Sentences with phrase «documents all technology assets»

The Administrative Assistant (IT Department) identifies and records, maintains, monitors, audits, and documents all Technology Assets in the Asset Management System.

Not exact matches

Specifically, the SEC's action alleges that a registered fund manager invested fund assets in two high - risk private technology companies he founded without disclosing the attendant conflicts of interest to investors, and in contravention of fund offering documents which stated that he would invest fund assets primarily in publicly traded securities.
The agency denied a Times Union public records request for the document, arguing its release could «impair imminent contract awards,» endanger «life and safety» and compromise the state's ability to «guarantee the security of its information technology assets
In the document filed for Google's IPO, they stated that they intended to use the money for «general corporate purposes», and «for acquisitions of complementary businesses, technologies or other assets»; i.e., to buy stuff that would help them grow their business.
This transaction work includes advising on purchase agreements, intellectual property portfolios, performing due diligence relating to intellectual property and technology assets, and preparing and negotiating various intellectual property documents and agreements.
That being said, a public document released prior to the meeting noted that «the technology behind crypto assets has the potential to promote financial inclusion,» but noted that the impact on financial stability and potential uses in tax evasion and illegal activities needed to be understood first.
Public documents also show that the main agenda will be to discuss the technology behind crypto assets and its potential in promoting inclusion.
The public document with the meeting agenda indicates that the finance ministers and central bank governors are going to discuss the digital assets and the underlying technology.
Although currently the technology is largely used to verify financial transactions within digital currencies, in theory, and practice it is possible to code and insert any type of document or digital asset into the blockchain.
• Balancing money transfer transactions and order receipts • Verifying and preparing deposits and inputting sales and item counts • Compiling and sorting documents such as invoices, checks and account statements using manual calculators and sophisticated technology • Maintaining confidentiality of proprietary information and protecting company assets
• Conducted quantitative analysis, modeling and system approaches • Documented activities and designed systems with the technology department • Developed tactical plans for strategic direction • Used independent review and testing on primary market models in the BoA Investment division • Evaluated hedging in the Mortgage Serving Rights assets
Information Technology Security Manager — Duties & Responsibilities Manage IT security, customer service technicians, assets and finances, and client training Responsible for ensuring that multiple IT groups meet finance, audit, and compliance requirements Serve as primary point of contact for customer contracts, technical support, and end - user training Utilize interpersonal and technical skills as liaison between clients, technicians, and subcontractors Train large staffs ensuring they understand the brand and adhere to corporate policies and procedures Oversee the implementation of asset management processes and procedures Coordinate activities with desktop leads to ensure SOX compliance Validate asset information, manage defect reports, and submit correct action recommendations Design and implement enterprise - wide security protocols, mainframe / pc policies, & software / hardware packages Collaborate with department managers to identify and address security concerns through IT Security policies Reduce corporate information ricks through implementation of sensitive document control processes Utilize RACF and Windows / LAN measures to greatly improve user, administrator, and application security Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technical skills
Professional Experience Air Force Office of Special Investigation (AFOSI) 6/2001 — Present Special Agent, Counterintelligence / Criminal Investigator 12th Field Investigations Squadron — Buckley AFB, CO (8/2004 — Present) • Support national security objectives by organizing and conducting sensitive counterintelligence (CI) operations and investigations, achieving USAF, DOD, and US intelligence community strategic objectives across 21 bases in 20 states • Manage sensitive cover documents for nine agents with zero deficiencies found during an annual audit, ensuring highest level of operational security and directly facilitating the engagement of FIS targets through enhanced trade craft • Conduct background investigations of potential AFOSI applicants to grow department by 15 personnel • Improve AFOSI operations while deployed by mentoring and training agents and providing effective liaison with other federal agencies and Component Command (COCOM) CI representatives • Provide threat awareness briefings to all traveling personnel, safeguarding all research / technology contracts in area • Recruit and utilize operational assets to counter multiple FIS threats to the US Strategic Command and national security • Oversee detachment evidence program by implementing 100 % accountability for all items corresponding to investigations impacting the DOD, earning an «excellent» rating during a spot unit compliance inspection
a b c d e f g h i j k l m n o p q r s t u v w x y z