...THE CASE STUDY: SAFE WATER NETWORKS The business model: The model is unique as it involves partnering with NGO’s, community groups and local and national policy makers. It uses the local source water THE BUSINESS MODEL Short Term Objective: The basic idea of the formation of Safe Water was to provide clean and safe drinking water to the undeserved. To be an active catalyst in and sector leader engaging partners in the development of sustainable, scalable market based solutions that provide safe, affordable water for the world’s poor. Long Term Objective: -> Safe water networks envision a world with healthy, thriving communities, each managing its own sustainable supply of safe water Problem of Adopting the Model at Nizampally The problem of awareness of safe drinking water in the village selected (Nizampally) is affecting both individuals and the society. It requires high involvement from a marketer’s perspective and poses a lot of challenges to overcome and make the people adopt the usage of safe water at large. Customers are opposed to the advocating the purpose which Safe Water Networks wants the people to understand. Adoption costs are more than the short-term foreseeable benefits where the residents of Nizampally are spending nothing at all on buying reliable safe water except when on trips to nearby villages. Pre-conceived notions/ Barriers in Adoption: 1. Assuming that the water from hand pumps or taps is safe as it looks good...
Words: 816 - Pages: 4
...According to UN estimation, one third of the world’s population lives in water shortages areas. Even today, about 1.1 billion people are living without access to safe drinking water (Shaw and Thaitakoo, 2010). In reality, some of the countries in the world have severe water scarcity; especially in African countries. This worst scenario is also knocking at the door of Bangladesh. Particularly, Southwestern region of Bangladesh faces safe drinking water supply due to natural contamination of arsenic in the groundwater, salinity intrusion and drought as well. At present, different governmental officials, international, national and local NGOs, private sectors and community people are trying to overcome the crisis of drinking water individually and/or combined in different ways. But they are focusing a single issue rather than keeping all issues in an integrated way. However, the problem of safe drinking water availability caused by the combined effect of salinity, arsenic, and drought which are intimately inter-linked with each other. Therefore, it is imperative to include all the issues by developing an integrated approach, which will help to find a successful solution for better access of safe drinking water in the affected area. In view of the above mentioned issues, this study developed a holistic approach named “SIPE” that helps to find out/determine safe water adaptability index considering socio-economical, institutional, physicochemical and environmental aspect of the...
Words: 261 - Pages: 2
...Indelible Ink Machine, and Internal Control changes that I recommend you make. There are 5 main areas of control that LJB Company needs to address in order to stay in good standings with internal controls. The first internal control is the Establishment of Responsibility; “Control is most effective when only one person is responsible for a given task.”(Kimmel 339) A company should limit one employee to each area to limit the chance of illegal activities. Segregation of duties ties into establishing responsibility by assigning related activities to different employees. Documentation procedures deal with making sure that all transactions and events are documented and monitored. Physical, mechanical, and electronic controls are based on keeping safes, computers and time clocks monitored and restricted. Independent internal verification is used to audit employees and data reconciliation. The last category is called other. This deals with bonding employees who handle cash, and rotating employee duties. Based on the information you gave my colleague and my review of your company, I do not recommend you purchasing an Indelible Ink Machine at this time based on the information which gave to my colleague and my review of your company. This expensive purchase is unnecessary and can easily be avoided if you apply better internal control practices. The implementation of using numbered invoices is a good practice and should continue to be used moving forward. This practice will allow...
Words: 618 - Pages: 3
...important feature of the organization and has to play an important role in its working. Huge amount of information is transferred everyday and is crucial for the organization. A network crash due to any reason may cause a huge loss to the organization. Also any intrusion in the network may allow somebody to get hold of private and confidential information about the company. Hence, the security of the network is very crucial to the organization and its business. The goals of this security plan are to ensure the complete security of the network. This would include physical security, network security and access control systems. Physical security is about keeping the network equipments safe from being physically damaged, tampered with or from being stolen. Network security is about keeping the information safe over the network while transmission. Access control systems refer to the control systems that would allow a user to access the information, that could be crucial to the organization, or the private information of the organization. These are discussed in detail in the following sections. While discussing the security of the network, we make some assumptions. The security employees or the security guards are trustworthy. The employees of the company are trustworthy and they won’t their passwords or other secret keys with anyone. In case an employee is found malicious, he/she would be departed from access to the network immediately. For network security there is a trusted third party...
Words: 328 - Pages: 2
...Valentine was a safe-cracking thief. After getting out of jail, Jimmy fell in love and changed his name to Ralph Spencer. Ralph is a nice, morally good man who is the opposite of his true self. Jimmy Valentine was trying to live a moral life because of Jimmy’s sacrifice, honesty and determination. Jimmy Valentine was trying to live a moral life because of his sacrifices. First, Jimmy sacrifices his true identity by opening a safe in front of people that know him as Ralph. “In a minute Jimmy’s pet drill was biting smoothly into the steel door. In ten minutes-breaking his own burglarious record-he threw back the bolts and opened the door.” Second, Ralph sacrificed being noticed as Jimmy Valentine by meeting people and making friendships. The quote from the article proves this point, “Socially he was a success, and made many friends.”...
Words: 726 - Pages: 3
...given time. While handling such private information like Social Security Numbers, Individuals Names, Addresses, Credit Card information… etc., needs to be properly kept safe from everyone. Things like that can be used to steal someone’s identity and cause serious harm to you and others. This is the type of information that needs to be kept under a lock and key in the safest safe known to man. While handling such information you should constantly monitor your system for any issues for any outside activity that should not be there. To prevent things like this from happening, you need to constantly have that extra watch dog out for around the clock monitoring. The internet is one complete network and everyone is connected in some way, shape or form. If there is a connection, there is always someone watching in that backdoor that you might not be thinking about. There is usually a port or open door somewhere that someone is waiting at for that right time. Yes, there is software, hardware and other ways to monitor your data and/or information, along with your closed network. You can never be too careful and confident to let it all go on by itself. Every day, there is updates and new technology that arrives and needs to constantly be put in place. You can never be too careful to keep such information safe. The impact could result in your company to go down and never come back if this ever happens. Not only that, it can cost you your whole life savings and many other...
Words: 324 - Pages: 2
...Week 3 1) Security’s not how it was like back in the days, where all they did was lock away mainframes in the server room. Times have changed, technology has advanced and now comes in many forms. Security is very crucial to any organization, and physical security is no exception. Organizations are not just prone to cyber attacks, but as well breaking and entering, trespassing, natural disaster, fire, flood and much more. Physical security protects people, data, equipment’s, systems and facilities etc. Facility management is very important to any organization. It protects company assets. CPTED “is a discipline that outlines how the proper design of a physical environment can reduce crime by directly affecting human behavior”. It helps to provide support in loss and crime through proper facility construction and procedures. CPTED provides three main approaches to provide overall security. Which include natural access control, natural surveillance, and natural territorial reinforcement. It’s the best approach to build a facility through the CPTED approach. It’s also best to follow proper maintenance and procedures pertaining to physical security. For examples facility keys should only be assigned by the facility management and should be documented. Procedures should be written out clearly stating, how the keys should be distributed, inventoried or even destroyed given the circumstances. On any facility, it’s imperative to enforce access control, to prevent unauthorized personnel...
Words: 667 - Pages: 3
...access and 45,000 servers. All employees communicate using smartphones and email. Many employees work from home and travel extensively. They will need access to Discretionary, mandatory, role-based, rule-based, content-dependent, and nondiscretionary access controls, they are a large company and will need someone to be in charge of each control because not everyone have the same access. 4. Backordered parts are a defense contractor that builds communications parts for the military. All employees communicate using smartphones and email. They would need Discretionary, content-dependent and rule-based access control, they have a group of people who contain sensitive data that need to be controlled. They communication parts need to be safe. 5. Confidential Services Inc is a military-support branch consisting of 14,000,000 computers with internet access and 250,000 servers. All employees must have security clearances, and they communicate mainly using BlackBerry devices and email. They would need Mandatory, Discretionary, role-based, rule-based, content-dependent, nondiscretionary. They have many individuals all who need different access, so they need someone...
Words: 299 - Pages: 2
...A Report on Hydraulic Fracturing Salman Ahmed August 18, 2013 1. Hydraulic fracturing is a process of well stimulation, and a completion technique. It is used to extract underground natural resources, such as oil, natural gas, and geothermal energy. Industrial hydraulic fracturing is used to enhance subsurface fracture systems. The well stimulation process is used in nine out of ten gas wells in the United States. Generally, millions of gallons of water, sand, and chemical mixtures are pumped underground to break apart the rock formations to release gas. This method is used to facilitate the maximal extraction of natural gas by allowing it to move more freely from rock pores to production wells. This movement causes the oil or gas to come to surface where it can be stored in wells (US EPA, 2012). 2. The process of hydraulic fracturing starts with finding natural gas in underground formations, such as sandstones, carbonates, shale and coal. To gain access to the natural gas, vertical, horizontal, or multi-level wells are drilled to the target formation. Hydraulic fracturing is a completion technique used to create an effective connection between a well and the natural gas formation. Before drilling a well, a drilling and completion plan must be developed and approved by state regulators. Geoscientists and environmental employees then work to collect information about the surface geology of the potential drill site (ConocoPhillips, 2011). A well pad made of cement...
Words: 2021 - Pages: 9
...automotive components. Alumina Incorporated is in region 6 of the (EPA) Environmental Protection Agency. EPA enforces several priorities to help protect our environment from business and corporations by assuring the safety of chemicals usage, cleaning communities, protecting the waters, improving the air, climate change, environmental justice and building stronger tribal and state partnerships (United States Environmental Protection Agency, 2010, para. 1). The simulation states that Alumina Incorporated is in a situation that the company may perhaps have an issue with harming the environment because of allegation made by Kelly Bates. The allegations are Alumina Incorporated dishonored particular environmental discharge norms during an (EPA) Environmental protection Agency compliance evaluation five years earlier. Alumina was ordered to clean up the water plants and the Alumina promptly complied with (EPA) Environmental Protection Agency. A new report was generated and statement shows that Alumina Incorporated to be in compliance with (EPA) Environmental Protection Agency (University of Phoenix, 2008). Kelly Bates makes a claim that her ten year old daughter is suffering with leukemia due to the polluted water Kelly believes is from Alumina Incorporated. Kelly states Alumina has been in violation for ten years the norms of the environmental as a result of the allegations Alumina is position into a complex situation...
Words: 1135 - Pages: 5
...Certified Mail Mr. Mike Jones McDonough Town Manager 136 Keys Ferry Street McDonough, GA 30253 Re: Drinking water: Lead and Copper Rule Dear Mr. Jones, This law firm represents a group of local citizens currently residing in the city of McDonough, Georgia. Elevated levels of lead in the drinking water have the residents concerned. Many federal regulations have been established in an effort to protect drinking water in the United States. One such regulation is the Lead and Copper Rule, 40 C.F.R. § 141.2 (2011). Drinking water in America is primarily tainted lead and copper by way of plumbing materials. Resulting health problems can range from stomach ailments to brain damage. In 1991 the EPA published the Lead and Copper Rule and this rule has been updated over the years to account for growing knowledge of the effects that these chemicals have on the human body. According to WebMD, if drinking water is contaminated with lead it should not be used for, “…cooking or drinking”. The toxicity levels of lead and copper can be determined by using a test kit. The EPA cites that lead enters drinking when corrosion of pipes, solder, fittings, or brass fixtures and faucets occurs. The simple test kit has been used by many of the McDonough residents and proven that their concerns are valid. The EPA requires that systems be in place to monitor “…drinking water at customer taps. If lead concentrations exceed an action level of 15 ppb or copper concentrations exceed an action...
Words: 613 - Pages: 3
...to obtain natural resources from underground geological formations. Although used in several different applications, including the extraction of oil and geothermal energy, hydraulic fracturing in natural gas production from shale formations has recently taken center stage. It is estimated that shale gas will comprise over 20% of the total U.S. gas supply by 2020 (Energy Information Administration, 2009). As hydraulic fracturing has expanded, the public, media, and Congress have expressed rising concerns about the practice. Allegations of natural gas entering private water supplies, well explosions, and polluted streams have sparked controversy about fracking. In response, Congress directed the Environmental Protection Agency (EPA) in fiscal year 2010 to study hydraulic fracturing and its potential impacts on drinking water. The goal of this study is to determine whether hydraulic fracturing endangers drinking water and, if so, how these risks can be mitigated. The results of the study, expected by the end of 2012, will help inform EPA‟s regulatory response to hydraulic fracturing. However, given the urgency of fracking concerns, some members of both the public and the government have called for EPA to regulate or halt hydraulic fracturing now. Thus, EPA must consider the policy options available to address these concerns. This report has multiple objectives: to provide background on hydraulic fracturing, to describe EPA‟s planned study, to discuss policy options for hydraulic...
Words: 2312 - Pages: 10
...laws and regulations. The following are some of the issues the preventive plan should include: The business must identify health risks to employees, consumer, and the general public. The business must take solid steps to ensure the product, or services rendered is not harmful to others. An employee of the business needs to be assigned and responsible to understand the laws and regulations that affect all facets of the business. This person needs to keep management informed of new laws and regulations. The person is also responsible to train management and employees on federal, state, and local regulations. The person will also be responsible to have knowledge of environmental laws including Clean Air Act, Clean Water Act, Environmental Protection laws, Safe Drinking Water Act, and proper disposal of trash and waste (Dore, 2008)....
Words: 1372 - Pages: 6
...laws and regulations. The following are some of the issues the preventive plan should include: The business must identify health risks to employees, consumer, and the general public. The business must take solid steps to ensure the product, or services rendered is not harmful to others. An employee of the business needs to be assigned and responsible to understand the laws and regulations that affect all facets of the business. This person needs to keep management informed of new laws and regulations. The person is also responsible to train management and employees on federal, state, and local regulations. The person will also be responsible to have knowledge of environmental laws including Clean Air Act, Clean Water Act, Environmental Protection laws, Safe Drinking Water Act, and proper disposal of trash and waste (Dore,...
Words: 300 - Pages: 2
...CHAPTER 4 BRANCH SECURITY GENERAL 62. With the changing security scenario, establishment of Bank branches will require detailed consideration. No building should be selected or constructed unless it adheres to the basic security prerequisites. Security planning should start from the time we think of setting up a branch in an area. Generally, banking business and administrative considerations should and would take precedence while selecting a site but security should not be given a back seat. It must be understood that banking activity is prone to security risks and makes an area crime prone and vulnerable. The local police must be consulted regarding the proposed site of the branch. It is important that it goes on their beat map and patrols pay special attention. 63. In view of the changing security threats, it has become imperative to lay down certain guidelines for identifying the location and layout of our branches. While such guidelines could be easily implemented at new premises, it may not be feasible in our existing branches unless complete renovation is contemplated. Nevertheless, interim measures/ modifications could still be incorporated in our existing branches towards meeting the various security requirements to the best possible extent. 64. OPENING OF A NEW BRANCH (a) While selecting premises for a new branch, the ground floor space is preferable, as it is convenient, both from the public as well as from the branch staff’s point of view. In...
Words: 4152 - Pages: 17