13.01.2015 Views

International Trade in Services.pdf - DSpace at Khazar University

International Trade in Services.pdf - DSpace at Khazar University

International Trade in Services.pdf - DSpace at Khazar University

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

244 <strong>Intern<strong>at</strong>ional</strong> <strong>Trade</strong> <strong>in</strong> <strong>Services</strong><br />

security issues. Corpor<strong>at</strong>e procedures and ethics are paramount to ensure d<strong>at</strong>a privacy.<br />

12 Lead<strong>in</strong>g IT service companies make the issue of d<strong>at</strong>a privacy and security a<br />

key priority s<strong>in</strong>ce it is generally a requirement to <strong>at</strong>tract foreign clients <strong>in</strong> the first<br />

place. A survey by Booz Allen Hamilton (2006) f<strong>in</strong>ds th<strong>at</strong> <strong>in</strong>form<strong>at</strong>ion security is<br />

one of the three most important factors for U.S. companies <strong>in</strong> select<strong>in</strong>g an outsourc<strong>in</strong>g<br />

partner. The survey also <strong>in</strong>dic<strong>at</strong>es th<strong>at</strong> concerns about <strong>in</strong>form<strong>at</strong>ion security<br />

are rel<strong>at</strong>ed to the lack of trust <strong>in</strong> legal and regul<strong>at</strong>ory environments. A country<br />

with a trusted legal and regul<strong>at</strong>ory framework for d<strong>at</strong>a privacy and security issues<br />

may thus have a compar<strong>at</strong>ive advantage rel<strong>at</strong>ive to other emerg<strong>in</strong>g markets.<br />

In conjunction with legisl<strong>at</strong>ion, there are several types of standards and guidel<strong>in</strong>es<br />

th<strong>at</strong> companies can adopt and conform to, <strong>in</strong>clud<strong>in</strong>g <strong>Intern<strong>at</strong>ional</strong> Organiz<strong>at</strong>ion<br />

for Standardiz<strong>at</strong>ion–<strong>Intern<strong>at</strong>ional</strong> Electrotechnical Commission 15504<br />

(software process improvement and capability determ<strong>in</strong><strong>at</strong>ion), <strong>Intern<strong>at</strong>ional</strong><br />

Organiz<strong>at</strong>ion for Standardiz<strong>at</strong>ion 17799 (for best practices <strong>in</strong> <strong>in</strong>form<strong>at</strong>ion security),<br />

<strong>Intern<strong>at</strong>ional</strong> Organiz<strong>at</strong>ion for Standardiz<strong>at</strong>ion 27001 (for <strong>in</strong>form<strong>at</strong>ion<br />

security management systems), and COBIT (control objectives for bus<strong>in</strong>ess and<br />

rel<strong>at</strong>ed technology). However, the comb<strong>in</strong>ed efforts to ensure high standards <strong>in</strong><br />

the supply of IT services do not come cheap. Thus, Pai and Basu (2005) cite estim<strong>at</strong>es<br />

<strong>in</strong> a TowerGroup study th<strong>at</strong> show the costs of effective <strong>in</strong>tern<strong>at</strong>ional<br />

outsourc<strong>in</strong>g <strong>in</strong>creas<strong>in</strong>g by 7–9 percent <strong>in</strong> IT services for efforts to ensure due<br />

diligence and 3–5 percent for efforts <strong>at</strong> good risk management.<br />

Despite the <strong>in</strong>vestment of service suppliers <strong>in</strong> robust systems, there is some fear<br />

th<strong>at</strong> future legisl<strong>at</strong>ion could erect barriers to crossborder supply. As a precaution<br />

aga<strong>in</strong>st potential protectionism, more than 300 Indian IT-enabled service companies<br />

and IT service companies have established subsidiaries <strong>in</strong> S<strong>in</strong>gapore, where<br />

they would be able to route d<strong>at</strong>a <strong>in</strong> case India were to be burdened by trade<br />

restrict<strong>in</strong>g legisl<strong>at</strong>ion (Aron 2005). To counteract misuse dur<strong>in</strong>g d<strong>at</strong>a handl<strong>in</strong>g,<br />

policy makers can establish a penal code for companies or <strong>in</strong>dividuals breach<strong>in</strong>g<br />

the rules on d<strong>at</strong>a privacy. Equally important is the establishment of a penal code<br />

th<strong>at</strong> protects <strong>in</strong>tellectual property rights and the undertak<strong>in</strong>g of <strong>in</strong>iti<strong>at</strong>ives to<br />

comb<strong>at</strong> software piracy. Proper law enforcement is equally important for those<br />

countries th<strong>at</strong> have enacted legisl<strong>at</strong>ion.<br />

Wh<strong>at</strong> Issues Warrant the Attention<br />

of Stakeholders<br />

The preced<strong>in</strong>g discussion touches on a number of issues th<strong>at</strong> merit the <strong>at</strong>tention<br />

of policy makers as they advance the trade <strong>in</strong>tegr<strong>at</strong>ion agenda for IT services.<br />

Table 7.4 shows a checklist of questions th<strong>at</strong> might help structure the reflections<br />

and ensure a comprehensive approach to the removal of b<strong>in</strong>d<strong>in</strong>g constra<strong>in</strong>ts and

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!