IT WEEK • 6 SEPTEMBER 2004 36 ANALYSIS Councils gain guidance on implementing CRM systems to support online services and improve efficiency MANAGEMENTWEEK WHERE TECHNOLOGY BECOMES BUSINESS REALITY Editor: Madeline Bennett IT chiefs plan for audit law Madeline Bennett NEW PRESSURES FOR COMPLIANCE E Companies Bill is likely to • The impose more stringent rules for xperts are warning IT managers that proposed UK auditing legislation, along with new US accounting rules, will put extra demands on their departments as firms struggle to comply. The Companies Bill, proposed to protect the UK against accounting scandals like those that have rocked the US and Europe in recent years, will have its second reading in Parliament on 7 September. The bill proposes new rules to ensure the integrity of financial reporting and the independence of auditors, and could have a huge impact on IT departments, according to analyst firm Butler Group. Last week it warned that if the bill becomes law, many firms will only be able to meet the requirements by investing in better IT systems. These would include business process Jennings: plan before investing • • company auditing and reporting. When the bill becomes law, many firms are likely to need better IT systems for process management. Firms listed in the US will also need to comply with the Sox Act. management systems, to ensure tasks are transparently assigned to appropriate people; email management systems, to make sure message content is managed at a corporate level; and policy management technology, especially governing data storage. Disaster recovery, identity and access management, and records management were also cited as important areas for IT departments to consider when addressing their company’s compliance requirements. Tim Jennings, research director at Butler Group, said the foundations of compliance would be good systems for business processes and data integrity. “Under the rules, firms require one version of the truth and you need to prove that employees are Insecurity harms shares Madeline Bennett nies should make security a high priority. Eighty-seven percent said the board should nvestors say IT security breaches can be aware of and actively review vulnerabilgreatly affect firms’ share prices, accordities, and 57 percent expected reports on ing to a report published today. Despite information risk strategy. this, many companies still fail to view But businesses themselves view breachinformation security as a board-level issue. es less seriously, the research found. Almost Of 100 equity fund managers queshalf of FTSE 350 companies said they did tioned by IT services comnot have formal informapany LogicaCMG, 83 per- INVESTORS RATE SECURITY tion security policies, and cent said that a security 53 percent relied on the IT How important is IT security breach would undermine a for investment decisions? department to enforce secfirm’s share price. They add- 2% Not urity management rather 6% No opinion ed that security breaches important than making it a boardare a top consideration level issue. when they decide where to The study highlights a 31% Very 24% important Not very invest, and only the misrepdifference in the imporimportant resentation of financial tance placed on IT securiresults or the sudden departy by companies and their 37% Fairly ture of a key senior member investors, said Dave Marimportant of staff were likely to have a tin, UK principal security more harmful impact. expert at LogicaCMG.“UK Source: LogicaCMG Investors said compafirms have a misplaced I itweek.co.uk working with the same set of numbers across departments and IT apps,” he said. But Jennings advised firms not to rush out to buy reporting systems or business process management tools. “Buying the technology and then working out how to use it is the wrong way. It’s better to carry out a business process review and invest based on the outcome,” he said. Although the bill is only due for its second reading and could be amended, Jennings said the need to reassure investors meant a law along these lines is inevitable. Firms could face further compliance headaches following the introduction of a new element of the US Sarbanes-Oxley (Sox) Act last month, requiring firms that are listed in the US to abide by specific disclosure and reporting rules. According to analyst firm Gartner, companies tend to focus their IT compliance efforts on section 404 of the act, which covers internal controls. However, the recently introduced section 409 imposes additional reporting requirements and sets timeframes for disclosure, putting additional pressures on technology systems. conception that higher spending on IT security alone will mitigate information security violations. Information security governance needs to be embraced as a practice throughout the organisation.” Martin added that investors’ apparent interest in IT security demonstrated that share value, as well as corporate brands, could be damaged by breaches. “This realisation should prompt business leaders to take a more holistic approach to information security governance,” he added. Andrew Braunberg, of research firm Current Analysis, was surprised that so many firms lacked formal security policies. “All large organisations should have information security policies in place,” he said. However, he disagreed with investors who wanted firms to publish security risk reports. “There is no reason to potentially point out weak spots to hackers.” Braunberg said the imminence of more stringent regulations would force firms to improve their approach to IT security. The threat from within, p36 www.logicacmg.com/uk/security CONTENTS 36 COMMENT Insider scams and cases of government staff viewing porn at work show why organisations need to enforce strict usage controls, writes Madeline Bennett 37 ANALYSIS New initiatives could help local authorities to implement CRM systems, put services online, and overcome problems of integration and resistance to change Better tools for content management Brian Fonseca A trio of vendors recently announced moves to help firms better manage electronic content and aggregate data from multiple sources. FileNet released its Records Manager product last month.The enterprise content management suite is designed to improve record processing by automating file management processes, said the company. It can also ensure that all records related to a business process or project are programmatically declared, classified and retained.This reduces the possibility of user errors, said FileNet. Veritas last week announced it had agreed to acquire KVault Software (KVS), a maker of policy-based email archiving software.The acquisition could make it easier for Veritas users to manage the growth of email content.The KVS tools can archive and index data held in platforms such as Microsoft Exchange, Microsoft SharePoint and Microsoft Office, along with unstructured data held in other file systems. Meanwhile, EMC has released its Documentum Enterprise Content Integration (ECI) Services software, to help firms manage records and aggregate content across the enterprise. ECI, a rebranded version of the AskOnce content management technology the company acquired from Xerox earlier this year, can discover, access and assimilate structured and unstructured content via a single query. This can include content from repositories outside of the Documentum Enterprise Content Management platform. The latest version offers new cross-lingual search capabilities and content extraction features. www.filenet.com www.veritas.com www.emc.com www.eweek.com 35 © eWeek USA 2004 36 COMMENT How to fight insider threats MANAGEMENTWEEK IT WEEK • 6 SEPTEMBER 2004 The threat from within Recent cases of computer misuse in Whitehall and a new report into IT-based offences in the finance sector highlight the need for strict usage controls, says Madeline Bennett F irms are not doing well when it comes to managing their employees’ computer habits. The news that the government fired some of its own staff for accessing internet porn at work is likely to cause a few red faces in Whitehall. The Department of Work and Pensions (DWP) has apparently sacked around 20 staff and disciplined a further 200 for internet abuses carried out since early last year. The DWP says it takes the misuse of its IT systems very seriously – a shame this attitude does not seem to be reflected among its staff. You’d think that those working for the government would make a fair attempt to comply with its policies. Not so – according to one report, DWP employees managed to access two million pages of internet porn, with one employee allegedly viewing over 100,000 images. But before employers sack anyone for viewing online porn or otherwise taking liberties, they need to ensure they have the law on their side, and this generally means that they should establish ground rules. A proper usage policy should be in place, and employees should be fully informed of its content and required to sign up to its rules – to avoid unfair dismissal cases. Many DWP employees originally under investigation said they had accidentally accessed inappropriate content through spam emails. I’m sure it won’t be long before UK staff follow their US counterparts in trying to sue employers for failing to protect their inboxes and innocent eyes from offensive material. Meanwhile, a new report from the US Secret Service and US security advisory body Cert shows that firms have another reason to be scared of their staff, thanks to the threat of insider crime. The Insider Threat Study analysed and interviewed the perpetrators of various computer-based insider offences. It revealed that most offenders were from admin or service backgrounds, and used technically unsophisticated techniques. I’m not sure I agree with analyst firm Gartner’s response to the study. It is urging all financial services firms to carry out an in-depth risk analysis of all “stakeholders” to determine whether these parties could possess the technical ability and the means to damage company systems or misuse information. But as the study showed, there is no standard profile of offenders and frequently no technical knowledge is required to commit the crime – often a username and password are enough – which means all stakeholders could potentially be included in a risk list. Gartner said firms could eliminate the threat from stakeholders by “taking steps such as changing passwords and access rights immediately when an insider’s status changes (for example, when an employee leaves, relationships with auditors or suppliers change or consultants com- CRM lifts council efficiency CRM tools can help councils streamline their services, but cultural and technical obstacles must be surmounted first E-GOVERNMENT ANALYSIS BY MADELINE BENNETT M uch is being done to encourage local authorities to deploy customer relationship management (CRM) systems, to help them meet the 2005 deadline to put all central and local government services online. These initiatives highlight a number of obstacles to CRM that could affect companies as well as government bodies, while also indicating the possible rewards of successful CRM projects The London Borough of Newham has recently launched a project to show how CRM technology can help authorities eenable their services. And Onyx Software set up a CRM implementation centre last month, which is designed to let Grogan: cut admin costs 36 local authorities simulate CRM rollouts. But recent research from integration software vendor NDL found many authorities were reluctant to install CRM technology. Of 247 local authorities questioned, over half had yet to install a CRM system. Difficulties of integration and cultural change were cited as the main barriers to successful CRM projects. NDL managing director Declan Grogan said that e-services is a new topic for many councils. “Cultural change is a big barrier,” he said. “Departments have to learn to let go of transactions, but this is very hard for them to accept.” Departments’ existing disparate proprietary IT systems will create integration headaches for new CRM deployments, Grogan warned. But the effort could be rewarded if the resulting joined-up transaction processes create cost savings. One benefit could be a big reduction in the time taken to process queries. “The CRM system is not the first stop, but one stop. It can answer queries, and not just take them,”said Grogan.“It’s about 80 percent of transactions getting sorted by 20 percent of the people for 20 percent of the cost.” However, Angus Dunlop, business manager for the public sector division at software and outsourcing specialist Northgate Information Solutions, said the culture of local authorities could be an obstacle to implementing CRM.“Benefits practitioners will insist nobody else can do their job,” he said. “But a piece of rules-based software will enable anybody to take claim details and make an initial assessment. It prevents a specialist from spending time over a claim that will eventually be rejected.” To assess the requirement for CRM systems, managers should first investigate organisational processes to identify where improvements could be made through online systems to save resources. Dunlop cited the example of the hall-booking process of one authority, which required a £30 deposit. “When they investigated how many times the deposit had been [permanently] retained it was never, so that whole process – and associated costs – was done away with.” Halton council is one local authority plete a project)”. But this is likely to do little to reduce the problem, given the conclusion of the US report that almost any worker could have the means and desire to carry out a crime. And surely when an employee leaves, it goes without saying that their access rights should be amended – preferably to bar entry to all corporate systems. Most insider offences analysed in the report required little or no technical expertise and were spotted by basic measures such as manual account audits. So companies might do better to focus on improving their procedures, checks, access controls and logging. ITW [email protected] SUMMARY systems could help local • CRM authorities meet the 2005 deadline • • for getting services online, and speed up services in many cases. However, about half of authorities have yet to implement CRM tools. Problems of integration and cultural change are cited as the main barriers to CRM implementation. that has implemented a fully-functional CRM system. “We wanted a product that would allow our customer service advisers to have single log-in and deliver all services,” said Roy Wainwright, head of customer services at Halton. The council deployed a system based on Amdocs’ ClarifyCRM product, with a front-end system developed by Northgate. For Halton, integrating its existing systems was the difficult part of the transition. “You need the suppliers of legacy systems to give you doors into it, via XML or APIs,” said Wainwright. The council’s new CRM system allows advisers to handle queries about all Halton’s services. “The system has increased efficiency all round as we can stop repeat visits, save time and money, and be more proactive,” Wainwright said. ITW www.ndl.co.uk www.northgate-is.com itweek.co.uk
© Copyright 2026 Paperzz