integrity

Another File Integrity Checker 2.16

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.




integrity

Another File Integrity Checker 2.17

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.




integrity

Another File Integrity Checker 2.18

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.




integrity

Another File Integrity Checker 2.19

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.




integrity

Another File Integrity Checker 2.20

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.




integrity

Another File Integrity Checker 2.21

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.




integrity

Another File Integrity Checker 3.1

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.




integrity

Another File Integrity Checker 3.2

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.




integrity

Another File Integrity Checker 3.3

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.




integrity

Another File Integrity Checker 3.4

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.




integrity

Samhain File Integrity Checker 4.1.0

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.




integrity

Samhain File Integrity Checker 4.1.1

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.




integrity

Samhain File Integrity Checker 4.1.2

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.




integrity

Samhain File Integrity Checker 4.1.3

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.




integrity

Samhain File Integrity Checker 4.1.4

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.




integrity

Samhain File Integrity Checker 4.1.5

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.




integrity

Samhain File Integrity Checker 4.2.0

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.




integrity

Samhain File Integrity Checker 4.2.1

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.




integrity

Samhain File Integrity Checker 4.2.2

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.




integrity

Samhain File Integrity Checker 4.2.3

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.




integrity

Samhain File Integrity Checker 4.2.4

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.




integrity

Samhain File Integrity Checker 4.3.0

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.




integrity

Samhain File Integrity Checker 4.3.1

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.




integrity

Samhain File Integrity Checker 4.3.2

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.




integrity

NtUserCheckAccessForIntegrityLevel Use-After-Free Vulnerability

Microsoft Windows Vista / Server 2008 suffer from a NtUserCheckAccessForIntegrityLevel use-after-free vulnerability.




integrity

MS13-005 HWND_BROADCAST Low to Medium Integrity Privilege Escalation

The Windows kernel does not properly isolate broadcast messages from low integrity applications from medium or high integrity applications. This allows commands to be broadcasted to an open medium or high integrity command prompts allowing escalation of privileges. We can spawn a medium integrity command prompt, after spawning a low integrity command prompt, by using the Win+Shift+# combination to specify the position of the command prompt on the taskbar. We can then broadcast our command and hope that the user is away and doesn't corrupt it by interacting with the UI. Broadcast issue affects versions Windows Vista, 7, 8, Server 2008, Server 2008 R2, Server 2012, RT. But Spawning a command prompt with the shortcut key does not work in Vista so you will have to check if the user is already running a command prompt and set SPAWN_PROMPT false. The WEB technique will execute a powershell encoded payload from a Web location. The FILE technique will drop an executable to the file system, set it to medium integrity and execute it. The TYPE technique will attempt to execute a powershell encoded payload directly from the command line but it may take some time to complete.




integrity

Samhain File Integrity Checker 4.3.3

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.




integrity

Samhain File Integrity Checker 4.4.0

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.




integrity

Samhain File Integrity Checker 4.4.1

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.




integrity

Rif1 Functions in a Tissue-Specific Manner To Control Replication Timing Through Its PP1-Binding Motif [Genome Integrity and Transmission]

Replication initiation in eukaryotic cells occurs asynchronously throughout S phase, yielding early- and late-replicating regions of the genome, a process known as replication timing (RT). RT changes during development to ensure accurate genome duplication and maintain genome stability. To understand the relative contributions that cell lineage, cell cycle, and replication initiation regulators have on RT, we utilized the powerful developmental systems available in Drosophila melanogaster. We generated and compared RT profiles from mitotic cells of different tissues and from mitotic and endocycling cells of the same tissue. Our results demonstrate that cell lineage has the largest effect on RT, whereas switching from a mitotic to an endoreplicative cell cycle has little to no effect on RT. Additionally, we demonstrate that the RT differences we observed in all cases are largely independent of transcriptional differences. We also employed a genetic approach in these same cell types to understand the relative contribution the eukaryotic RT control factor, Rif1, has on RT control. Our results demonstrate that Rif1 can function in a tissue-specific manner to control RT. Importantly, the Protein Phosphatase 1 (PP1) binding motif of Rif1 is essential for Rif1 to regulate RT. Together, our data support a model in which the RT program is primarily driven by cell lineage and is further refined by Rif1/PP1 to ultimately generate tissue-specific RT programs.




integrity

Topoisomerases Modulate the Timing of Meiotic DNA Breakage and Chromosome Morphogenesis in Saccharomyces cerevisiae [Genome Integrity and Transmission]

During meiotic prophase, concurrent transcription, recombination, and chromosome synapsis place substantial topological strain on chromosomal DNA, but the role of topoisomerases in this context remains poorly defined. Here, we analyzed the roles of topoisomerases I and II (Top1 and Top2) during meiotic prophase in Saccharomyces cerevisiae. We show that both topoisomerases accumulate primarily in promoter-containing intergenic regions of actively transcribing genes, including many meiotic double-strand break (DSB) hotspots. Despite the comparable binding patterns, top1 and top2 mutations have different effects on meiotic recombination. TOP1 disruption delays DSB induction and shortens the window of DSB accumulation by an unknown mechanism. By contrast, temperature-sensitive top2-1 mutants exhibit a marked delay in meiotic chromosome remodeling and elevated DSB signals on synapsed chromosomes. The problems in chromosome remodeling were linked to altered Top2 binding patterns rather than a loss of Top2 catalytic activity, and stemmed from a defect in recruiting the chromosome remodeler Pch2/TRIP13 to synapsed chromosomes. No chromosomal defects were observed in the absence of TOP1. Our results imply independent roles for Top1 and Top2 in modulating meiotic chromosome structure and recombination.




integrity

Embryo integrity regulates maternal proteostasis and stress resilience [Research Papers]

The proteostasis network is regulated by transcellular communication to promote health and fitness in metazoans. In Caenorhabditis elegans, signals from the germline initiate the decline of proteostasis and repression of cell stress responses at reproductive maturity, indicating that commitment to reproduction is detrimental to somatic health. Here we show that proteostasis and stress resilience are also regulated by embryo-to-mother communication in reproductive adults. To identify genes that act directly in the reproductive system to regulate somatic proteostasis, we performed a tissue targeted genetic screen for germline modifiers of polyglutamine aggregation in muscle cells. We found that inhibiting the formation of the extracellular vitelline layer of the fertilized embryo inside the uterus suppresses aggregation, improves stress resilience in an HSF-1-dependent manner, and restores the heat-shock response in the somatic tissues of the parent. This pathway relies on DAF-16/FOXO activation in vulval tissues to maintain stress resilience in the mother, suggesting that the integrity of the embryo is monitored by the vulva to detect damage and initiate an organismal protective response. Our findings reveal a previously undescribed transcellular pathway that links the integrity of the developing progeny to proteostasis regulation in the parent.




integrity

Premier League must be completed in order to maintain integrity, says Andros Townsend

Crystal Palace winger Andros Townsend says the Premier League season must finish in order to maintain the integrity of the competition.




integrity

Watford chief questions integrity of finishing season at neutral venues

Ahead of Monday's crunch meeting of top-flight shareholders, the Hornets have joined Brighton and Aston Villa in making their opposition to the current 'Project Restart' plans clear




integrity

Head of new sport integrity agency targets organised crime as greatest threat

Former footballer, AFP assistant commissioner and ASADA boss David Sharpe says his first challenge at the newly former Sport Integrity Australia will be to tackle organised crime.




integrity

E&C Announces Hearing on Protecting Scientific Integrity in COVID-19 Response

The Energy and Commerce Committee today announced a Health Subcommittee Hearing for Thursday, May 14, entitled “Protecting Scientific Integrity in the COVID-19 Response.”  The hearing notice follows this note to the media.   NOTE TO THE MEDIA: Due to COVID-19, the Committee will make every effort to adhere to the safety recommendations from the Centers for Disease Control and Prevention (CDC) and the Attending Physician.  Therefore, media access will be limited.  Please contact your respective gallery for details.  As always, congressional press credentials will be required.   May 7, 2020   HEARING  NOTICE   TO:                      Members of the Subcommittee on Health FROM:                Anna G. Eshoo, Chairwoman SUBJECT:           Subcommittee Hearing on “Protecting Scientific Integrity in the COVID-19 Response” The Subcommittee on Health of the Committee on Energy and Commerce will hold a hearing on Thursday, May 14, 2020, at 10 a.m. in the John D. Dingell Room, 2123 of the Rayburn House Office Building.  The hearing is entitled, “Protecting Scientific Integrity in the COVID-19 Response.”  Witnesses will be by invitation only.  Among the witnesses invited to testify is Dr. Rick A. Bright, former Director of the Biomedical Advanced Research and Development Authority. The logistics of this hearing will be different due to the current circumstances of conducting a public hearing during the COVID-19 pandemic.  Members will be advised regarding specifics on hearing procedures and briefings as soon as they become finalized. If you have any questions, please contact Meghan Mullon with the Committee staff at (202) 225-2927. The U.S. House of Representatives Office Buildings and the U.S. Capitol Complex are currently closed to the public.  Official meetings of the Committee and its subcommittees are broadcast and available on the Committee’s website:  www.energycommerce.house.gov. ###




integrity

Hearing on Protecting Scientific Integrity in the COVID-19 Response

The Subcommittee on Health of the Committee on Energy and Commerce will hold a hearing on Thursday, May 14, 2020, at 10 a.m. in the John D. Dingell Room, 2123 of the Rayburn House Office Building. The hearing is entitled, “Protecting Scientific Integrity in the COVID-19 Response.”  




integrity

Attorney General Eric Holder at the Opening Plenary of the VI Ministerial Global Forum on Fighting Corruption and Safeguarding Integrity

"We come here for two reasons: To celebrate what has been accomplished since Global Forum One; and – more important -- to recommit ourselves to the task that remains -- the task of fighting corruption wherever it manifests itself. We have made progress in this fight -- but we must do more."




integrity

Attorney General Holder Speaks at the 14th Annual Council of the Inspectors General on Integrity and Efficiency Awards Ceremony

"Over the last few decades – and, especially, in recent years – your efforts have become essential not only in making the organizations you serve more efficient, more effective, and more accountable – but also in preserving the principles that define who we are, and must continue to be – both as a government, and as a people," said Attorney General Holder.




integrity

Yokogawa Releases Plant Resource Manager (PRM) R4.03, a Software Package in the OpreX Asset Management and Integrity Family

Yokogawa Electric Corporation (TOKYO: 6841) announces the November 14 release of Plant Resource Manager (PRM) R4.03, the latest version of a software package in the OpreX Asset Management and Integrity family that facilitates the monitoring and control of plant operations by centralizing the management of large volumes of data from instrumentation and manufacturing equipment. PRM R4.03 features powerful device diagnostic functions that help to optimize plant maintenance and ensure safe operations.




integrity

Evaluating the impact of trauma and PTSD on epigenetic prediction of lifespan and neural integrity




integrity

Fostering financial inclusion and financial integrity: Brookings roundtable readout


How can countries support innovative approaches to facilitating access to and usage of formal financial services among low-income and other marginalized groups while mitigating the risk of misuse within the financial sector?

As part of the Brookings Financial and Digital Inclusion Project (FDIP), the FDIP team recently hosted a roundtable to examine this central question. The objective of the roundtable was to identify and discuss salient challenges and opportunities for financial services providers, government entities, and consumers with respect to balancing anti-money laundering/countering the financing of terrorism (AML/CFT) compliance — a critical component of financial integrity and stability — with inclusive financial access and growth.

We explore several key questions and themes that emerged from the roundtable below.

Do areas of synergy exist between financial inclusion and AML/CFT efforts?

  • AML/CFT requirements and financial inclusion have sometimes been perceived as being in tension with one another — for example, stringent “know your customer” (KYC) requirements associated with AML processes can restrict formal financial access among marginalized groups who are unable to fulfill the KYC documentation requirements. However, the objectives of AML/CFT (ensuring stability and integrity within the financial sector) and financial inclusion (providing access to and promoting usage of a broad range of appropriate, affordable financial services) can be mutually reinforcing.
  • By moving individuals from the shadow economy into the formal financial system, greater opportunities emerge for introducing underserved populations to a broad suite of formal financial services, and ensuring those services are accompanied by suitable consumer protections. Thus, financial inclusion, financial integrity, and financial stability can act as complementary objectives.
  • The 2012 Declaration of the Ministers and Representatives of the Financial Action Task Force (FATF) recognized financial exclusion as a money laundering and terrorist financing risk in approving FATF’s 2012-2020 Mandate. This mandate affirmed FATF’s 2011 guidance on AML and terrorist financing measures and financial inclusion, which stated that “[i]t is acknowledged at the same time that financial exclusion works against effective AML/CFT policies. Indeed the prevalence of a large informal, unregulated and undocumented economy negatively affects AML/CFT efforts and the integrity of the financial system. Informal, unregulated and undocumented financial services and a pervasive cash economy can generate significant money laundering and terrorist financing risks and negatively affect AML/CFT preventive, detection and investigation/prosecution efforts.”

What are key challenges and concerns with respect to balancing financial inclusion with financial integrity?

  • Awareness of financial inclusion issues is not universal among individuals who work in the regulatory, compliance, and law enforcement spheres of the financial ecosystem. Engagement among these groups is critical for promoting knowledge-sharing with respect to financial integrity and inclusion.
  • Although FATF and other standard-setting bodies (SSBs) have increasingly adopted recommendations favoring proportionate, risk-based approaches to AML/CFT (as evidenced by the 2013 FATF Guidance on Financial Inclusion), regulators often pursue more conservative approaches than SSB guidelines recommend. These conservative approaches may constrain access to and usage of formal financial services among marginalized groups.
  • Combating the potential use of low-value transfers within countries and across borders for terrorist financing purposes is a salient concern for the law enforcement community when considering proportionate AML/CFT approaches.

How does the digital component fit into these issues?

  • As its name suggests, FDIP is interested in exploring the evolving role of digital technology within the financial services ecosystem. As discussed in the 2015 FDIP Report, digitization of financial services can be more cost-effective for public and private sector providers to manage and safer for consumers than carrying or storing cash.
  • For example, a 2013 report found that the Mexican government saved about $1.3 billion annually by centralizing and digitizing payments for wages, pensions, and social transfers. A 2014 report by the World Bank Development Research Group, the Better Than Cash Alliance, and the Bill & Melinda Gates Foundation highlighted several countries, including South Africa, where disbursing social transfers electronically cost significantly less than manual cash disbursement.
  • Digital financial services can also promote women’s economic empowerment, as these services are often more private and convenient to access than traveling to a “brick and mortar” financial service provider. Given that as of 2014 there was a 9 percentage point gap between the number of men and women with accounts in developing economies (with women disproportionately excluded from account ownership), facilitating access to formal financial services among the 42 percent of women globally who do not have an account will be a major factor in advancing financial inclusion.
  • With respect to financial integrity in particular, digital identification mechanisms such as biometric IDs can help lower access barriers to financial services while ensuring that providers have the information they need to promote security and stability in the financial ecosystem. In its June 2011 guidance, FATF recognized the use of non-documentary methods of identification verification — for example, a signed declaration from a community leader coupled with a photo taken by a mobile phone — for advancing access to formal financial services among underserved groups.
  • The Aadhaar initiative in India, which the FDIP team referenced in a previous post, is currently the largest biometric identification program in the world. The unique 12-digit ID enables individuals to meet KYC requirements and has been used as a financial account among those who do not have an account with a financial institution. Another innovative digital initiative is underway in Tanzania, where the government is working in concert with mobile carrier Tigo and UNICEF to provide birth certificates via mobile phones.

What are critical questions and areas of opportunity for fostering financial inclusion and integrity moving forward?

  • How can regulators and providers ensure sufficient privacy protections are in place for customers when advancing financial inclusion efforts, particularly through digital channels?
  • Through what mechanisms can government entities and non-government financial services providers best mitigate the risks of centralizing sensitive customer data?
  • Could an industry utility that facilitates a common solution to AML systems serve as a feasible solution for harmonizing standards?
  • What is the proper role of private solutions in the AML/CFT and financial inclusion spaces?
  • Could identification verification applications be developed using blockchain technology?
  • In what ways can social networks be leveraged with respect to digital identity initiatives and financial inclusion?

Authors

Image Source: © Jorge Cabrera / Reuters
       




integrity

Artificial intelligence, geopolitics, and information integrity

Much has been written, and rightly so, about the potential that artificial intelligence (AI) can be used to create and promote misinformation. But there is a less well-recognized but equally important application for AI in helping to detect misinformation and limit its spread. This dual role will be particularly important in geopolitics, which is closely…

       




integrity

Watford chairman questions integrity of 'distorted mini-league' at neutral venues

  • Scott Duxbury: ‘How is there any semblance of fairness?’
  • League would ‘bear no resemblance to the one we started’

Watford have joined Aston Villa and Brighton in voicing objections to the Premier League’s plan to play out the season at neutral venues on police advice, claiming it would be unfair to relegate clubs on the basis of a competition that “bears no resemblance to the one that was started”.

Sitting just above the bottom three when the league was suspended and uncomfortably aware Villa could leapfrog them if they play and win their game in hand, Watford were due to play five of their remaining nine fixtures at Vicarage Road and feel that being deprived of home advantage could affect the number of points they gather.

Continue reading...




integrity

Tax-News.com: South African Tax Man Stresses Integrity Of Tax Refund System

The South African Revenue Service announced on October 30 that it had paid over ZAR120bn (USD8.4bn) in refunds across all tax types in the last seven months, from the beginning of April of the tax season to date.




integrity

Ensuring Transparency and Integrity in Lobbying

On 8 June 2012 an International Seminar on « Ensuring Transparency and Integrity in Lobbying : Towards a Regulatory Framework » will take place in Moscow, Russia.




integrity

Boosting integrity, fighting corruption

This brochure describes the multiple domains where the OECD is engaged in fighting corruption and boosting integrity. It relates how the CleanGovBiz initiative is drawing together for the first time these anti-corruption tools under a single umbrella.




integrity

Tax Morale and Integrity in Developing Countries

As part of OECD Integrity Week 2019 (18-22 March), this event will bring together international experts to discuss these issues of integrity, transparency and trust in the tax system, and the research, tools and approaches needed to identify and implement policies to increase tax morale.




integrity

Boosting integrity, fighting corruption

This brochure describes the multiple domains where the OECD is engaged in fighting corruption and boosting integrity. It relates how the CleanGovBiz initiative is drawing together for the first time these anti-corruption tools under a single umbrella.




integrity

OECD Integrity Forum 2015

Integrity Week is an annual event organised by the OECD and its CleanGovBiz Initiative to actively support governments and organisations in their efforts to strengthen integrity, build trust, and fight corruption.