Riskassessment: Participants should conduct riskassessments, to include identification of key internal and external factors.
Security design and implementation: Participants should incorporate security as an essential element of information systems and networks. Participants should focus on the design and adoption of safeguards and solutions to manage potential harm from identified threats a
1. Guide for Integrating Human Rights
2. Human Rights Translated3. Country RiskAssessment4. A Human Rights Management Framework
5. Human Rights Policy Portal6. Human Rights Compliance Assessment
7. Human Rights Impact Assessment
8. Human Rights Accountability Guide9. Global Reporting Initiative
10. Red Flags11. Embedding Human Rights12. Human Rights Matrix
13. Embedding Rights Compatib
1. Company Overview
In 1911, started as CTR corp - in 1924, renamed to IBM
The world's largest IT solution company
World's # 1 server sales company
Active in over 170 countries world
Total assets: $119.2 billion
Number of employees (worldwide): 434,246
At interbrand survey, brand value ranked second in the world(2011)
2
five levels
• Not a Design Matter
• On-Site & Off-Site Emergency Plan
► Collecting and assessing information about level of exposures
► Short and long term protective actions that constitute intervention.
► Prepared in consultation with the operating organization and the
responsible authorities.
► Exercised periodically.
Recent Situation
“ internal information security attacks are outgrowing external
attacks at the world’s largest financial institutions”
(The Global Security Survey): Only 20% of the respondents in security survey strongly
believed that Information security should be a CEO-level priority
Ernst and Young(2004)
2) IT liability risk management
: The corporations should install f