International Trade in Services.pdf - DSpace at Khazar University
International Trade in Services.pdf - DSpace at Khazar University
International Trade in Services.pdf - DSpace at Khazar University
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
244 <strong>Intern<strong>at</strong>ional</strong> <strong>Trade</strong> <strong>in</strong> <strong>Services</strong><br />
security issues. Corpor<strong>at</strong>e procedures and ethics are paramount to ensure d<strong>at</strong>a privacy.<br />
12 Lead<strong>in</strong>g IT service companies make the issue of d<strong>at</strong>a privacy and security a<br />
key priority s<strong>in</strong>ce it is generally a requirement to <strong>at</strong>tract foreign clients <strong>in</strong> the first<br />
place. A survey by Booz Allen Hamilton (2006) f<strong>in</strong>ds th<strong>at</strong> <strong>in</strong>form<strong>at</strong>ion security is<br />
one of the three most important factors for U.S. companies <strong>in</strong> select<strong>in</strong>g an outsourc<strong>in</strong>g<br />
partner. The survey also <strong>in</strong>dic<strong>at</strong>es th<strong>at</strong> concerns about <strong>in</strong>form<strong>at</strong>ion security<br />
are rel<strong>at</strong>ed to the lack of trust <strong>in</strong> legal and regul<strong>at</strong>ory environments. A country<br />
with a trusted legal and regul<strong>at</strong>ory framework for d<strong>at</strong>a privacy and security issues<br />
may thus have a compar<strong>at</strong>ive advantage rel<strong>at</strong>ive to other emerg<strong>in</strong>g markets.<br />
In conjunction with legisl<strong>at</strong>ion, there are several types of standards and guidel<strong>in</strong>es<br />
th<strong>at</strong> companies can adopt and conform to, <strong>in</strong>clud<strong>in</strong>g <strong>Intern<strong>at</strong>ional</strong> Organiz<strong>at</strong>ion<br />
for Standardiz<strong>at</strong>ion–<strong>Intern<strong>at</strong>ional</strong> Electrotechnical Commission 15504<br />
(software process improvement and capability determ<strong>in</strong><strong>at</strong>ion), <strong>Intern<strong>at</strong>ional</strong><br />
Organiz<strong>at</strong>ion for Standardiz<strong>at</strong>ion 17799 (for best practices <strong>in</strong> <strong>in</strong>form<strong>at</strong>ion security),<br />
<strong>Intern<strong>at</strong>ional</strong> Organiz<strong>at</strong>ion for Standardiz<strong>at</strong>ion 27001 (for <strong>in</strong>form<strong>at</strong>ion<br />
security management systems), and COBIT (control objectives for bus<strong>in</strong>ess and<br />
rel<strong>at</strong>ed technology). However, the comb<strong>in</strong>ed efforts to ensure high standards <strong>in</strong><br />
the supply of IT services do not come cheap. Thus, Pai and Basu (2005) cite estim<strong>at</strong>es<br />
<strong>in</strong> a TowerGroup study th<strong>at</strong> show the costs of effective <strong>in</strong>tern<strong>at</strong>ional<br />
outsourc<strong>in</strong>g <strong>in</strong>creas<strong>in</strong>g by 7–9 percent <strong>in</strong> IT services for efforts to ensure due<br />
diligence and 3–5 percent for efforts <strong>at</strong> good risk management.<br />
Despite the <strong>in</strong>vestment of service suppliers <strong>in</strong> robust systems, there is some fear<br />
th<strong>at</strong> future legisl<strong>at</strong>ion could erect barriers to crossborder supply. As a precaution<br />
aga<strong>in</strong>st potential protectionism, more than 300 Indian IT-enabled service companies<br />
and IT service companies have established subsidiaries <strong>in</strong> S<strong>in</strong>gapore, where<br />
they would be able to route d<strong>at</strong>a <strong>in</strong> case India were to be burdened by trade<br />
restrict<strong>in</strong>g legisl<strong>at</strong>ion (Aron 2005). To counteract misuse dur<strong>in</strong>g d<strong>at</strong>a handl<strong>in</strong>g,<br />
policy makers can establish a penal code for companies or <strong>in</strong>dividuals breach<strong>in</strong>g<br />
the rules on d<strong>at</strong>a privacy. Equally important is the establishment of a penal code<br />
th<strong>at</strong> protects <strong>in</strong>tellectual property rights and the undertak<strong>in</strong>g of <strong>in</strong>iti<strong>at</strong>ives to<br />
comb<strong>at</strong> software piracy. Proper law enforcement is equally important for those<br />
countries th<strong>at</strong> have enacted legisl<strong>at</strong>ion.<br />
Wh<strong>at</strong> Issues Warrant the Attention<br />
of Stakeholders<br />
The preced<strong>in</strong>g discussion touches on a number of issues th<strong>at</strong> merit the <strong>at</strong>tention<br />
of policy makers as they advance the trade <strong>in</strong>tegr<strong>at</strong>ion agenda for IT services.<br />
Table 7.4 shows a checklist of questions th<strong>at</strong> might help structure the reflections<br />
and ensure a comprehensive approach to the removal of b<strong>in</strong>d<strong>in</strong>g constra<strong>in</strong>ts and