SlideShare una empresa de Scribd logo
1 de 19
Meeting the E-Discovery Challenge: Information Technology and Compliance at KMCO Gaming
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],KMCO Gaming
Major Players
Business Strategy ,[object Object]
Major Business Issue ,[object Object]
Smaller Business Issues ,[object Object],[object Object],[object Object],[object Object]
Possible Solutions  ,[object Object],[object Object],[object Object]
Continue to implement the last phases of the existing E-Discovery plan internally ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hire a consultant to advise and develop a new strategy altogether ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bring in a system integrator to implement existing E-Discovery plan ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Solution: ,[object Object],[object Object],[object Object],[object Object],[object Object]
System integrator to implement existing E-Discovery plan ,[object Object],[object Object],[object Object],[object Object]
Phase One: Creating an IT Use Policy Framework ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Phase Two: Assessing & Preparing for Infrastructure Upgrade  ,[object Object],[object Object],[object Object]
Phase Three: Selecting and Implementing Records Management Tool ,[object Object],[object Object],[object Object],[object Object],[object Object]
Phase Four: Maintenance & Audits  ,[object Object],[object Object],[object Object]
Recommended Tools for E-Discovery ,[object Object],[object Object],[object Object],[object Object]
KMCO Gaming ,[object Object]

Más contenido relacionado

La actualidad más candente

Technologies for Security and Compliance by Ken McIntyre, Ercot
Technologies for Security and Compliance by Ken McIntyre, ErcotTechnologies for Security and Compliance by Ken McIntyre, Ercot
Technologies for Security and Compliance by Ken McIntyre, ErcotTheAnfieldGroup
 
A systems engineering approach to cannabis product development.v1.03 21-19
A systems engineering approach to cannabis product development.v1.03 21-19A systems engineering approach to cannabis product development.v1.03 21-19
A systems engineering approach to cannabis product development.v1.03 21-19Jacklyn R. Green
 
Feroot Smart Technology Privacy Summit: Fiduciary Finesse & Cybersecurity — W...
Feroot Smart Technology Privacy Summit: Fiduciary Finesse & Cybersecurity — W...Feroot Smart Technology Privacy Summit: Fiduciary Finesse & Cybersecurity — W...
Feroot Smart Technology Privacy Summit: Fiduciary Finesse & Cybersecurity — W...Feroot
 
Framework Resilient Networks
Framework Resilient Networks Framework Resilient Networks
Framework Resilient Networks Michael Fistler
 
Power Advisory Smart Grid Presentation
Power Advisory Smart Grid PresentationPower Advisory Smart Grid Presentation
Power Advisory Smart Grid Presentationjohndalton
 
Hernan Huwyler - Boards in a Digitalized World
Hernan Huwyler - Boards in a Digitalized WorldHernan Huwyler - Boards in a Digitalized World
Hernan Huwyler - Boards in a Digitalized WorldHernan Huwyler, MBA CPA
 
The infrastructure and the security essentials of information technology in a...
The infrastructure and the security essentials of information technology in a...The infrastructure and the security essentials of information technology in a...
The infrastructure and the security essentials of information technology in a...adeel hamid
 
ITAM AUS 2017 IBM Blackbelt Licensing Competition
ITAM AUS 2017 IBM Blackbelt Licensing CompetitionITAM AUS 2017 IBM Blackbelt Licensing Competition
ITAM AUS 2017 IBM Blackbelt Licensing CompetitionMartin Thompson
 
Industry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working TogetherIndustry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working TogetherEnergySec
 
Assessing IT Security and Compliance Risk for Acquisitions and Mergers
Assessing IT Security and Compliance Risk for Acquisitions and MergersAssessing IT Security and Compliance Risk for Acquisitions and Mergers
Assessing IT Security and Compliance Risk for Acquisitions and MergersMelanie Brandt
 
RISK: When What Can Never Happen — Does
RISK: When What Can Never Happen — DoesRISK: When What Can Never Happen — Does
RISK: When What Can Never Happen — DoesTechPoint
 
e-A11: Workshop B - Building your accessibility action plan
e-A11: Workshop B - Building your accessibility action plane-A11: Workshop B - Building your accessibility action plan
e-A11: Workshop B - Building your accessibility action planHeadstar
 
Vendor Management - PCI DSS, ISO 27001, E13PA,HIPPA & FFIEC
Vendor Management - PCI DSS, ISO 27001, E13PA,HIPPA & FFIECVendor Management - PCI DSS, ISO 27001, E13PA,HIPPA & FFIEC
Vendor Management - PCI DSS, ISO 27001, E13PA,HIPPA & FFIECControlCase
 
From Device Selection to Data Protection: Selecting the Right Mobility Soluti...
From Device Selection to Data Protection: Selecting the Right Mobility Soluti...From Device Selection to Data Protection: Selecting the Right Mobility Soluti...
From Device Selection to Data Protection: Selecting the Right Mobility Soluti...Enterprise Mobile
 
ITAM AUS 2017 SAM Interactions can help deliver good legal & commercial agree...
ITAM AUS 2017 SAM Interactions can help deliver good legal & commercial agree...ITAM AUS 2017 SAM Interactions can help deliver good legal & commercial agree...
ITAM AUS 2017 SAM Interactions can help deliver good legal & commercial agree...Martin Thompson
 
EHS Trends 2017-Improve your Organization's Operations in China
EHS Trends 2017-Improve your Organization's Operations in ChinaEHS Trends 2017-Improve your Organization's Operations in China
EHS Trends 2017-Improve your Organization's Operations in ChinaNimonik
 
OTC: Asset maintenance and integrity solutions
OTC: Asset maintenance and integrity solutionsOTC: Asset maintenance and integrity solutions
OTC: Asset maintenance and integrity solutionsLloyd's Register Energy
 
AReNA - Debate Is Machine Learning Mature Enough
AReNA - Debate Is Machine Learning Mature EnoughAReNA - Debate Is Machine Learning Mature Enough
AReNA - Debate Is Machine Learning Mature EnoughHernan Huwyler, MBA CPA
 

La actualidad más candente (20)

Technologies for Security and Compliance by Ken McIntyre, Ercot
Technologies for Security and Compliance by Ken McIntyre, ErcotTechnologies for Security and Compliance by Ken McIntyre, Ercot
Technologies for Security and Compliance by Ken McIntyre, Ercot
 
A systems engineering approach to cannabis product development.v1.03 21-19
A systems engineering approach to cannabis product development.v1.03 21-19A systems engineering approach to cannabis product development.v1.03 21-19
A systems engineering approach to cannabis product development.v1.03 21-19
 
Bankauditin it env
Bankauditin it envBankauditin it env
Bankauditin it env
 
Feroot Smart Technology Privacy Summit: Fiduciary Finesse & Cybersecurity — W...
Feroot Smart Technology Privacy Summit: Fiduciary Finesse & Cybersecurity — W...Feroot Smart Technology Privacy Summit: Fiduciary Finesse & Cybersecurity — W...
Feroot Smart Technology Privacy Summit: Fiduciary Finesse & Cybersecurity — W...
 
Framework Resilient Networks
Framework Resilient Networks Framework Resilient Networks
Framework Resilient Networks
 
Power Advisory Smart Grid Presentation
Power Advisory Smart Grid PresentationPower Advisory Smart Grid Presentation
Power Advisory Smart Grid Presentation
 
Hernan Huwyler - Boards in a Digitalized World
Hernan Huwyler - Boards in a Digitalized WorldHernan Huwyler - Boards in a Digitalized World
Hernan Huwyler - Boards in a Digitalized World
 
The infrastructure and the security essentials of information technology in a...
The infrastructure and the security essentials of information technology in a...The infrastructure and the security essentials of information technology in a...
The infrastructure and the security essentials of information technology in a...
 
ITAM AUS 2017 IBM Blackbelt Licensing Competition
ITAM AUS 2017 IBM Blackbelt Licensing CompetitionITAM AUS 2017 IBM Blackbelt Licensing Competition
ITAM AUS 2017 IBM Blackbelt Licensing Competition
 
Industry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working TogetherIndustry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working Together
 
overview 2015
overview 2015overview 2015
overview 2015
 
Assessing IT Security and Compliance Risk for Acquisitions and Mergers
Assessing IT Security and Compliance Risk for Acquisitions and MergersAssessing IT Security and Compliance Risk for Acquisitions and Mergers
Assessing IT Security and Compliance Risk for Acquisitions and Mergers
 
RISK: When What Can Never Happen — Does
RISK: When What Can Never Happen — DoesRISK: When What Can Never Happen — Does
RISK: When What Can Never Happen — Does
 
e-A11: Workshop B - Building your accessibility action plan
e-A11: Workshop B - Building your accessibility action plane-A11: Workshop B - Building your accessibility action plan
e-A11: Workshop B - Building your accessibility action plan
 
Vendor Management - PCI DSS, ISO 27001, E13PA,HIPPA & FFIEC
Vendor Management - PCI DSS, ISO 27001, E13PA,HIPPA & FFIECVendor Management - PCI DSS, ISO 27001, E13PA,HIPPA & FFIEC
Vendor Management - PCI DSS, ISO 27001, E13PA,HIPPA & FFIEC
 
From Device Selection to Data Protection: Selecting the Right Mobility Soluti...
From Device Selection to Data Protection: Selecting the Right Mobility Soluti...From Device Selection to Data Protection: Selecting the Right Mobility Soluti...
From Device Selection to Data Protection: Selecting the Right Mobility Soluti...
 
ITAM AUS 2017 SAM Interactions can help deliver good legal & commercial agree...
ITAM AUS 2017 SAM Interactions can help deliver good legal & commercial agree...ITAM AUS 2017 SAM Interactions can help deliver good legal & commercial agree...
ITAM AUS 2017 SAM Interactions can help deliver good legal & commercial agree...
 
EHS Trends 2017-Improve your Organization's Operations in China
EHS Trends 2017-Improve your Organization's Operations in ChinaEHS Trends 2017-Improve your Organization's Operations in China
EHS Trends 2017-Improve your Organization's Operations in China
 
OTC: Asset maintenance and integrity solutions
OTC: Asset maintenance and integrity solutionsOTC: Asset maintenance and integrity solutions
OTC: Asset maintenance and integrity solutions
 
AReNA - Debate Is Machine Learning Mature Enough
AReNA - Debate Is Machine Learning Mature EnoughAReNA - Debate Is Machine Learning Mature Enough
AReNA - Debate Is Machine Learning Mature Enough
 

Destacado

JAKTA CONGRESS - GAMBLING COMPLIANCE Public Policy Challenges of Regulating G...
JAKTA CONGRESS - GAMBLING COMPLIANCE Public Policy Challenges of Regulating G...JAKTA CONGRESS - GAMBLING COMPLIANCE Public Policy Challenges of Regulating G...
JAKTA CONGRESS - GAMBLING COMPLIANCE Public Policy Challenges of Regulating G...Mirjana Acimovic
 
Guide to Unlawful Internet Gambling Enforcement Act of 2006
Guide to Unlawful Internet Gambling Enforcement Act of 2006Guide to Unlawful Internet Gambling Enforcement Act of 2006
Guide to Unlawful Internet Gambling Enforcement Act of 2006Manish Mandhyan
 
Intellectual property models in the electronic gaming industry
Intellectual property models in the electronic gaming industryIntellectual property models in the electronic gaming industry
Intellectual property models in the electronic gaming industryGiulio Coraggio
 
Smart home e problematiche legali - L'interoperabilità tra piattaforme come u...
Smart home e problematiche legali - L'interoperabilità tra piattaforme come u...Smart home e problematiche legali - L'interoperabilità tra piattaforme come u...
Smart home e problematiche legali - L'interoperabilità tra piattaforme come u...Giulio Coraggio
 
Scommesse sportive online in Italia, come invertire il declino
Scommesse sportive online in Italia, come invertire il declinoScommesse sportive online in Italia, come invertire il declino
Scommesse sportive online in Italia, come invertire il declinoGiulio Coraggio
 
Wearable technologies, privacy and intellectual property rights
Wearable technologies, privacy and intellectual property rightsWearable technologies, privacy and intellectual property rights
Wearable technologies, privacy and intellectual property rightsGiulio Coraggio
 
IS Audit Checklist- by Software development company in india
IS Audit Checklist- by Software development company in indiaIS Audit Checklist- by Software development company in india
IS Audit Checklist- by Software development company in indiaiFour Consultancy
 
Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000Sagar Rahurkar
 
Webinar italy remote gaming regulations
Webinar italy remote gaming regulationsWebinar italy remote gaming regulations
Webinar italy remote gaming regulationsGiulio Coraggio
 
Paddy Power -Sarah Fay
Paddy Power -Sarah FayPaddy Power -Sarah Fay
Paddy Power -Sarah FaySarah Fay
 
Cyber risk e assicurazioni
Cyber risk e assicurazioniCyber risk e assicurazioni
Cyber risk e assicurazioniGiulio Coraggio
 
Wearable technologies and remote patient remote monitoring system
Wearable technologies and remote patient remote monitoring systemWearable technologies and remote patient remote monitoring system
Wearable technologies and remote patient remote monitoring systemGiulio Coraggio
 
What changes with the EU Data Protection Regulation for Gambling Companies
What changes with the EU Data Protection Regulation for Gambling CompaniesWhat changes with the EU Data Protection Regulation for Gambling Companies
What changes with the EU Data Protection Regulation for Gambling CompaniesGiulio Coraggio
 
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...Giulio Coraggio
 
What changes for Internet of Things technologies with the EU Data Protection ...
What changes for Internet of Things technologies with the EU Data Protection ...What changes for Internet of Things technologies with the EU Data Protection ...
What changes for Internet of Things technologies with the EU Data Protection ...Giulio Coraggio
 
Legal requirements for operating in a videolottery market
Legal requirements for operating in a videolottery marketLegal requirements for operating in a videolottery market
Legal requirements for operating in a videolottery marketGiulio Coraggio
 
Come cambia la cybersecurity con il regolamento privacy europeo
Come cambia la cybersecurity con il regolamento privacy europeoCome cambia la cybersecurity con il regolamento privacy europeo
Come cambia la cybersecurity con il regolamento privacy europeoGiulio Coraggio
 

Destacado (20)

IDB Compliance Technology
IDB Compliance  TechnologyIDB Compliance  Technology
IDB Compliance Technology
 
JAKTA CONGRESS - GAMBLING COMPLIANCE Public Policy Challenges of Regulating G...
JAKTA CONGRESS - GAMBLING COMPLIANCE Public Policy Challenges of Regulating G...JAKTA CONGRESS - GAMBLING COMPLIANCE Public Policy Challenges of Regulating G...
JAKTA CONGRESS - GAMBLING COMPLIANCE Public Policy Challenges of Regulating G...
 
Guide to Unlawful Internet Gambling Enforcement Act of 2006
Guide to Unlawful Internet Gambling Enforcement Act of 2006Guide to Unlawful Internet Gambling Enforcement Act of 2006
Guide to Unlawful Internet Gambling Enforcement Act of 2006
 
AML/CTF Compliance Presentation - Gaming
AML/CTF Compliance Presentation - GamingAML/CTF Compliance Presentation - Gaming
AML/CTF Compliance Presentation - Gaming
 
Intellectual property models in the electronic gaming industry
Intellectual property models in the electronic gaming industryIntellectual property models in the electronic gaming industry
Intellectual property models in the electronic gaming industry
 
Smart home e problematiche legali - L'interoperabilità tra piattaforme come u...
Smart home e problematiche legali - L'interoperabilità tra piattaforme come u...Smart home e problematiche legali - L'interoperabilità tra piattaforme come u...
Smart home e problematiche legali - L'interoperabilità tra piattaforme come u...
 
Scommesse sportive online in Italia, come invertire il declino
Scommesse sportive online in Italia, come invertire il declinoScommesse sportive online in Italia, come invertire il declino
Scommesse sportive online in Italia, come invertire il declino
 
Wearable technologies, privacy and intellectual property rights
Wearable technologies, privacy and intellectual property rightsWearable technologies, privacy and intellectual property rights
Wearable technologies, privacy and intellectual property rights
 
IS Audit Checklist- by Software development company in india
IS Audit Checklist- by Software development company in indiaIS Audit Checklist- by Software development company in india
IS Audit Checklist- by Software development company in india
 
Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000
 
Webinar italy remote gaming regulations
Webinar italy remote gaming regulationsWebinar italy remote gaming regulations
Webinar italy remote gaming regulations
 
Paddy Power -Sarah Fay
Paddy Power -Sarah FayPaddy Power -Sarah Fay
Paddy Power -Sarah Fay
 
Cyber risk e assicurazioni
Cyber risk e assicurazioniCyber risk e assicurazioni
Cyber risk e assicurazioni
 
Paddy Power powerpoint
Paddy Power powerpointPaddy Power powerpoint
Paddy Power powerpoint
 
Wearable technologies and remote patient remote monitoring system
Wearable technologies and remote patient remote monitoring systemWearable technologies and remote patient remote monitoring system
Wearable technologies and remote patient remote monitoring system
 
What changes with the EU Data Protection Regulation for Gambling Companies
What changes with the EU Data Protection Regulation for Gambling CompaniesWhat changes with the EU Data Protection Regulation for Gambling Companies
What changes with the EU Data Protection Regulation for Gambling Companies
 
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
 
What changes for Internet of Things technologies with the EU Data Protection ...
What changes for Internet of Things technologies with the EU Data Protection ...What changes for Internet of Things technologies with the EU Data Protection ...
What changes for Internet of Things technologies with the EU Data Protection ...
 
Legal requirements for operating in a videolottery market
Legal requirements for operating in a videolottery marketLegal requirements for operating in a videolottery market
Legal requirements for operating in a videolottery market
 
Come cambia la cybersecurity con il regolamento privacy europeo
Come cambia la cybersecurity con il regolamento privacy europeoCome cambia la cybersecurity con il regolamento privacy europeo
Come cambia la cybersecurity con il regolamento privacy europeo
 

Similar a Information Technology and Compliance at KMCO Gaming

It aac cloud-acquisition_roadmap2012
It aac cloud-acquisition_roadmap2012It aac cloud-acquisition_roadmap2012
It aac cloud-acquisition_roadmap2012John Weiler
 
4 reasons why your staff should keep time records.pdf
4 reasons why your staff should keep time records.pdf4 reasons why your staff should keep time records.pdf
4 reasons why your staff should keep time records.pdfJose thomas
 
Motorola Case Study: Digitization of the IAM Lifecycle
Motorola Case Study: Digitization of the IAM LifecycleMotorola Case Study: Digitization of the IAM Lifecycle
Motorola Case Study: Digitization of the IAM LifecycleMaria Thompson
 
Acquiring New Technologies with Decreasing IT Budgets
Acquiring New Technologies with Decreasing IT Budgets  Acquiring New Technologies with Decreasing IT Budgets
Acquiring New Technologies with Decreasing IT Budgets InnoTech
 
How to Prepare for Success with the Modern IT System.pdf
How to Prepare for Success with the Modern IT System.pdfHow to Prepare for Success with the Modern IT System.pdf
How to Prepare for Success with the Modern IT System.pdfJose thomas
 
Organization Wide Performance Methodology (ITIL)
Organization Wide Performance Methodology (ITIL)Organization Wide Performance Methodology (ITIL)
Organization Wide Performance Methodology (ITIL)Moshe Kaplan
 
Enterprise Architecture - Information Security
Enterprise Architecture - Information SecurityEnterprise Architecture - Information Security
Enterprise Architecture - Information SecurityAjay Kumar Uppal
 
NARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeNARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeBrenda Majewski
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxdewhirstichabod
 
Enterprise Architecture - An Introduction
Enterprise Architecture - An Introduction Enterprise Architecture - An Introduction
Enterprise Architecture - An Introduction Daljit Banger
 
Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture Ajay Kumar Uppal
 
CC&B SMECO Success Story
CC&B SMECO Success StoryCC&B SMECO Success Story
CC&B SMECO Success Storyvijaikrishnan
 
Mortgage Bank Implementation Process
Mortgage Bank Implementation ProcessMortgage Bank Implementation Process
Mortgage Bank Implementation ProcessDan Nelson
 
Resume - James R Booth 2016 03 04
Resume - James R Booth 2016 03 04Resume - James R Booth 2016 03 04
Resume - James R Booth 2016 03 04Jim Booth
 
ERP - Implementation is The Challenge
ERP - Implementation is The ChallengeERP - Implementation is The Challenge
ERP - Implementation is The Challengevinaya.hs
 
Weiler slideshow
Weiler slideshowWeiler slideshow
Weiler slideshowvjairam
 
Compliance In A Box Documentum Deployment Solution
Compliance In A Box Documentum Deployment SolutionCompliance In A Box Documentum Deployment Solution
Compliance In A Box Documentum Deployment Solutionairsch
 

Similar a Information Technology and Compliance at KMCO Gaming (20)

It aac cloud-acquisition_roadmap2012
It aac cloud-acquisition_roadmap2012It aac cloud-acquisition_roadmap2012
It aac cloud-acquisition_roadmap2012
 
Cisco erp v12
Cisco erp v12Cisco erp v12
Cisco erp v12
 
4 reasons why your staff should keep time records.pdf
4 reasons why your staff should keep time records.pdf4 reasons why your staff should keep time records.pdf
4 reasons why your staff should keep time records.pdf
 
Motorola Case Study: Digitization of the IAM Lifecycle
Motorola Case Study: Digitization of the IAM LifecycleMotorola Case Study: Digitization of the IAM Lifecycle
Motorola Case Study: Digitization of the IAM Lifecycle
 
Cisco report final
Cisco report finalCisco report final
Cisco report final
 
Acquiring New Technologies with Decreasing IT Budgets
Acquiring New Technologies with Decreasing IT Budgets  Acquiring New Technologies with Decreasing IT Budgets
Acquiring New Technologies with Decreasing IT Budgets
 
SampleDecPkg.ppt
SampleDecPkg.pptSampleDecPkg.ppt
SampleDecPkg.ppt
 
How to Prepare for Success with the Modern IT System.pdf
How to Prepare for Success with the Modern IT System.pdfHow to Prepare for Success with the Modern IT System.pdf
How to Prepare for Success with the Modern IT System.pdf
 
Organization Wide Performance Methodology (ITIL)
Organization Wide Performance Methodology (ITIL)Organization Wide Performance Methodology (ITIL)
Organization Wide Performance Methodology (ITIL)
 
Enterprise Architecture - Information Security
Enterprise Architecture - Information SecurityEnterprise Architecture - Information Security
Enterprise Architecture - Information Security
 
NARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeNARCA Presentation - IT Best Practice
NARCA Presentation - IT Best Practice
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docx
 
Enterprise Architecture - An Introduction
Enterprise Architecture - An Introduction Enterprise Architecture - An Introduction
Enterprise Architecture - An Introduction
 
Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture
 
CC&B SMECO Success Story
CC&B SMECO Success StoryCC&B SMECO Success Story
CC&B SMECO Success Story
 
Mortgage Bank Implementation Process
Mortgage Bank Implementation ProcessMortgage Bank Implementation Process
Mortgage Bank Implementation Process
 
Resume - James R Booth 2016 03 04
Resume - James R Booth 2016 03 04Resume - James R Booth 2016 03 04
Resume - James R Booth 2016 03 04
 
ERP - Implementation is The Challenge
ERP - Implementation is The ChallengeERP - Implementation is The Challenge
ERP - Implementation is The Challenge
 
Weiler slideshow
Weiler slideshowWeiler slideshow
Weiler slideshow
 
Compliance In A Box Documentum Deployment Solution
Compliance In A Box Documentum Deployment SolutionCompliance In A Box Documentum Deployment Solution
Compliance In A Box Documentum Deployment Solution
 

Information Technology and Compliance at KMCO Gaming

Notas del editor

  1. Pros: -Cost Efficient in the long term (mean salary compensation for IT professionals is $77,415 per Janco Associates) -Since KMCO is experienced in their particular industry, they can better determine the security they require and can react faster to changes in laws and security inflitration -Employees working on E-Discovery will become more experienced in the field as they implement the plan Cons: -Currently E-Discovery has been a failure -Legal and IT departments are having serious issues with infighting -Time is lacking as Legal division and IT are both working on issues related to the lawsuit and the hurricane Katrina disaster
  2. PROS: -Expertise: specialized degrees in MIS, technology or computer science -Do not need to use someone on staff, which means everyone can continue to work towards their core business objectives. Keeps budgets on track -Flexible relationship versus hiring employees -Objectivity & impartial: decisions based on experience in similar projects and unbiased to previous technology decisions at the company (cabinet system) CONS: -Cost: $70-100/hour (www.captureplanning.com) depending on experience Because IT projects produce tangible and intangible benefits, sometimes hard to justify costs—hard to value the $ investment -Time consuming to start over from scratch. How many consultants, more than 1 increases costs but only 1 may take longer -won’t understand the culture of KMCO, will need solid direction and oversight from someone, the steering committee?? -Egos of executives currently involved in the project who will have to let go of some power with the outsourcing
  3. -The steering committee will help prioritize project components since they know the internal workings of the company -Successful steering committees=key operating departments must be represented and the right person from each dept must participate
  4. -Who will take over the system integrator’s role after the implementation? Internal audit function to ensure continued compliance, would this fall under Bruce & IT or CFO might want it under his people