Web design and Management
The Accessibility Advisory Council’s (AAC) is inviting interested stakeholders to provide their views to its initial proposal for accessible employment standards. Therefore, employment is the second of five accessibility standards being developed under the Accessibility for Manitobans Act (AMA).
On November 2, 2016, the government proposed Nova Scotia accessibility legislation to promote equality of opportunity and increase the inclusion and participation of Nova Scotians who have disabilities or functional limitations in all areas of everyday life by promoting and encouraging the prevention, reduction and removal of barriers.
Between July 2016 and February 2017, the federal government is consulting Canadians on planned accessibility legislation. The goal of the law would be to promote equality of opportunity and increase the inclusion and participation of Canadians who have disabilities or functional limitations in all areas of every day life.
Clearly, the great majority base their audit plan on some combination of (macro) enterprise-level risks and (micro) risks at a lower level of the organization. Somewhat more have weighted their plan towards the micro level than the macro level. So what does this all mean?
I am going to use a metaphor involving the board game of Monopoly to illustrate how I feel about risk management. The players compete to win by either having more money when the game ends (if there is a time limit) or by being the only one left standing after all the others have gone bankrupt. Let’s imagine our executive team is playing a game against its main competitors.
People love their phones. Phones now accompany us pretty much wherever we go, whatever we do. People use their phones in church, in restaurants, at the theatre, and, apparently, while committing crimes. And our phones are leaving a trail behind us.
Police know this. They also know that records are created every time our phones connect to cell towers to send and receive calls, SMS messages, or data. Every one of those records indicates that a phone (and, implicitly, the person carrying it) was in range of a particular cell tower, at a particular time.
This could be useful information if, say, one wanted to identify the person (or people) responsible for a string of jewelry store robberies.
The method will be familiar to many from movies and T.V. shows: all you need to do is to gather a list of every single person who was near each of the locations of interest at the time of interest and analyze the patterns. And, hey, that cell tower data can provide that list….
But is it legal?