Sentences with phrase «security audit requirements»

Not exact matches

His first suggestion: provisions of the Securities Act of 1933 and the Securities Act of 1934 should be amended to remove the requirement that companies be audited.
Each member of the Audit Committee shall meet the independence standards and expertise requirements of the New York Stock Exchange corporate governance listing standards, the Securities Exchange Act of 1934 and rules promulgated thereunder, the Federal Deposit Insurance Corporation Improvement Act of 1991 (FDICIA), and other applicable laws and regulations, in each case, as of the Firm's most recent annual meeting.
Such risks and uncertainties include, but are not limited to: our ability to achieve our financial, strategic and operational plans or initiatives; our ability to predict and manage medical costs and price effectively and develop and maintain good relationships with physicians, hospitals and other health care providers; the impact of modifications to our operations and processes; our ability to identify potential strategic acquisitions or transactions and realize the expected benefits of such transactions, including with respect to the Merger; the substantial level of government regulation over our business and the potential effects of new laws or regulations or changes in existing laws or regulations; the outcome of litigation, regulatory audits, investigations, actions and / or guaranty fund assessments; uncertainties surrounding participation in government - sponsored programs such as Medicare; the effectiveness and security of our information technology and other business systems; unfavorable industry, economic or political conditions, including foreign currency movements; acts of war, terrorism, natural disasters or pandemics; our ability to obtain shareholder or regulatory approvals required for the Merger or the requirement to accept conditions that could reduce the anticipated benefits of the Merger as a condition to obtaining regulatory approvals; a longer time than anticipated to consummate the proposed Merger; problems regarding the successful integration of the businesses of Express Scripts and Cigna; unexpected costs regarding the proposed Merger; diversion of management's attention from ongoing business operations and opportunities during the pendency of the Merger; potential litigation associated with the proposed Merger; the ability to retain key personnel; the availability of financing, including relating to the proposed Merger; effects on the businesses as a result of uncertainty surrounding the proposed Merger; as well as more specific risks and uncertainties discussed in our most recent report on Form 10 - K and subsequent reports on Forms 10 - Q and 8 - K available on the Investor Relations section of www.cigna.com as well as on Express Scripts» most recent report on Form 10 - K and subsequent reports on Forms 10 - Q and 8 - K available on the Investor Relations section of www.express-scripts.com.
Safe and Ethical Use of Computers School Choice, Interdistrict Public School Climate Survey School Ethics Commission School Facilities School Finance School Forms School Improvement Panel (ScIP) School Performance Reports School Preparedness and Emergency Planning School Safety and Security School Start Time «School Violence Awareness Week» in Accordance with Public Law 2001, Chapter 298, Guidelines for Public Schools and Approved Schools to Observe Schools, NJ Directory Science Self - Assessment for HIB grade Senate Youth Program (U.S.) Single Audit Summary Social and Emotional Learning Social Studies Spanish Portal Special Education Standards (Student Learning / Academic) State Aid Summaries State Board of Education State Board of Examiners State Special Education Advisory Council Structured Learning Experiences (SLE) Student Assistance Coordinator (SAC) Student - Athlete Cardiac Assessment professional development module Student - Athlete Safety Act Webinar Student Behavior Student Health Student Health Forms Student Health Survey, New Jersey Student Support Services Suicide Prevention Summary of Gifted and Talented Requirements
FMCSA's contractor is subject to routine audits by DOT / FMCSA privacy officials and the FMCSA Information Technology (IT) Security Team to ensure compliance with the Privacy Act of 1974 and all other applicable Federal laws, regulations, and requirements.
IT Administration: administration of Humble Bundle's information technology systems; network and device administration; network and device security; implementing data security and information systems policies; compliance audits in relation to internal policies; identification and mitigation of fraudulent activity; and compliance with legal requirements.
«Although employed or engaged by the same company, and sharing a common interest in appropriate financial disclosure as required by securities laws, outside auditors and in - house lawyers bring different perspectives to their roles and each must meet different legal and regulatory requirements that apply to their respective missions in the audit process,» Krebs said.
With support for all known legal entity types, it includes and self - fills all applicable regulatory forms and e-filings, governs all management bodies, meetings, minutes and agendas, streamlines intellectual property management and tracking, possesses one of the most complete and powerful transactional securities management systems, provides document automation and management capabilities and addresses security, workflows, audits and reports to the most stringent compliance and governance requirements.
In relation to the statutory audit — an annual requirement for all publicly traded issuers — both the majority and the minority determined that a duty is owed by an auditor in preparing a statutory audit, that a core purpose of the audit requirement is to allow security holders to collectively supervise management and to take decisions with respect to the overall administration of the issuer, and that a claim by the issuer for losses resulting from a negligent statutory audit could succeed.
The commenter recommended that HHS add a reference to the final HIPAA Security Rule in this section and keep specific audit log and reporting requirements generic in the privacy rule.
Highly - secure operations and audit controls (SSAE 16) are in place to ensure that data is protected and that the solution meets each client's data security requirements
Periodically audited the effectiveness of NIST 800 - 53 security controls implemented within the laboratory, ensuring FISMA baseline requirements were met or exceeded.
Work closely with corporate executives, business managers, audit and legal counsel to understand corporate requirements related to security and regulatory compliance, and to map those requirements to current security projects.
Security FDS / TDS Documents RICFF Security UAT Testing Security Cutovers SOX Implement / Compliance Project Management Production Support Staff Knowledge Transfer Dispute / Collection Management SAP Audit Requirements
Audited and maintained clients stockholders database of 7,000 stocks certificates and $ 100M of Capital investments for client placement contracts and account's net asset value, commission subscription agreements, fund collections, and all other issues to comply with Security and Exchange Commission (SEC) Requirements;
Maintained security and met PCI, and SOCII audit requirements and service SLA's across multiple datacenters and international network
• Determine the company's technology needs and develop new systems and application implementation programs • Train technical staff in the use of hardware and software, either developed or purchased • Establish methods and guidelines for installation and maintenance of computer operating systems, disk arrays and tape libraries • Develop and implement procedures to maintain security and protect systems from unauthorized use • Recommend and implement systems enhancements to improve the performance and reliability of the overall system • Perform periodic audits and handle system integration, verification and supportability for communications systems • Analyze functional aspects of the system to translate clients» requirements into hardware and software test plans • Handle inventory management of software licenses, hardware and software
Provided Board and Executive reporting on budget impacts on programs, forecasted long - term funding requirements while directing outside consultants, as appropriate, for independent attestation of security audits directed.
Tags for this Online Resume: SAP, Security, Active Directory, ADM, Apple MacIntosh Operating System, Audit, Audit Compliance, BOBJ, Business Intelligence, Business Requirements, SAP Security
Tags for this Online Resume: strategic planning, management, transformation, requirements definition, performance management, consulting, leadership, Audit, Mpe (HP Opp Sys), National Security
Tags for this Online Resume: Audit, Business Requirements, Compliance, Encryption, Firewall, Incident Response, Information Security, ISO, Management, Patch Management
Tags for this Online Resume: Compensation, Management, Workers Compensation, Benefits, Manufacturing, Technical Requirements, Security, Audit, Budget Preparation, Budgeting
Tags for this Online Resume: Vulnerability Management, Patch Management, Middleware, Information Security Audits, Structured Query Language, Documentation, ITIL, CISA, Requirements Gathering, Dallas Fort Worth, Maine, Pittsburgh, Seattle, Six Sigma Green Belt
As System Security Officer, coordinated and implemented Medicare's federal regulatory requirements, and interfaced with government auditors, internal Audit, Legal Counsel, Human Resources, Professional Development, and Senior Management — reporting directly to Medicare VP / CFO.
Negotiated contracts and implemented access administration audit ensuring compliance with security policies and regulatory requirements.
Information Technology Security Manager — Duties & Responsibilities Manage IT security, customer service technicians, assets and finances, and client training Responsible for ensuring that multiple IT groups meet finance, audit, and compliance requirements Serve as primary point of contact for customer contracts, technical support, and end - user training Utilize interpersonal and technical skills as liaison between clients, technicians, and subcontractors Train large staffs ensuring they understand the brand and adhere to corporate policies and procedures Oversee the implementation of asset management processes and procedures Coordinate activities with desktop leads to ensure SOX compliance Validate asset information, manage defect reports, and submit correct action recommendations Design and implement enterprise - wide security protocols, mainframe / pc policies, & software / hardware packages Collaborate with department managers to identify and address security concerns through IT Security policies Reduce corporate information ricks through implementation of sensitive document control processes Utilize RACF and Windows / LAN measures to greatly improve user, administrator, and application security Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technicaSecurity Manager — Duties & Responsibilities Manage IT security, customer service technicians, assets and finances, and client training Responsible for ensuring that multiple IT groups meet finance, audit, and compliance requirements Serve as primary point of contact for customer contracts, technical support, and end - user training Utilize interpersonal and technical skills as liaison between clients, technicians, and subcontractors Train large staffs ensuring they understand the brand and adhere to corporate policies and procedures Oversee the implementation of asset management processes and procedures Coordinate activities with desktop leads to ensure SOX compliance Validate asset information, manage defect reports, and submit correct action recommendations Design and implement enterprise - wide security protocols, mainframe / pc policies, & software / hardware packages Collaborate with department managers to identify and address security concerns through IT Security policies Reduce corporate information ricks through implementation of sensitive document control processes Utilize RACF and Windows / LAN measures to greatly improve user, administrator, and application security Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technicasecurity, customer service technicians, assets and finances, and client training Responsible for ensuring that multiple IT groups meet finance, audit, and compliance requirements Serve as primary point of contact for customer contracts, technical support, and end - user training Utilize interpersonal and technical skills as liaison between clients, technicians, and subcontractors Train large staffs ensuring they understand the brand and adhere to corporate policies and procedures Oversee the implementation of asset management processes and procedures Coordinate activities with desktop leads to ensure SOX compliance Validate asset information, manage defect reports, and submit correct action recommendations Design and implement enterprise - wide security protocols, mainframe / pc policies, & software / hardware packages Collaborate with department managers to identify and address security concerns through IT Security policies Reduce corporate information ricks through implementation of sensitive document control processes Utilize RACF and Windows / LAN measures to greatly improve user, administrator, and application security Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technicasecurity protocols, mainframe / pc policies, & software / hardware packages Collaborate with department managers to identify and address security concerns through IT Security policies Reduce corporate information ricks through implementation of sensitive document control processes Utilize RACF and Windows / LAN measures to greatly improve user, administrator, and application security Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technicasecurity concerns through IT Security policies Reduce corporate information ricks through implementation of sensitive document control processes Utilize RACF and Windows / LAN measures to greatly improve user, administrator, and application security Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technicaSecurity policies Reduce corporate information ricks through implementation of sensitive document control processes Utilize RACF and Windows / LAN measures to greatly improve user, administrator, and application security Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technicasecurity Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technicasecurity audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technical skills
TREB will require that Members (1) utilize appropriate security protection, such as firewalls, as long as such requirement does not impose security obligations greater than those employed concurrently by TREB; and (2) maintain an audit trail of Consumers» activity on the VOW and make that information available to TREB if TREB has reason to believe that any VOW has been the cause of, or permitted a breach in, the security of the MLS ® data or a violation of applicable MLS ® Rules and Policies (including the VOW Rules).
a b c d e f g h i j k l m n o p q r s t u v w x y z