Website Assessment Tool
• Developed organizational website content assessment tool to include all Part D content requirements.
• Identifies areas where plans are compliant or need further clarification of posted information. » Read more
Youth and Social Media
• 95% of youth are online and 80% of those use social media.
• Conversations on drug-related behavior take place more on micromedia using different slang terminology than used in person.
» Read more
• Analysis of Internet and social media to identify and trend beneficiary issues in real time: Message boards, blogs, Facebook, Twitter, etc.
• Scan the Internet for data, called posts, based on a certain keyword or set of keywords.
» Read more
• Liberia has undergone a long period of bloody civil war that shattered its economy.
• Its principal sector of activity, agriculture, has been damaged and is plagued by low crop yields. » Read more
Stop me if you’ve seen this scenario before: A compliance policy is developed behind closed doors by federal security advisors. Once published, it’s sent to IT managers, who take one look and think, “Well, this won’t really work.”
They begin the arduous process of trying to provide feedback, which amounts to submitting a request into a suggestion box, and waiting for an answer that may or may not come. The public comment process is often opaque; you don’t know if or why your comments were rejected and it’s difficult to appeal your case.
Security compliance doesn’t have to stifle innovation — it should baked into the agile development process.