1.

Since So Much Nonpublic Information Is Communicated Beyond E-mail Based On The Simple Mail Transfer Protocol, How Can We Build Internal Controls To Adequately Detect The Timely Disclosure Of Information Flowing Over Web Mail, Chat, Or Http?

Answer»

In today's NETWORKED world, it's not just about e-mail. Management can't ensure the truthfulness or accuracy of financial data if it doesn't have the means to monitor the movement of sensitive information across the entire corporate network 24 hours a DAY, seven DAYS a week.

Demand more from technology. New products are available that can monitor electronic disclosure of nonpublic information and aren't LIMITED to SMTP-based e-mail. These technologies can monitor, record and provide alerts on electronic disclosures by analyzing all information flowing over the corporate network from Web mail and CHAT to file transfer protocol and HTTP. This type of monitoring technology combined with a storage system that allows forensic searches into stored information can prove invaluable if an investigation is required.

In today's networked world, it's not just about e-mail. Management can't ensure the truthfulness or accuracy of financial data if it doesn't have the means to monitor the movement of sensitive information across the entire corporate network 24 hours a day, seven days a week.

Demand more from technology. New products are available that can monitor electronic disclosure of nonpublic information and aren't limited to SMTP-based e-mail. These technologies can monitor, record and provide alerts on electronic disclosures by analyzing all information flowing over the corporate network from Web mail and chat to file transfer protocol and HTTP. This type of monitoring technology combined with a storage system that allows forensic searches into stored information can prove invaluable if an investigation is required.



Discussion

No Comment Found