purchase card holders) complete training on biobased product purchasing.  The Office of Federal Procurement Policy, within OMB, in cooperation with the Secretary of Agriculture, shall provide training materials for procuring agencies.
(c)  Within 180 days of the date of this order and annually thereafter, procuring agencies shall report previous fiscal year spending to the Director of OMB on the following:
(i)    the number and dollar value of contracts entered into during the previous fiscal year that include the direct procurement of biobased products;
(ii)   the number of service and construction (including renovations) contracts entered into during the previous fiscal year that include language on the use of biobased products; and
(iii)  the types and dollar values of biobased products actually used by contractors in carrying out service and construction (including renovations) contracts during the previous fiscal year.
(d)  The requirements in subsection (c) of this section shall not apply to purchase card transactions and other “[a]ctions not reported” to the Federal Procurement Data System pursuant to 48 CFR 4.606(c). 
(e)  Within 1 year of the date of this order and annually thereafter, the Director of OMB shall publish information on biobased procurement resulting from the data collected under subsection (c) of this section and information reported under 7 U.S.C. 8102, along with other related information, and shall use scorecards or similar systems to encourage increased biobased purchasing.
(f)  Within 1 year of the date of this order and annually thereafter, procuring agencies shall report to the Secretary of Agriculture specific categories of biobased products that are unavailable to meet their procurement needs, along with desired performance standards for currently unavailable products and other relevant specifications.  The Secretary of Agriculture shall publish this information annually.  When new categories of biobased products become commercially available, the Secretary of Agriculture shall designate new product categories for preferred Federal procurement, as prescribed by 7 U.S.C. 8102.
(g)  Procuring agencies shall strive to increase by 2025 the amount of biobased product obligations or the number or dollar value of biobased-only contracts, as reflected in the information described in subsection (c) of this section, and as appropriate and consistent with applicable law.
Sec. 7.  Biotechnology and Biomanufacturing Workforce.  (a)  The United States Government shall expand training and education opportunities for all Americans in biotechnology and biomanufacturing.  To support this objective, within 200 days of the date of this order, the Secretary of Commerce, the Secretary of Labor, the Secretary of Education, the APDP, the Director of OSTP, and the Director of NSF shall produce and make publicly available a plan to coordinate and use relevant Federal education and training programs, while also recommending new efforts to promote multi-disciplinary education programs.  This plan shall promote the implementation of formal and informal education and training (such as opportunities at technical schools and certificate programs), career and technical education, and expanded career pathways into existing degree programs for biotechnology and biomanufacturing.  This plan shall also include a focused discussion of Historically Black Colleges and Universities, Tribal Colleges and Universities, and Minority Serving Institutions and the extent to which agencies can use existing statutory authorities to promote racial and gender equity and support underserved communities, consistent with the policy established in Executive Order 13985.  Finally, this plan shall account for funds appropriated for FY 2022 and proposed in the President’s FY 2023 Budget.
(b)  Within 2 years of the date of this order, agencies that support relevant Federal education and training programs as described in subsection (a) of this section shall report to the President through the APNSA, in coordination with the Director of OMB, the ADPD, and the Director of OSTP, on measures taken and resources allocated to enhance workforce development pursuant to the plan described in subsection (a) of this section.
Sec. 8.  Biotechnology Regulation Clarity and Efficiency.  Advances in biotechnology are rapidly altering the product landscape.  The complexity of the current regulatory system for biotechnology products can be confusing and create challenges for businesses to navigate.  To improve the clarity and efficiency of the regulatory process for biotechnology products, and to enable products that further the societal goals identified in section 3 of this order, the Secretary of Agriculture, the Administrator of the Environmental Protection Agency, and the Commissioner of Food and Drugs, in coordination with the Director of OMB, the ADPD, and the Director of OSTP, shall:
(a)  within 180 days of the date of this order, identify areas of ambiguity, gaps, or uncertainties in the January 2017 Update to the Coordinated Framework for the Regulation of Biotechnology or in the policy changes made pursuant to Executive Order 13874 of June 11, 2019 (Modernizing the Regulatory Framework for Agricultural Biotechnology Products), including by engaging with developers and external stakeholders, and through horizon scanning for novel products of biotechnology;
(b)  within 100 days of completing the task in subsection (a) of this section, provide to the general public plain-language information regarding the regulatory roles, responsibilities, and processes of each agency, including which agency or agencies are responsible for oversight of different types of products developed with biotechnology, with case studies, as appropriate;
(c)  within 280 days of the date of this order, provide a plan to the Director of OMB, the ADPD, and the Director of OSTP with processes and timelines to implement regulatory reform, including identification of the regulations and guidance documents that can be updated, streamlined, or clarified; and identification of potential new guidance or regulations, where needed;
(d)  within 1 year of the date of this order, build on the Unified Website for Biotechnology Regulation developed pursuant to Executive Order 13874 by including on the website the information developed under subsection (b) of this section, and by enabling developers of biotechnology products to submit inquiries about a particular product and promptly receive a single, coordinated response that provides, to the extent practicable, information and, when appropriate, informal guidance regarding the process that the developers must follow for Federal regulatory review; and
(e)  within 1 year of the date of this order, and annually thereafter for a period of 3 years, provide an update regarding progress in implementing this section to the Director of OMB, the United States Trade Representative (USTR), the APNSA, the ADPD, and the Director of OSTP.  Each 1-year update shall identify any gaps in statutory authority that should be addressed to improve the clarity and efficiency of the regulatory process for biotechnology products, and shall recommend additional executive actions and legislative proposals to achieve such goals.
Sec. 9.  Reducing Risk by Advancing Biosafety and Biosecurity.  (a)  The United States Government shall launch a Biosafety and Biosecurity Innovation Initiative, which shall seek to reduce biological risks associated with advances in biotechnology, biomanufacturing, and the bioeconomy.  Through the Biosafety and Biosecurity Innovation Initiative — which shall be established by the Secretary of HHS, in coordination with the heads of other relevant agencies as determined by the Secretary — agencies that fund, conduct, or sponsor life sciences research shall implement the following actions, as appropriate and consistent with applicable law:
(i)   support, as a priority, investments in applied biosafety research and innovations in biosecurity to reduce biological risk throughout the biotechnology R&D and biomanufacturing lifecycles; and
(ii)  use Federal investments in biotechnology and biomanufacturing to incentivize and enhance biosafety and biosecurity practices and best practices throughout the United States and international research enterprises.
(b)  Within 180 days of the date of this order, the Secretary of HHS and the Secretary of Homeland Security, in coordination with agencies that fund, conduct, or sponsor life sciences research, shall produce a plan for biosafety and biosecurity for the bioeconomy, including recommendations to:
(i)   enhance applied biosafety research and bolster innovations in biosecurity to reduce risk throughout the biotechnology R&D and biomanufacturing lifecycles; and
(ii)  use Federal investments in biological sciences, biotechnology, and biomanufacturing to enhance biosafety and biosecurity best practices throughout the bioeconomy R&D enterprise.
(c)  Within 1 year of the date of this order, agencies that fund, conduct, or sponsor life sciences research shall report to the APNSA, through the Assistant to the President and Homeland Security Advisor, on efforts to achieve the objectives described in subsection (a) of this section.
Sec. 10.  Measuring the Bioeconomy.  (a)  Within 90 days of the date of this order, the Secretary of Commerce, through the Director of NIST, shall, in consultation with other agencies as determined by the Director, industry, and other stakeholders, as appropriate, create and make publicly available a lexicon for the bioeconomy, with consideration of relevant domestic and international definitions and with the goal of assisting in the development of measurements and measurement methods for the bioeconomy that support uses such as economic measurement, risk assessments, and the application of machine learning and other artificial intelligence tools.
(b)  The Chief Statistician of the United States, in coordination with the Secretary of Agriculture, the Secretary of Commerce, the Director of NSF, and the heads of other appropriate agencies as determined by the Chief Statistician, shall improve and enhance Federal statistical data collection designed to characterize the economic value of the United States bioeconomy, with a focus on the contribution of biotechnology to the bioeconomy.  This effort shall include:
(i)   within 180 days of the date of this order, assessing, through the Department of Commerce’s Bureau of Economic Analysis, the feasibility, scope, and costs of developing a national measurement of the economic contributions of the bioeconomy, and, in particular, the contributions of biotechnology to the bioeconomy, including recommendations and a plan for next steps regarding whether development of such a measurement should be pursued; and
(ii)  within 120 days of the date of this order, establishing an Interagency Technical Working Group (ITWG), chaired by the Chief Statistician of the United States, which shall include representatives of the Department of Agriculture, the Department of Commerce, OSTP, the NSF, and other appropriate agencies as determined by the Chief Statistician of the United States.
(A)  Within 1 year of the date of this order, the ITWG shall recommend bioeconomy-related revisions to the North American Industry Classification System (NAICS) and the North American Product Classification System (NAPCS) to the Economic Classification Policy Committee.  In 2026, the ITWG shall initiate a review process of the 2023 recommendations and update the recommendations, as appropriate, to provide input to the 2027 NAICS and NAPCS revision processes.
(B)  Within 18 months of the date of this order, the ITWG shall provide a report to the Chief Statistician of the United States describing the Federal statistical collections of information that take advantage of bioeconomy-related NAICS and NAPCS codes, and shall include recommendations to implement any bioeconomy-related changes as part of the 2022 revisions of the NAICS and NAPCS.  As part of its work, the ITWG shall consult with external stakeholders.
Sec. 11.  Assessing Threats to the United States Bioeconomy.  (a)  The Director of National Intelligence (DNI) shall lead a comprehensive interagency assessment of ongoing, emerging, and future threats to United States national security from foreign adversaries against the bioeconomy and from foreign adversary development and application of biotechnology and biomanufacturing, including acquisition of United States capabilities, technologies, and biological data.  As part of this effort, the DNI shall work closely with the Department of Defense to assess technical applications of biotechnology and biomanufacturing that could be misused by a foreign adversary for military purposes or that could otherwise pose a risk to the United States.  In support of these objectives, the DNI shall identify elements of the bioeconomy of highest concern and establish processes to support ongoing threat identification and impact assessments.
(b)  Within 240 days of the date of this order, the DNI shall provide classified assessments to the APNSA related to:
(i)   threats to United States national and economic security posed by foreign adversary development and application of biomanufacturing; and
(ii)  foreign adversary means of, and intended usages related to, acquisition of United States biotechnologies, biological data, and proprietary or precompetitive information.
(c)  Within 120 days of receiving the DNI’s assessments, the APNSA shall coordinate with the heads of relevant agencies as determined through the NSM-2 process to develop and finalize a plan to mitigate risks to the United States bioeconomy, based upon the threat identification and impact assessments described in subsection (a) of this section, the vulnerability assessments described in section 5(d) of this order, and other relevant assessments or information.  The plan shall identify where executive action, regulatory action, technology protection, or statutory authorities are needed to mitigate these risks in order to support the technology leadership and economic competitiveness of the United States bioeconomy.
(d)  The United States Government contracts with a variety of providers to support its functioning, including by contracting for services related to the bioeconomy.  It is important that these contracts are awarded according to full and open competition, as consistent with the Competition in Contracting Act of 1984 (Public Law 98-369, 98 Stat. 1175).  In accordance with these objectives, and within 1 year of the date of this order, the Director of OSTP, in coordination with the Secretary of Defense, the Attorney General, the Secretary of HHS, the Secretary of Energy, the Secretary of Homeland Security, the DNI, the Administrator of NASA, and the Administrator of General Services, shall review the national security implications of existing requirements related to Federal procurement — including requirements contained in the Federal Acquisition Regulation (FAR) and the Defense Federal Acquisition Regulation Supplement — and shall recommend updates to those requirements to the FAR Council, the Director of OMB, and the heads of other appropriate agencies as determined through the NSM-2 process.  The recommendations shall aim to standardize pre-award data collection to enable due diligence review of conflict of interest; conflict of commitment; foreign ownership, control, or influence; or other potential national security concerns.  The recommendations shall also include legislative proposals, as relevant.
(e)  The Director of OMB shall issue a management memorandum to agencies, or take other appropriate action, to provide generalized guidance based on the recommendations received pursuant to subsection (d) of this section.
Sec. 12.  International Engagement.  (a)  The Department of State and other agencies that engage with international partners as part of their missions shall undertake the following actions with foreign partners, as appropriate and consistent with applicable law — with a specific focus on developing countries, international organizations, and nongovernmental entities — to promote and protect both the United States and global bioeconomies:
(i)     enhance cooperation, including joint research projects and expert exchanges, on biotechnology R&D, especially in genomics;
(ii)    encourage regulatory cooperation and the adoption of best practices to evaluate and promote innovative products, with an emphasis on those practices and products that support sustainability and climate objectives;
(iii)   develop joint training arrangements and initiatives to support bioeconomy jobs in the United States;
(iv)    work to promote the open sharing of scientific data, including genetic sequence data, to the greatest extent possible in accordance with applicable law and policy, while seeking to ensure that any applicable access and benefit-sharing mechanisms do not hinder the rapid and sustainable development of innovative products and biotechnologies;
(v)     conduct horizon scanning to anticipate threats to the global bioeconomy, including national security threats from foreign adversaries acquiring sensitive technologies or data, or disrupting essential bio-related supply chains, and to identify opportunities to address those threats;
(vi)    engage allies and partners to address shared national security threats;
(vii)   develop, and work to promote and implement, biosafety and biosecurity best practices, tools, and resources bilaterally and multilaterally to facilitate appropriate oversight for life sciences, dual-use research of concern, and research involving potentially pandemic and other high-consequence pathogens, and to enhance sound risk management of biotechnology- and biomanufacturing-related R&D globally; and
(viii)  explore how to align international classifications of biomanufactured products, as appropriate, to measure the value of those products to both the United States and global bioeconomies.
(b)  Within 180 days of the date of this order, the Secretary of State, in coordination with the USTR and the heads of other agencies as determined by the Secretary, as appropriate, shall submit to the APNSA a plan to support the objectives described in subsection (a) of this section with foreign partners, international organizations, and nongovernmental entities.
Sec. 13.  Definitions.  For purposes of this order:
(a)  The term “agency” has the meaning given that term by 44 U.S.C. 3502(1).
(b)  The term “biotechnology” means technology that applies to or is enabled by life sciences innovation or product development.
(c)  The term “biomanufacturing” means the use of biological systems to develop products, tools, and processes at commercial scale.
(d)  The term “bioeconomy” means economic activity derived from the life sciences, particularly in the areas of biotechnology and biomanufacturing, and includes industries, products, services, and the workforce.
(e)  The term “biological data” means the information, including associated descriptors, derived from the structure, function, or process of a biological system(s) that is measured, collected, or aggregated for analysis.
(f)  The term “biomass” means any material of biological origin that is available on a renewable or recurring basis.  Examples of biomass include plants, trees, algae, and waste material such as crop residue, wood waste, animal waste and byproducts, food waste, and yard waste.
(g)  The term “biobased product” has the meaning given that term in 7 U.S.C. 8101(4).
(h)  The term “bioenergy” means energy derived in whole or in significant part from biomass.
(i)  The term “multiomic information” refers to combined information derived from data, analysis, and interpretation of multiple omics measurement technologies to identify or analyze the roles, relationships, and functions of biomolecules (including nucleic acids, proteins, and metabolites) that make up a cell or cellular system.  Omics are disciplines in biology that include genomics, transcriptomics, proteomics, and metabolomics.
(j)  The term “key R&D areas” includes fundamental R&D of emerging biotechnologies, including engineering biology; predictive engineering of complex biological systems, including the designing, building, testing, and modeling of entire living cells, cell components, or cellular systems; quantitative and theory-driven multi-disciplinary research to maximize convergence with other enabling technologies; and regulatory science, including the development of new information, criteria, tools, models, and approaches to inform and assist regulatory decision-making.  These R&D priorities should be coupled with advances in predictive modeling, data analytics, artificial intelligence, bioinformatics, high-performance and other advanced computing systems, metrology and data-driven standards, and other non-life science enabling technologies.
(k)  The terms “equity” and “underserved communities” have the meanings given those terms by sections 2(a) and 2(b) of Executive Order 13985.
(l)  The term “Tribal Colleges and Universities” has the meaning given that term by section 5(e) of Executive Order 14049 of October 11, 2021 (White House Initiative on Advancing Educational Equity, Excellence, and Economic Opportunity for Native Americans and Strengthening Tribal Colleges and Universities).
(m)  The term “Historically Black Colleges and Universities” has the meaning given that term by section 4(b) of Executive Order 14041 of September 3, 2021 (White House Initiative on Advancing Educational Equity, Excellence, and Economic Opportunity Through Historically Black Colleges and Universities).
(n)  The term “minority serving institution” has the meaning given that term by 38 U.S.C. 3698(f)(4).
(o)  The term “foreign adversary” has the meaning given that term by section 3(b) of Executive Order 14034 of June 9, 2021 (Protecting Americans’ Sensitive Data From Foreign Adversaries).
(p)  The term “life sciences” means all sciences that study or use living organisms, viruses, or their products, including all disciplines of biology and all applications of the biological sciences (including biotechnology, genomics, proteomics, bioinformatics, and pharmaceutical and biomedical research and techniques), but excluding scientific studies associated with radioactive materials or toxic chemicals that are not of biological origin or synthetic analogues of toxins.
Sec. 14.  General Provisions.  (a)  Nothing in this order shall be construed to impair or otherwise affect:
(i)   the authority granted by law to an executive department or agency, or the head thereof; or
(ii)  the functions of the Director of OMB relating to budgetary, administrative, or legislative proposals.
(b)  This order shall be implemented consistent with applicable law and subject to the availability of appropriations.
(c)  This order is not intended to, and does not, create any right or benefit, substantive or procedural, enforceable at law or in equity by any party against the United States, its departments, agencies, or entities, its officers, employees, or agents, or any other person.                            
JOSEPH R. BIDEN JR.

THE WHITE HOUSE,
  September 12, 2022.
We’ll be in touch with the latest information on how President Biden and his administration are working for the American people, as well as ways you can get involved and help our country build back better.
Opt in to send and receive text messages from President Biden.
The White House
1600 Pennsylvania Ave NW
Washington, DC 20500

source

Read more
  • Published in Uncategorized
No Comments

Best IT asset management software for 2023 – TechRepublic

Wednesday, 04 January 2023 by admin

Best IT asset management software for 2023
Your email has been sent
An asset management software is a necessary part of every IT department. Find out which one is best for your business.

Network of devices and mobile apps
Image: elenabsl/Adobe Stock

If the winds are blowing toward greater investment in tech, the IT weathervane is definitely pointing in that direction: According to data outlined in the 2022 State of IT report by Spiceworks’ Ziff Davis, most businesses (53%) expect tech spending to increase year-over-year in the next 12 months. Gartner predicts IT spending will grow by 3% throughout 2022, despite the current financial environment.
“The current levels of volatility being seen in both inflation and currency exchange rates is not expected to deter CIOs’ investment plans for 2022,” said John-David Lovelock, vice president of Gartner.
Lovelack further warned that organizations that opt out of investing in the short term “will likely fall behind in the medium term and risk not being around in the long term.”
Among top categories on corporate IT shopping lists are data center systems, software and IT devices. Gartner also reports that companies are favoring cloud-based services for IT upgrades versus ownership of locally-hosted platforms (18.4% growth in 2021 and expected growth of 22.1% in 2022).
SEE: IT management software: The ultimate buyer’s guide (TechRepublic)
Jump to:
Tying it all together is IT asset management software, which is used to track and manage an organization’s physical and digital assets, from mobile devices to software licenses, while ensuring that companies have eyes on all assets at all times throughout each stage of the IT life cycle.
Asset Panda is known as an asset management tool that can track anything, including IT assets. Asset Panda takes a flexible approach to asset management, enabling teams to custom-tailor the platform to fit their specific needs.
Asset Panda also provides access to unlimited users. Anyone who must track IT assets has the ability to do so in one centralized location.
Key Features

Asset Panda

SysAid is a provider that offers everything from a robust IT service desk to full IT asset management. SysAid’s asset management tools are built to fit right into any service desk to boost efficiency and improve visibility.
SysAid’s asset management tools are broad. For example, IT teams can benefit from inventory management, including support for hardware and software assets. Other notable features include the ability to set up custom monitoring and receive real-time alerts.
Key Features

SysAid

Freshservice by Freshworks is a full-service suite of IT asset management tools. A hallmark feature of Freshservice is the platform’s automated discovery capabilities. Using the tool’s Discovery Probe, IT teams can quickly scan all IT assets in real-time to update asset data. These discovery solutions work with all types of assets, from hardware to virtual machines.
Freshservice also offers features such as relationship mapping, full asset life cycle management, contract management and built-in software-as-a-service management.
Key Features

Freshservice

UpKeep is different from the other platforms in this list in that it combines computerized maintenance management system, enterprise asset management and application performance management capabilities in one solution. Through UpKeep’s Asset Operations Management Platform, teams can monitor asset maintenance, manage assets throughout their life cycles and improve asset performance.
UpKeep’s unique capabilities make the platform a great choice for IT teams in technical industries such as manufacturing, government, fleet management and utilities. Plus, UpKeep is a mobile-first platform, enabling teams to track and manage their assets from anywhere.
Key Features

UpKeep

ManageEngine’s AssetExplorer is a web-based, end-to-end asset management tool. AssetExplorer enables teams to manage IT assets, including hardware and software, from deployment to retirement.
A key feature of AssetExplorer is the built-in software license management tools. Teams can manage all types of licenses, including individual licenses, original equipment manufacturer licenses and enterprise licenses. As a result, IT teams can ensure license compliance.
Other capabilities include IT asset inventory management, software asset management, CMDB and purchase order management. AssetExplorer is different from other options on this list, as the platform offers a free edition that can be used by teams with fewer assets.
Key Features

ManageEngine AssetExplorer

ServiceNow is a platform used by IT teams to connect all IT workflows, from service management to portfolio management. ServiceNow’s IT Asset Management solution enables IT teams to automate the life cycle of software, hardware and cloud-based assets. Built-in capabilities include everything from hardware asset management to IT asset offboarding and beyond.
These capabilities are built on ServiceNow’s Now Platform, which enables IT teams to use one centralized source for all assets. Plus, teams can automate their asset management workflows using built-in, no-code playbooks.
ServiceNow integrates with a wide range of other apps and services to help IT teams improve efficiency. Examples of current integrations include Jamf, Microsoft and IBM.
Key Features

ServiceNow

GoCodes is a no-nonsense asset tracking solution. GoCodes provides custom QR code tracking for everything from desktop computers to routers and beyond. Teams can use the mobile scanning apps to complete asset-specific tasks from anywhere.
GoCodes also features robust reporting and analytics tools so teams can see in-depth data about their assets in real-time. Users can utilize the built-in check-in/check-out solution to check IT equipment out when necessary to simplify collaboration and tracking.
Key Features

GoCodes

Ivanti is a full-service IT asset management platform offering solutions for discovering, managing, securing and servicing all IT devices. Ivanti Neurons for ITAM is a solution that enables IT teams to track hardware and software as well as on-premises and cloud-based devices using a centralized database.
The solution also features real-time discovery, life cycle tracking, barcode scanning and more. Plus, teams have access to more robust tools such as vendor management and automation.
Key Features

Ivanti

IT asset management software is a subcategory of IT management software. It simplifies the process of managing all IT-related assets, from computers to SaaS applications.
SEE: How to reduce costs and risk with IT asset management systems (TechRepublic)
The key role of IT asset management software is to give IT teams full visibility into their tech infrastructures. As a result, they can monitor, forecast, plan and manage to reduce costs, eliminate security risks and ensure compliance.
IT asset management software is also used to effectively manage each stage of an asset’s life cycle, from procurement through maintenance and disposal.
IT asset management software is a critical tool for virtually any organization that uses any kind of IT asset. This includes organizations across industries, from healthcare to manufacturing.
Asset management isn’t just for large IT teams or enterprise organizations with overly complex infrastructures either. Even SMBs with a simple tech stack should utilize asset management tools to scale effectively.
IT asset management software’s importance continues to result in growth year over year. According to recent data, the global IT asset management software market is expected to grow by $4.23 billion between 2022 and 2026.
There are numerous reasons for this growth, but two key factors stem from the organizational need to do more with less and the need to be in compliance with ever-evolving security requirements. IT asset management software delivers on both of these needs.
SEE: How to choose the right data privacy software for your business (TechRepublic)
First, these tools are intelligent and offer a single-pane-of-glass view of all assets, boosting efficiency by reducing the number of tools required for asset management. Second, IT asset management software simplifies compliance. For example, keeping track of IT assets enables organizations to more closely monitor for security risks that may endanger consumers.
Asset visibility is a continual security challenge for organizations of all sizes. This is exacerbated by the constant expansion of the attack surface due to the growth of the cloud, IoT and other tools.
To keep company data protected, organizations must know what assets they own and how they’re being used at all times. IT asset management software enables real-time visibility for all assets in one centralized location.
IT asset management can lower the costs associated with IT procurement, maintenance and future expansion.
For example, by understanding what assets an organization currently has deployed, IT teams can avoid purchasing assets the organization doesn’t need and decommission devices no longer required.
Plus, IT teams can effectively track and manage their software platforms, eliminating license overspend, as well as budget and plan for future asset needs.
IT teams must wade through the murky waters of multiple levels of compliance. They must ensure they’re in compliance with vendor contracts as well as with numerous external laws and regulations, such as those involving data privacy.
IT asset management software helps IT teams remain in compliance in many ways. For example, proper management ensures assets such as software and hardware are updated and secure. These tools can also help IT teams “show their work” when it comes to compliance audits.
One of the key roles of any IT asset management software is real-time monitoring. Through monitoring, IT teams can be proactive, finding and mitigating security threats quickly: Teams can see if a device goes rogue or if a certain app hasn’t been upgraded to its latest version.
In addition, IT asset management ensures critical devices are decommissioned properly when employees leave or when devices must be replaced.
The more devices for which an IT team is responsible, the more complex management will be. This is especially true when it comes to managing each unique stage of the asset life cycle. Asset management tools provide support for each stage, from deployment to retirement.
For example, asset management tools can ensure software is deployed properly and that hardware is working as it should. These tools can also ensure assets are being updated and maintained on a regular basis. Finally, asset management software can help teams understand when assets should be replaced.
While asset tracking and asset management are often used interchangeably, asset tracking is slightly different. Asset tracking typically refers to the tracking of physical assets such as computers and IoT devices using barcodes, RFID tags or GPS. However, many ITAM platforms will also enable IT teams to track software assets too.
Real-time monitoring of assets ensures IT teams can keep a constant eye on all physical and digital assets. For example, IT teams can see which assets are in need of repair and which ones are being utilized or underutilized at any given moment.
Real-time monitoring can also help teams mitigate potential security risks fast, and teams can use monitoring tools to track lost or stolen devices to aid in the recovery process.
Real-time monitoring is also a critical feature for today’s remote workforce. Some IT asset management platforms offer mobile capabilities, so teams can stay connected to their assets from anywhere.
Managing an asset’s life cycle from deployment to retirement is a complicated process. However, it’s critical for ensuring assets are properly updated and maintained. IT asset management software will include tools for every step of the asset life cycle. Better yet, life cycle management is automated by the software, removing the tedious process from the IT team’s plate.
IT asset management software has the ability to alert IT staff when issues occur within hardware or software. For example, IT staff can receive notifications when potential security threats are detected or when a computer goes offline.
Due to the real-time monitoring and AI capabilities of modern platforms, IT staff can also receive notifications when the system detects issues that may lead to future maintenance needs. For example, they can be alerted if the system detects a computer that’s lagging or increased network traffic.
IT teams use a ton of tech tools each day. IT asset management software integrates with these tools seamlessly to provide a centralized view of all assets, both physical and digital. As such, the asset management software chosen should integrate with the company’s IT help desk or ticketing software.
While many IT asset management platforms include robust, real-time analytics dashboards, reports are still important for various tasks, from taking inventory to budgeting. IT asset management platforms typically come with built-in reports teams can pull that dive into everything from asset utilization to employee productivity. Many of these tools will offer report customization tools so IT teams can create reports using the information they need.
Our editors highlight the TechRepublic articles, downloads, and galleries that you cannot miss to stay current on the latest IT news, innovations, and tips.
Best IT asset management software for 2023
Your email has been sent
Your message has been sent
TechRepublic Premium content helps you solve your toughest IT issues and jump-start your career or next project.
Looking for the best payroll software for your small business? Check out our top picks for 2022 and read our in-depth analysis.
Next year, cybercriminals will be as busy as ever. Are IT departments ready?
The company, which for several years has been on a buying spree for best-of-breed products, is integrating platforms to generate synergies for speed, insights and collaboration.
Organize a number of different applicants using an ATS to cut down on the amount of unnecessary time spent finding the right candidate.
Whether you are a Microsoft Excel beginner or an advanced user, you’ll benefit from these step-by-step tutorials.
Adopt the best practices in this TechRepublic Premium checklist to encourage consistently thorough cloud storage account reviews. The IT department is typically best positioned to perform regular audits of the organization’s cloud storage services. Among the tasks the technical contact assigned to performing regular administrative cloud storage reviews should perform is confirming that least-privilege standards …
Some operations and tasks don’t require painstaking attention to detail. Unfortunately, processing payroll isn’t one of them. With sensitive salary and wage information, bank and direct deposit accounts, social security numbers, and other personal information in play, the stakes are high. When preparing a payroll run or supporting payroll operations, it’s important to follow a …
This document is designed to serve as a template that technology consultants and consulting firms can use to create a standardized ethical, professional and behavioral code of conduct for its employees, contractors and subcontractors. From the code of conduct policy: SUMMARY The IT Consultant Code of Conduct Policy describes the practices and behavior the organization’s …
Onboarding new employees and providing them with the equipment and access they need can be a complex process involving various departments. However, a standard set of guidelines which can be reused and revised as needed can streamline these endeavors. A new employee checklist and default access policy assigns responsibilities for tasks to ensure new hires …

source

Read more
  • Published in Uncategorized
No Comments

11 Best Client Management Software Reviewed for January 2023 – Business 2 Community

Wednesday, 04 January 2023 by admin

11 Best Client Management Software Reviewed for January 2023  Business 2 Community
source

Read more
  • Published in Uncategorized
No Comments

Insights on the Sharing Economy with Filippo Bortoletti, Dezan Shira … – Vietnam Briefing

Wednesday, 04 January 2023 by admin

This short Q and A with Dezan Shira & Associates’ Vietnam Director, Filippo Bortoletti, sheds light on the current state of Vietnam’s sharing economy, where it might be headed next, and what actions need to be taken to ensure it is functional and profitable long into the future.
The sharing economy is a new business model taking advantage of digital technologies and connecting people. It is different from traditional business models because all transactions are carried out online via a third-party multi-dimensional platform. Such multi-dimensional platforms allow direct interaction between different user groups, and the more partners are involved, the more value is created for the entire system.
This new business model offers numerous advantages for the parties involved. The market becomes more competitive and diversified, transaction costs are reduced, and providers have access to a wider consumer base and increased demand. Business opportunities based on digital foundation are multiplied, creating new jobs and increasing incomes, as well as promoting innovation.

Related services

  • Professional-Service_VB-icons-2017.jpgNeed help entering the vietnamese market? we can help

Vietnam is well positioned to exploit the growing opportunities in the sharing economy thanks to its well-educated, tech-savvy, and young population. Sharing economies in Vietnam are quite diverse; in recent years, sharing economies have developed in transportation, tourism, and hotels, and they are expected to expand in a variety of other industries as well. At the same time, many new technologies are being applied in the digital payments sector, such as fingerprint authentication, facial recognition, and QR codes.
Digital transformation has also been a driver for change in public administration. Vietnam is an ambitious country with a long-term growth strategy and has demonstrated its willingness to embrace changes by implementing e-government solutions. Such efforts have translated into the formation of an electronic document management system with several national databases and  the introduction of e-invoicing, among others.
While the sharing economy is bringing a lot (and has the potential to bring even more) of positive changes and opportunities, it also threatens the survival of businesses adopting traditional business models. And with fast-developing sharing economy models, the legal framework is lagging.
Specifically, there are some issues to be tackled when embracing the new business model of sharing economies, which are mainly related to: market entry and business conditions, tax collection, users’ interests, workers’ rights, and information security. These issues could create challenges related to uneven competition, economic concentration, the development of informal markets, and a lack of tools to protect users.
One of the issues I have observed is that – within the sharing economy – it is extremely difficult to register a business if it is related to new business lines that are unfamiliar to state management agencies. Due to a lack of definition for such new businesses and clear market entry rules, local officers tend to reject applications or apply unreasonable requirements. The current way of thinking is to ban anything that cannot be managed, thus hindering the development and growth of new businesses.
For example, cryptocurrency trading and peer-to-peer lending are not yet eligible for business registration in Vietnam as they pose high risks for customers, including personal data leakage, cyberattacks, or could involve customers in money laundering and tax evasion.
The absence of a comprehensive and clear legal framework can also result in the proliferation of many black credit loan apps disguised as peer-to-peer lending through leveraging the grey areas of the current legal framework.
A prime example of potential issues that can surface without a clear and flexible legal framework is the controversy between Grab and Vinasun, both directly operating taxis in Ho Chi Minh City. Due to a loophole in the regulations, Vinasun was subject to Government Decree 86/2014 on transport services, while Grab was subject to a different set of regulations. This is an example of unequal competition, as Grab’s operations were not subject to the same requirements and taxes.
This example highlights the importance of having a clear set of rules to define and regulate businesses in the framework of the sharing economy. Indeed, soon after Government Decree 10/2020 was released, many differences between technology providers (like Grab) and transport service providers (like Vinasun) that are providing the same kinds of services were eliminated. For the first time, the concept of electronic contracts as technology vehicles were recognized, and at the same time Decree 10 officially referred to the application software of car booking companies, thus levelling the playing.

Related News

  • Vietnam’s Ride Hailing Industry: Trends, Opportunities, and Risks

Amid a contradictory and unclear legal framework, businesses and users are exposed to increased risks. To this end, Vietnam’s government has actively approached opportunities in the sharing economy. And especially after the COVID-19 period, there is a stronger will to embrace the digital transformation of the local economy.
The government for example has adopted a series of guidelines and policies to catch up with Industry 4.0 and digital transformation – which are considered pillars for the growth of the country – and is now adapting the legal framework to include new flourishing businesses arising from the sharing economy.
For example, the recent Government Decree 85/2021 on e-commerce was aimed at strengthening the responsibility of e-commerce platforms, adding specific regulations on social networks, and improving management of tax collection. The result is a clearer definition of e-commerce, excluding businesses only involved in website and application design (thus not directly participating in the business operations of e-commerce platforms) and including social networks meeting certain conditions – such as Facebook marketplace. Additionally, the decree clarifies market access conditions in compliance with the Law on Investment and mandates a guaranteed payment system.
On the other hand, there are still areas requiring adjustments, for example, the regulations surrounding electronic transactions. Specifically, many provisions have become outdated and could become a barrier to economic activity. There is a lack of clarity around applying electronic signatures and a lack of regulations on electronic contracts as well as on technology measures to ensure data security.
In general, Vietnam’s government should focus on creating a level playing field, encouraging innovation and competition, and improving regulations on transactions, contracts, ownership, property rights, and dispute resolution mechanisms.
Vietnam has made efforts to create a legal framework to guide and promote the development of the digital economy. However, although the government has a vision for sandboxing new businesses in the sharing economy, there is a lack of clear implementation guidelines. A solution could be the creation of working groups that include leaders of different ministries, for coordinating and implementing the sandbox policies. Also, the legislative way of thinking – and the approach of competent state management agencies – should be more flexible when working side-by-side with innovative start-ups.
More from Filippo Bortoletti
About Us
Vietnam Briefing is published by Asia Briefing, a subsidiary of Dezan Shira & Associates. We produce material for foreign investors throughout Eurasia, including ASEAN, China, India, Indonesia, Russia & the Silk Road. For editorial matters please contact us here and for a complimentary subscription to our products, please click here.
Dezan Shira & Associates provide business intelligence, due diligence, legal, tax and advisory services throughout the Vietnam and the Asian region. We maintain offices in Hanoi and Ho Chi Minh City, as well as throughout China, South-East Asia, India, and Russia. For assistance with investments into Vietnam please contact us at vietnam@dezshira.com or visit us at www.dezshira.com
Previous Article
« Foreign Contractor Tax in Vietnam: A Complete Guide for 2022
Next Article
Vietnamese Garment Makers Hit Snag: Omen or Opportunity? »
Vietnam has long established itself as a favorable destination for investors wanting to diversify their Asia presence. In recent years, this decision has…
This edition of Tax, Accounting, and Audit Guide for 2022, produced in collaboration with our tax experts at Dezan Shira & Associates, aims to provide an…
Vietnam’s digital economy has seen significant growth over the last decade and is expected to be valued at US$57 billion by 2025. The country’s digital…
An Introduction to Doing Business in Vietnam 2022 will provide readers with an overview of the fundamentals of investing and conducting business in Vietnam….
Dezan Shira & Associates helps businesses establish, maintain, and grow their operations.
Stay Ahead of the curve in Emerging Asia. Our subscription service offers regular regulatory updates,
including the most recent legal, tax and accounting changes that affect your business.

source

Read more
  • Published in Uncategorized
No Comments

How to Create a Project Request Board in Google Sheets – MUO – MakeUseOf

Wednesday, 04 January 2023 by admin

Want to improve your team’s project management and keep track of requests in real-time? Learn how to create a project request board in Google Sheets.
Perhaps you’re in a position where you need to ask your coworkers for help or send them assignments, but you’re feeling a bit awkward about it—or you just don’t care about all the calls and emails back and forth. Why not create a project request board?
While you could sign up for a project management tool like ClickUp or Asana and get your coworkers to join you, you may already have access to a simple, no-cost solution—Google Sheets. Follow along with this article to learn how you can build a project request board using this common spreadsheet tool.
The goal of creating a project request board is twofold. It serves as a way for you to overcome the friction caused by delegating tasks. Plus, it reduces back-and-forth communication, saving you time.
Essentially, with each assignment you add to the board, you’ll map out everything your coworker needs to know to complete it. So you’ll want to be consistent and create a layout that prompts you to add vital details each time. Details like:
Since every workplace is different, there may be some additional details you can include to tailor it to your team's needs. So, before getting started, take a moment to mull that over. If you can’t think of any now, you can add them later, but remember, less is more. You wouldn't want to add any unnecessary steps.
To get started with your project request board, open a blank document in Google Sheets. Write the following titles, and any extras you come up with, across the top of the spreadsheet:
Help your titles stand out by bolding them and adding a background color to the row. You can also freeze the top row of your Google Sheet by highlighting it and going to View in the top menu, Freeze, and then 1 row.
Adding a status button to your project request board gives you and your coworkers a quick way to share progress. It’s also a great way to get a quick overview of everyone’s workload and identify if someone could use an extra hand. Some examples of status you can use are:
You can create a working status button, much like the ones you find in project management software like ClickUp and Asana, by adding a dropdown menu to your sheet. To do this:
Now you’ll have a menu your team can use to show a task's status. There's an edit button at the bottom of the list, but that only works for the selected cell. To change all your status buttons, return to the data validation menu and pick the rule you want to edit from the sidebar.
Repeat these steps to add quick options to your Priority, Assignee, and Created by columns if you want.
If you simply tag or mention someone in the sheet, Google won’t send a notification. When assigning someone to a project, you can give them a heads-up by following these steps:
Now, if your coworker has questions, they can add them as a comment in the same thread. By keeping all of your communications about the task in the same place you assigned it, you’ll both know exactly where to find the conversation again later if someone needs a refresher.
Since there will be more than one person using the sheet, it’s good you have a backup, just in case someone accidentally deletes or writes over important information. At the top of your sheet, you’ll notice a hyperlink that states the most recent edit occurred. Click this, and you’ll see backups from previous work sessions and the changes that took place.
Using version history in Google Sheets is handy because you can see your previous projects and notes if you need a record of them. But you can also revert to a previous version if your sheet gets messed up somehow—it happens.
Note: If you want a more direct record of completed assignments, add another sheet to your document using the plus symbol in the bottom-left of your screen and cut and paste your rows in there once the status changes to Done.
Creating a project request board in Google Sheets is an excellent way to save time when delegating and collaborating on assignments. Not only will there be less back and forth, but everyone will know where to find the information for tasks, having it all in one place.
It also helps you avoid some of the awkwardness you could feel about asking for help or dishing out tasks. You’ll get more comfortable with that as you go.
Autumn Smith is a freelance tech and lifestyle writer from the great Canadian wilderness. She studied graphic design, but marketing kept finding her instead; her passion for writing trying to push its way in. Now she writes full-time.

source

Read more
  • Published in Uncategorized
No Comments

Best Task Management Software (January 2023) – Forbes Advisor – Forbes

Wednesday, 04 January 2023 by admin

source

Read more
  • Published in Uncategorized
No Comments
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18

Recent Posts

  • 5 Best AI Document Management Solutions (August 2025) – Unite.AI

    source...
  • Epson Workforce ES-300W Portable Wireless Duplex Document Scanner Review – PCMag

    source...
  • 11 Best Document Scanner Apps for iPhone, iPad in 2025 – howtoisolve.com

    source...
  • The Best Scanners We've Tested (August 2025) – PCMag

    source...
  • 11 Best Document Scanner Apps for iPhone, iPad in 2025 – HowToiSolve

    source...

Recent Comments

    Featured Posts

    • 5 Best AI Document Management Solutions (August 2025) – Unite.AI

      0 comments
    • Epson Workforce ES-300W Portable Wireless Duplex Document Scanner Review – PCMag

      0 comments
    • 11 Best Document Scanner Apps for iPhone, iPad in 2025 – howtoisolve.com

      0 comments
    • The Best Scanners We've Tested (August 2025) – PCMag

      0 comments
    • 11 Best Document Scanner Apps for iPhone, iPad in 2025 – HowToiSolve

      0 comments

    Archives

    • August 2025
    • July 2025
    • June 2025
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • October 2024
    • September 2024
    • January 2023
    • December 2022
    • November 2022
    • October 2022
    • September 2022
    • August 2022
    • July 2021
    • February 2021
    • December 2020
    • November 2020
    • April 2019

    Categories

    • Business
    • DMS
    • Networking
    • Technology
    • Tips
    • Uncategorized

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org

    GET A FREE QUOTE

    Please fill this for and we'll get back to you as soon as possible!

    FACEBOOK

    2,175
    LIKES

    TWITTER

    1,050
    Followers

    PINTEREST

    101
    follower

    FOOTER MENU

    • Terms and Conditions
    • F.A.Q.
    • Our Services
    • BLOG & STORIES

    NEWSLETTER SIGNUP

    By subscribing to our mailing list you will always be update with the latest news from us.

    We never spam!

    GET IN TOUCH

    II Chundriger Road Uni Plaza Karachi-Pakistan
    Email: Info@Itzonepakistan.com
    Phone:
    Direct+92-314-4166-777
    Sales+92-313-8854-133

    Social Platform

    • Tweet
    • Pin It

    RSS ARY NEWS

    • Arizona State University launches first U.S. campus in Pakistan August 3, 2025
    • GET SOCIAL
    IT Zone Pakistan

    Copyright @2024-25. All rights reserved | Design & Develop IT Zone Pakistan.

    TOP