A defining element of the digital economy is that services are provided for free to consumers. The quid pro quo is that the service supplier (for example, Google) can monetize the data generated by the consumer, often in ways in which the consumer is not fully aware. Based on this business model, future car manufacturers … More Connected cars: Navigating the competition law implications
Some companies in the technology, media and telecommunications sector are doing it differently — and seeing results. A new study from Parthenon-EY shows that, when it comes to best practices in capital budgeting, top performers from the technology, media and telecommunications segments (TMT) might be onto something. That is, these leaders share a handful of … More Can the capital allocation process be a competitive advantage?
Excerpt from EY Wealth & Asset Management viewpoint. Joined-up data is increasingly crucial to creating shareholder value With the benefit of hindsight, it is easy to see why data has had such a meteoric rise up the agenda of asset managers’ executive teams. The explosion in the volume and speed of data accumulation across the … More Joined-up data: a Board imperative
The European Court of Justice (ECJ) has weighed-in on a long debated area of data protection law by ruling that the definition of personal data extends to dynamic IP addresses. In a ruling dated 19 October 2016 (ref.: C582/14), the ECJ found that dynamic IP addresses constitute personal data whenever the website host that processed … More EU: Court of Justice rules on dynamic IP addresses
EY has announced the launch of EY Ops Chain, a set of applications and services aimed at helping organizations commercialize the use of blockchain technology across the enterprise. EY Ops Chain combines blockchain-based services developed jointly by EY and industry collaborators, combining EY’s full range of consulting, tax and audit expertise to drive enhanced business … More EY infuses blockchain into enterprises and across industries with launch of EY Ops Chain
This article was first published on betterworkingworld.ey.com Could you explain how a cyber breach affects your bottom line? Cyber economics aims to do just that What is the true impact of a cyber breach? Lost data? Angry customers? A negative hit to your corporate reputation? With so many variables, many of which can be difficult … More Cyber economics: getting the board on board with cybersecurity
We are pleased to present the Spring 2017 edition of our Corporate and Commercial Law global update. This quarterly publication highlights a range of international corporate law matters and covers recent law developments in specific countries. In this issue, we have articles from a total of 36 jurisdictions on current legal affairs around the globe: … More Out now: EY Corporate & Commercial Law — global update, Spring 2017 edition
First published on betterworkingworld.ey.com Blockchain is more than just a data security protocol — it could transform the way industries and individuals do business Blockchain and the proliferation of the Internet of Things (IoT) presents an important opportunity to revolutionize supply chains, payments and revenue streams. But there are several unknowns and a number of … More With blockchain, what comes first, opportunity or threat?
Excerpt from EY report, Data ethics: digital dilemmas for the 21st century board. Just over 10 years since the phrase ‘data is the new oil’ (Clive Humby, 2006) was coined, the oil rush is gaining momentum. Companies are competing to create new markets and business models enabled by this rise in data, and unearth fresh … More Just because the law allows you to use data in a particular way, should you?
It’s not a crime to be attacked; you can’t stop being a target. It’s not a crime even to be breached; threats come from many directions and are highly sophisticated. The real problem is not realizing you’ve been breached, and failing to react in a planned and coordinated manner. As many organizations have learned – … More Incident response: Preparing for and responding to a cyber attack