Monday, February 22, 2016

A Manager's 'duty of care' responsibilities

A Manager’s ‘duty of care’ responsibilities

By John Kyriazoglou


Plato: ‘The most important of all goods is health, the second is beauty of the soul and the third is to be able to become rich without doing anything bad’.


This short article describes a plan for improving the responsibilities you have as a business owner, board director or manager towards the wellbeing of your employees.

Introduction

Our workplaces are full of problems, to put it lightly. According to the World Health Organization ‘Mental health problems, such as depression, anxiety, substance abuse and stress, are common, affecting individuals, their families and co-workers, and the broader community. In addition, they have a direct impact on workplaces through increased absenteeism, reduced productivity, and increased costs1.’
As 60-70% of people with common mental disorders were in work, according to various experts and governmental studies, it is up to each company and its individual owners and managers to do something about these crucial and debilitating problems at work.
The principle that investing in support for employees who may be struggling is not just morally correct but a financial imperative is well established, according to experts2.
Also you must remember that your staff, quite rightly so, are the single most valuable asset your organization has. This definitely means that when they work and travel for your company, you need to be assured of their safety at all times, to the best of your abilities.

In general terms, a manager’s or professional’s duty of care responsibility is a legal, and many times, professional obligation, which is imposed on an individual manager or professional, requiring them to adhere to a standard of reasonable care while performing their duties and avoid any acts that could foreseeably harm others (organizations, societies, people, environment, et).

In practical terms, duty of care means that every party to a contract must comply well according to the rules included in it as well as other relevant industry and state laws and regulations on ethics, health and safety. The same goes for an accountant in correctly maintaining financial transactions and preparing company accounts; Auditors, in confirming the financial statements of a company; Board and managers in managing well their corporate resources, etc.

More details at:

http://www.slideshare.net/jkyriazoglou/a-managers-duty-of-care-responsibilities



Wednesday, October 28, 2015

IT CONTROLS AND HACKERS

By John Kyriazoglou*
The main purpose of IT Controls is to ensure the safe and secure operation of information systems and the protection from harm or other potential damage of the organization’s I.T. assets and data maintained by these systems. These objectives are achieved by a set of policies, procedures, practices, methods, techniques and technological measures, collectively called ‘controls’.
IT systems and infrastructure controls are classified as General IT Controls, i.e., controls applying to the whole of an organization’s Information Systems activity, and as IT Application Controls, which are specific to a given application, such as payroll processing, general ledger accounting, accounts receivable, etc. Both of these types of controls, within any type of organization (private, public, etc.), must operate within the greater framework of corporate governance and internal controls system, to fulfill their purpose to the fullest.
Sometimes the boundary line between these control types  (General IT Controls, IT Application Controls) is rather arbitrary, particularly in client/server, web-based and cloud computing applications, most of which may run on several computers.
What is important and crucial is for IT management, systems development professionals and other stakeholders (auditors, fraud examiners, etc.) is to realize that a comprehensive and effective combination of both of these control types (General IT Controls and IT Application Controls) arer required to ensure, as much as possible, an adequately safe and secure processing environment. We need to be proactive, plan and prepare both ourselves and our organizations for possible attacks, frauds committed, and errors occurring to information systems, disasters to IT facilities, and unusual events.
We should probably note that modern intruders to IT systems and networks do not publish their tools, successful or failed attacks or profits. They act with anonymity, quietly, in a step-by-step approach, from both inside and outside the organization, across the planet, and they usually cover their trail.
The players now include terrorists, white collar criminals, hackers, open source. The global underground cyber criminal community is actually trying to do better than what we do. Ten years ago, people sold you user IDs and passwords. Now the menu includes your CVs, ATM and credit cards with pin numbers, whole e-mail inboxes. They will ship information to anywhere in the world for money.
There is an army of them with new skills and capabilities.
There are: mappers, scanners, hackers, crackers, password sniffers, readers and shooters with van Eck tools, programmers who write code to enter network and application systems without leaving a trail, moles (personnel) employed to work in an organization much before it is attacked, vendors who sell illegal and improper hardware and software, social engineers who get passwords and other sensitive information by various means, etc.
They need to be controlled by society on the one hand, by the enactment of rules, regulations, laws, ethics codes, etc., and by organizations on the other hand, by devising and implementing overall corporate and detail IT controls.
Corporate and IT control issues are quite complex and may be included in corporate and business strategic and operational concerns, rather than on their own ground, as such. Detail IT controls require far more than the latest methods, practices and software tools or technology. Organizations must understand very precisely what IT entities, data, media, systems, services, and assets they are trying to protect, and why, before selecting any general or specific IT control solutions.
We also must note that according to recent international data breaches cases data privacy and protection shortcomings can do irreparable harm to companies’ balance sheets, not to mention their brands, credibility and customer trust and relationships.
IT management, IT professionals, IT auditors, Internal auditors, fraud experts, etc., must be always on their guard to protect their organizations, the data stored and reported by their IT systems, and the greater society, by using, implementing and improving IT controls and methods in a most efficient and effective way.
IT controls, operating within the greater IT Governance Practices Framework, can create value for an organization, as we have seen in several consulting projects for various clients.
It is our mission, moral duty, responsibility and job to do this. IT application systems are the life-blood of organizations. Quick dissemination of correct and timely information drives forward, enables and facilitates our national and global economies, benefiting everyone across the globe.
We need to work hard to achieve effective and working IT controls. As Menander (ancient Greek writer, 342-291 B.C.) has said: ‘He who labors diligently need never despair; for all things are accomplished by diligence and labor’.
We need to both plan and act. And as William Shakespeare has said: ‘Be great in act, as you have been in thought’.
We must be persistent in reaching the goal of controls, and be aware of what Friedrich Nietzsce has said: ‘Many are stubborn in pursuit of the path they have chosen, few in pursuit of the goal’
Last but no least, we may require to be disciplined in our approach, because as Abraham Lincoln has said: ‘Be sure you put your feet in the right place, then stand firm’.
For more specific details on IT Controls as well as Business Management Controls see the following books by John Kyriazoglou:

1. Book ‘IT Strategic & Operational Controls’, 2010, IT Governance, U.K.
2. Book ‘Business Management Controls: A Guide’, 2012, IT Governance U.K.

3. Book ‘Business Management Controls: Toolkit’, 2012, IT Governance U.K.      

Wednesday, February 11, 2015

Free e-book: How to reduce occupational stress

Free e-book: ‘How to Reduce Occupational Stress’

Book inspired by ancient Greek wisdom
Published: Feb, 12 2015, by John Kyriazoglou
A self-help guide and an approach to manage and reduce occupational stress and improve the mental health of your people
Table of Contents

PART A

Prologue
Chapter 1: The Stress Management Approach
Chapter 2: Occupational Stress Management Action Plan
Chapter 3: Strategy #1: Incorporate Basic Stress Reduction Actions
Chapter 4: Strategy #2: Add Spirituality to Your Basic Stress Reduction Actions
Chapter 5: Strategy #3: Improve Your Stress Reduction Management Process with Better Relationships
Chapter 6: Strategy #4: Strengthen Your Stress Reduction Management Process with More Robustness
Chapter 7: Improve Stress Efforts
Chapter 8: Concluding Remarks
Bibliography

PART B

Over 10 appendices with examples of Plans, Policies and Questionnaires that support Part A of the book.

Wednesday, December 10, 2014

New Book: Corporate Wellness: Management and Evaluation Toolkit

New Book: Corporate Wellness: Management and Evaluation Toolkit
I am glad to announce that this toolkit was just published and is available for your review and potential use at:

It contains material related to occupational stress and corporate wellness.
It contains:
1. A set of management improvement plans (with over 72 actions).
2. A stress policy.
3. Several stress performance measures.
4. Occupational Stress Audit Evaluation Questionnaires (Four audit questionnaires with over 87 questions to evaluate the stress level of people at all levels of your company, in terms of: Personal Happiness; Personal Stress; etc.).
5. Corporate Wellness Audit Questionnaires (18 audit questionnaires with over 90 questions to evaluate the Corporate Wellness of your company, in terms of: Tone at the Top; Understanding of the organization by the board; Operational philosophy; etc.).
6. Over 72 improvement actions.
7. An evaluation method that calculates an index for the person or entity taking going through the evaluation questions.

You may also check out the following documents for your business use.
1. Auditing and Improving Business Performance
2. Audit Report Model and Sample

Thank you,
John Kyriazoglou, CICA, B.A (Hon-University of Toronto),

Business Thinker, Consultant and Author of several books

Monday, December 30, 2013

Happy New Year


Happy New Year to all!

 

Here is an ancient Greek quotation for your consideration and enjoyment:

‘Do not spoil what you have by desiring what you have not; remember that what you now have was once among the things you only hoped for.’

   Epicurus (Greek philosopher, 341- 270 B.C.)

 

More sayings, quotations and maxims of ancient Greece and how these may apply and improve your personal, family and business life are included in my recent book

‘Ancient Greek Pearls of Wisdom for the 21ST Century’ (Amazon.com).

 

Best and warmest regards,

 

John Kyriazoglou

 

Wednesday, December 11, 2013

Ancient Greek Wisdom for the 21st Century


New Book: ‘Ancient Greek Pearls of Wisdom for the 21st Century’

 

Hi,

 

I am glad to inform you that this book was just published and is available at: https://www.createspace.com/4324169   and


 

Authored by John Kyriazoglou

This book 'Ancient Greek Pearls of Wisdom for the 21st Century' is about guiding and supporting you to improve your personal, professional and business life in our current 21st century society.

This is achieved by:
1. Presenting a set of Ancient Greek Pearls of Wisdom in each area of life (wealth, governance, friendship, etc.) and proposing a solution in responding to basic questions in each such area (e.g. 'Why should I believe in the Supreme Being? and What do I need religion for in my business activities?)
2. Summarizing the impact of several noted ancient Greek thinkers to the world and the relevance of their contributions today.
3. Offering you, an Improvement Approach (The Pandora Way) based on Ancient Greek Wisdom (for each area: governance, wealth, association with others, self-management, education and family, etc.) including: over 60 'tips', more than 40 'golden rules' and numerous (over 20) 'recommendations' that you may consider and use to manage yourself, your family and your business more effectively and potentially make your life better.
The ancient Greek wisdom pearls relate to:
(a) The maxims, quotations and sayings (over 600) of the Oracle of Delphi, the Seven Sages and other well-known ancient Greek thinkers: Aristotle, Plato, Socrates, Pythagoras, Heraclitus, Epicurus, etc.
(b) Four hymns, the Hippocratic Oath, 9 fables of Aesop, several short stories (over 17) and the works and thoughts of noted ancient Greek philosophers, poets and intellectuals, such as: Aristotle, Plato, Socrates, Heraclitus, Epicurus, Pythagoras, etc.

(c) The real-life examples and stories of the every-day life and activities of ancient Greeks.


The book contains: A foreword, a preface, ten chapters (one for each area of living, such as: governance, wealth, etc.), three appendices, and a bibliography.


I would appreciate your comments if you have the time to review it.

 

Please like my ‘Ancient Greek Wisdom’ page on Facebook.

You may follow me on Twitter and Slideshare and connect with me on Facebook and LinkedIn.

 

 

 

Thank you for your support and my best wishes for the Holiday Season and the New Year 2014.

 

John Kyriazoglou

 

 

Saturday, October 19, 2013

Business Data Security Guidelines


Business Data Security Guidelines

 

John Kyriazoglou*

 

A business data security policy and related procedures should include protection controls and measures that cover the following issues:

1. Comprehensive due diligence of all critical staff, including external parties (outsourcing, external suppliers, sub-contractors, etc.). 

2. Authentication of all customers.

3. Non repudiation and accountability for all on-line transactions.

4. Segregation of duties.

5. Authorization controls.

6. Business data, transactions, records and information integrity.

7. Transactions audit trails.

8. Information confidentiality.

9. Appropriate disclosures for organizational services.

10. Data privacy.

11. Business continuity and contingency planning.

12. Security and other crises incident response planning.

13. Access controls: encryption, passwords, password control devices, tokens, user authentication devices, anti-hacking tools/techniques, digital signals origin identification, anti-tapping tools/techniques.

14. Data confidentiality.                              

15. Data integrity.

16. Anti-virus and e-crime detection software.

17. Time stamping.

18. Biometrics.

19. Digital signatures.

20. Smart cards.                            

 

 

John Kyriazoglou (jkyriazoglou@hotmail.com)

John Kyriazoglou, CICA, B.A (Hon-University of Toronto)

International IT and Management Consultant, author of several books



SSRN Free Publications: http://ssrn.com/author=1315434