Centre to pay jute mills only after full payment to farmers labourers

first_imgKolkata: In a stride to ensure that jute farmers and labourers get their desired benefits, the Centre will make it mandatory for the mill owners to make their payments in its entirety before getting the entire payment of the government orders.The decision of the Centre comes in the wake of a section of farmers and labourers complaining of not getting the benefits that they deserve. “The jute industry used to get payments against the order regularly. Why are the farmers and labourers complaining about it? Now, we are making it mandatory, that if you do not pay the farmers or labourers or any way abdicate the responsibility, we will not give you the order,” Union Textile minister Smriti Irani said during an interactive session organised by the Indian Chamber of Commerce. Also Read – Rain batters Kolkata, cripples normal lifeThe jute industry, according to the minister has a ready order worth Rs 5,000-5,500 crore every year (in terms of sacking). “We give such huge orders so that the jute industry stays alive. The sum is given to the jute industry in terms of order so that the farmers and labourers can get the benefits out of it,” she maintained. Irani urged the industry to go for innovation and come forward in taking new initiatives and said the Centre has been focusing on how to transform small size firms into mid-size entities. Elaborating on innovation, she touched upon technical textiles that are finding its application in automobiles, interior decoration, healthcare, industrial safety among others. Also Read – Speeding Jaguar crashes into Mercedes car in Kolkata, 2 pedestrians killedIrani said the industry should work closely with the government so that the policies framed by the latter may be implemented effectively. Later, addressing the Annual General Meeting at the Merchants’ Chamber of Commerce, she said the government has increased the import duty on some textile products to protect domestic manufacturing. “India looks at the trade war between China and the US as an opportunity and not as a challenge. India would be benefited from the trade war not only through policy intervention but also through industry practices,” she added.last_img read more

ESignatures Streamline the Contract Process

first_imgFebruary 22, 2011 This story appears in the March 2011 issue of . Subscribe » You know the drill. You and a client agree on terms. You send out a contract and it sits. You give a reminder call, and the client finally inks the contract–but the scanner is broken, so the contract sits some more. By the time it’s in hand, you’ve worked months with no legal umbrella.There’s no reason to live with that scenario anymore. Technology has made signing with electronic signatures (e-signatures) a real option.The legal framework for acceptance of e-signatures has been in place since the passage of the federal Electronic Signatures in Global and National Commerce Act in 2000. Many larger businesses have adopted the practice, but delivery models have been too cumbersome and expensive for most smaller outfits, until recently.With the software-as-a-service model, a solution that integrates with PDF and Word documents costs as little as $10 a month. In fact, with the release of Adobe’s free beta for eSignatures, it may be possible to jump on the e-signature bandwagon for no upfront cost.The adoption of e-signatures could help you reap dividends during the sales cycle. A study of 472 organizations by the Aberdeen Group found that users of e-signatures were 50 percent more likely to show improved customer renewal rates. They were also 41 percent more likely to reduce proposal errors and 18 percent more likely to shorten their sales cycles.”A key challenge facing businesses is achieving cost-effective sales growth,” says Peter Ostrow, Aberdeen research director. “Users of electronic signature technology outperform non-users in areas that significantly impact sales growth.”  This hands-on workshop will give you the tools to authentically connect with an increasingly skeptical online audience. Free Workshop | August 28: Get Better Engagement and Build Trust With Customers Now 2 min read Enroll Now for Freelast_img read more

What You Need to Know About Anthems Massive Data Breach

first_img Free Webinar | Sept. 9: The Entrepreneur’s Playbook for Going Global The onslaught continues.On Wednesday night Anthem, the second-largest health insurer in the United States, announced that it had succumbed to a massive cyber attack. It may be the largest hack to hit the health care industry to date.The company, formerly known as WellPoint, has nearly 40 million customers that appear to be at risk, but the breach may have also exposed personal information for the company’s past customers, too. In total, the names, social security numbers, e-mail addresses, birthdays, street addresses, member IDs, and employment information (including salaries) for some 80 million people may been compromised. No credit card or medical data seems to have been taken.According to an FAQ provided by the company, the following Anthem brands were impacted by the hack: Anthem Blue Cross, Anthem Blue Cross and Blue Shield, Blue Cross and Blue Shield of Georgia, Empire Blue Cross and Blue Shield, Amerigroup, Caremore, Unicare, Healthlink, and DeCare. The company promises to provide credit monitoring and identity protection services free of charge to those affected.“Anthem’s own associates’ personal information—including my own—was accessed during this security breach,” wrote Joseph Swedish, president and CEO of Anthem, on a Web site—www.anthemfacts.com—the company set up amid the attack’s disclosure. “We join you in your concern and frustration, and I assure you that we are working around the clock to do everything we can to further secure your data.”Anthem has employed Mandiant, a division of cyber security firm FireEye, to investigate its attack. Mandiant was also called upon to investigate the last major attack to hit the health sector, which involved Community Health Systems, a Tennessee-based hospital operator, in August. That earlier breach consisted of 4.5 million records being compromised from April to June—and, like Anthem’s breach, did not appear to target medical or financial information.Mandiant pegged the Community Health Systems attack on Chinese hackers, an “Advanced Persistent Threat” group that normally targets U.S. intellectual property. Following that breach, the FBI issued a one page flash warning to the healthcare industry urging companies to be on the lookout for attacks.As reported by Reuters, which had obtained a copy shortly after it was disseminated, the agency said:The FBI has observed malicious actors targeting healthcare related systems, perhaps for the purpose of obtaining Protected Healthcare Information (PHI) and/or Personally Identifiable Information (PII)…. These actors have also been seen targeting multiple companies in the healthcare and medical device industry typically targeting valuable intellectual property, such as medical device and equipment development data.One problem the health industry faces is that many companies within rely on aging computer equipment—an easy target for vulnerability-seeking miscreants. “Legacy systems running outdated software and vulnerable application elements are contributing to these companies being a prime target for compromise,” says Jay Kaplan, CEO of Synack, a security firm that sells subscription security software, and a former NSA senior cyber analyst. “All of our healthcare information, from insurance claims to patient records, is being moved online for convenience. We are at the liberty of these companies housing our sensitive data to adequately protect this information.”According to V. Miller Newton, CEO of data encryption company PKWare, the corporate world will see a major hack every month this year—at least. The only way to solve the problem? “By armoring the data at its core with persistent encryption,” he says, which would render sensitive data into garbled text.“Old antiquated computers are not the problem,” Newton says. “The problem is that adversaries are going to continue to penetrate these systems no matter what level of perimeter network security they have in place. Every other major company and health provider in this country has to start to think about this problem differently. They have to think about it from the ‘information out’ versus the ‘network in’ perspective—that paradigm shift is starting to happen now, but it has to happen a lot more quickly.”An FBI spokesperson declined to comment beyond the statement the agency had issued saying that the agency was aware of the intrusion and is investigating it. “Anthem’s initial response in promptly notifying the FBI after observing suspicious network activity is a model for other companies and organizations facing similar circumstances,” said FBI spokesman Joshua Campbell. “Speed matters when notifying law enforcement of an intrusion, as cyber criminals can quickly destroy critical evidence needed to identify those responsible.”In terms of scale, Anthem’s breach looms large when compared to other breaches that have made headlines. Last year, Home Depot disclosed that up to 56 million credit cards had been looted. In 2013, Target suffered theft of 40 million customers’ credit cards and had lost the personal information of another 70 million. Unlike those attacks, Anthem’s is believed to not involve credit cards.When hackers infiltrated J.P. Morgan and stole personal information from around 80 million customers, they did not acquire highly sensitive data like social security numbers, as they have in the case of Anthem.Chris Petersen, CTO and co-founder of LogRhythm, a security intelligence company in Boulder, Colorado, said: “The barrier to entry for cybercriminals continues to decrease, and personal health information can trade at a premium on the black market. Healthcare providers and insurers are a veritable treasure trove for would-be attackers, not only storing PHI but also card holder data. The Anthem breach should put all healthcare providers and insurers on notice.”For current and former customers who believe they have been affected, Anthem has provided a toll-free phone number (1-877-263-7995) where it has promised to address questions related to the “very sophisticated external cyber attack,” as Swedish referred to it. When this reporter dialed the extension, though, he was met with a busy signal. February 5, 2015 Growing a business sometimes requires thinking outside the box. This story originally appeared on Fortune Magazine Register Now » 6 min readlast_img read more