Tuesday, October 27, 2015

Equality and Human Rights Recovery as a Social Responsibility

Mitigation Action Plan

  • The Strategy and Plan

    •  Vision empower women and girls across the world

      • Objectives: Teach girls at the start of their transition from youth into leaders we fondly refer to as "wicked women".  Not wicked as in evil, but strong and committed women who are willing to take on the issues defined as wicked problems.  

        • Women who can accelerate the balance between men and women in the workforce, which have acquired the vital skills in the latest ICT tactics.

          • A study was done on the skills acquired by graduates in the delivery of marketing roles.  The numbers were dismal and we have a significant gap worth exploring.  Marketing has traditionally been the biggest collector of personal identifiable information within most organizations.  In fact, its just political suicide for anyone trying to transition marketing into better practices with regard to contact data. 

            • ISACA produced an infographic on the skills we need from the computer science graduates in regard to security roles.  

              • Less than 10% of the CS graduates are prepared to manage the traditional threat and defense tactics.  Yes, we have few if any aware of the latest situations.    

        • Fuzzy Security threats caused by using data or abuse of data in forced failures and by omission of data in places the source systems require.  

          • The data relationship or where we turned information back into data and manage the parts as standalone requirements began when technology began to go into the business without the proper implementations.  

            • Now, we have the standalone domains and platforms which perform in ways that are truly not intended to happen in the executive and management layers of any private or public sector organization or agency.  

        • Corrective Action 1: Filter all Big Data in any big data store or any storage container in the cloud or traditional servers.  

          • Measure all removed records or rows in a table, report to the SEC as part of the monitoring and logging of customer privacy and human rights contributions for civil society.  
            • The primary objective we want to meet would be to maintain the least risk within the organization as employee neglect no longer protects the board and executives (directors and officers insurance).  
            • Ensuring customers are not created in back end systems as another segregation of duties monitoring and prevention tactic we can measure and report.  Key Control Design  


            • Notice ESG issue #2 Customer Privacy
          • Means of Implementation: Insert a new process using a filter on any acquisition of data or logs often associated with a person or the persons movements on the planet.  

A separation of concerns

Management Capabilities integrate the mission critical points across business processes by acquiring the reference data from the source system ERP, then publishing as a header transaction across each phase in the life cycle of the transaction.  

Understanding the importance of a viable master customer record at the time of quoting and acquiring the customers commitment to buy triggers a series of activities which each business function could begin and manage their service level agreements based on the early indicator.   

Structuring the offers by three degrees of complexity, aligns to the same three types of risk, with three different customer market segments, and again with the maturity of the workers.  

An opportunity header detail pushed to the various integrated forms or documents in the ERP system; empowers the cross-functional work to run in parallel and measuring against the customers expectations.

 
      • Any material risk are identified and managed in high touch processes, while advanced and core offers run faster.  
        • Recovery Time Objectives (priority 1 mission critical)

          Records Management 

          •  All transactions must be validated before the close as the process of consolidated income statements must be retained for up to 10 years in their original format.  Once validated the transaction becomes a record.
            •  Configuration Management
              • Zero Data Loss (priority 1 mission critical)
              • Financial Consolidation Capabilities

                • No delete functionality, only archive
                  • Change orders must be complete for any update and approved without back end processing.
              • Segregation of Duties - users can only be in one of the two user groups
                • Users must be organized by management capability 
                • Users must be organized by transaction capability
            • Any change from the opportunity header must be in writing by the customer
              • The customer header and offer type allows some internal variables to work with, while maintaining the integrity of an integrated order management system.
            • Application change procedures (IT)  
              • ERP as the governed and P1 application 
              • Any software enhancement or change to the features and functionality requires full sox control testing.
              • Any Sox control test requires full integration testing.
              • Any integration test requires full table top resilience testing.
              • Any subscription from an EDW transactional or business intelligence application requires reference data services published to an in memory service.
            • Privacy and Security
              • Managing the scope within the five capabilities enables an identity service to authenticate
              • Managing the records to data services enables Roles Based Business services 

Thursday, October 15, 2015

Orange the color representing freeing women from violence

Kill them with kindness.  

Never let the abuse you've endured be your abusers victory. 
Win! For you, for yourself and the person you want to become. 

Be more than you dreamed.  

Every tear, is another chance for their abuse to define your future. 
  • Learn to laugh constantly!

Communicating With Nature in Peace

Hello Nature Listeners!

We have information on our next class, the recording and lesson from our first meeting which was on Tuesday, sign up information for the class, and call in details.

1. Next Class: Saturday November 14 at 8:30 a.m. pacific time. We meet once a month for a training session, in between our meetings communicate with Nature utilizing the steps and the SDG's as our guide. We are gathering insight from Nature at the same time developing ease in navigating telepathic communication with Nature. 

2. Recording from our first class session: Recording & Nature/SDG's class activities

3. Sign up for the Nature Communication Course: Step by step instructions. 
a. Click on this link: Nature Communication Course​
b. Enter this passcode: Nations United
c. Click on "add to cart"
d. Enter your information.
e. The course is free to your group.

4. Once you have signed up you will have access to a forum where you may share insight, experiences and ask questions.

5. Call in details for class: 605-562-3140 access code: 482617# 8:30 a.m. Saturday November 14.

If you have any trouble calling in try: 951-262-7373, access: 482617#

If you would like to call in Toll-Free here's a list of options: Toll Free
​Thank you, Passionate Nature Listeners!

With gratitude & love,
Maia​


Maia Kincaid Ph.D. Bringing animal communication to the world!

www.maiakincaid.com

928-282-2604
P.O. Box 4761
Sedona, AZ 86340