Page 544 - Using MIS
P. 544

512       tHe InternatIonal DIMenSIon  International MIS

                                       Variations in privacy laws can also affect the operation of an organization’s international sys-
                                    tems. For example, in parts of Europe employers cannot read their workers’ emails, personal data
                                    cannot be collected without an individual’s permission, organizations must provide individuals with
                                    the ability to correct inaccuracies in the data they collect, and personal data cannot be shared by
                                    companies without express permission. None of these apply to organizations in the United States.
                                       Differences in privacy laws may become even more pronounced. In 2014, Google lost a le-
                                                                                                      9
                                    gal battle and was forced to provide European users with the “right to be forgotten.”  Individuals
                                    can request references of them to be removed from any search results. This ruling will likely be
                                    applied to other service providers as well. Unfortunately, none of these privacy protections ap-
                                    ply to U.S. citizens.
                                       Organizations need to be aware that laws related to privacy, content, and encryption will
                                    affect the way they collect and store data. Consider how these laws might affect organizations
                                    that use cloud-based services to store data. Organizations could operate in a country with loose
                                    content laws and then store all of their data and applications in another country with stricter
                                    privacy laws in order to protect their users. In other words, the intersection of international law
                                    and technology is forcing organizations to carefully evaluate how they manage their informa-
                                    tion systems, in particular, the location of their data.
                                    Physical Security

                                    Second, operating information systems internationally can be problematic because of different
                                    physical environments. This includes threats to infrastructure in the form of natural disasters,
                                    geopolitical risks, civil unrest, and terrorist attacks.
                                       Place your data center in Kansas, and it’s subject to tornados. Place your data center inter-
                                    nationally, and it’s potentially subject to typhoons/hurricanes, earthquakes, floods, volcanic
                                    eruptions, or mudslides. For example, the data centers in Japan survived the terrible effects
                                    of the 2011 earthquake, tsunami, and nuclear reactor meltdowns. They survived the shaking,
                                    flooding, and widespread power outages because they were housed in special facilities with
                                    shock-absorbing structures and had backup power generators.
                                       An organization’s physical infrastructure is also vulnerable to outright seizure. In 2011, the
                                    FBI seized several racks of servers from a data center in Reston, Virginia, that belonged to a
                                                                          10
                                    Switzerland-based company named DigitalOne.  DigitalOne’s owner, Sergej Ostroumow, said the
                                    seizure knocked several sites offline, but declined to say which one of his clients was being targeted.
                                       Employees who run critical infrastructure can be targeted as well. In 2014, Russian presi-
                                    dent Vladimir Putin revoked visas for nearly 1,000 foreign workers when tensions flared be-
                                    tween Russia and Western countries. Deloitte & Touche’s local chief operating officer, Quentin
                                    O’Toole, was deported for his wife’s speeding tickets.

                                    Cultural Norms

                                    Finally, cultural norms can affect the way organizations manage their international information
                                    systems. For example, bribery is generally considered unacceptable in the United States, but in
                                    other countries it is accepted as a normal way of doing business.
                                       In 2012, Walmart became embroiled in a bribery scandal that showed that local Walmart
                                    executives in Mexico used bribes to get building permits and expedite its expansion in Mexico.
                                    The fallout from the scandal resulted in departures of several key executives and $439 million
                                    spent on investigations and a new compliance program. It’s important to note that this is just
                                    one example. Graft is a worldwide problem. This example points out how differences in cultural
                                    norms can affect an organization’s daily operations.


                                    9 Julia Fioretti, “EU Says Firms Like Google and Facebook Must Meet Privacy Rules,” Reuters, June 6, 2014, www.
                                    reuters.com/article/2014/06/06/us-eu-dataprotection-idUSKBN0EH1ER20140606.August 12, 2014.
                                    10 Verne Kopytoff, “FBI Seizes Web Servers, Knocking Sites Offline,” The New York Times, June 21, 2011, accessed
                                    June 27, 2014, http://bits.blogs.nytimes.com/2011/06/21/f-b-i-seizes-web-servers-knocking-sites-offline/.
   539   540   541   542   543   544   545   546   547   548   549