Академический Документы
Профессиональный Документы
Культура Документы
On the other hand, if each event is unaffected by other events, they are called independent
events. Take a full read of the article presented below to have a better understanding of the
difference between mutually exclusive and independent events.
1. Comparison Chart
2. Definition
3. Key Differences
4. Conclusion
Comparison Chart
Meaning Two events are said to be Two events are said to be independent,
mutually exclusive, when their when the occurrence of one event
occurrence is not simultaneous. cannot control the occurrence of other.
Influence Occurrence of one event will Occurrence of one event will have no
result in the non-occurrence of influence on the occurrence of the
the other. other.
Mutually exclusive events are those which cannot occur concurrently, i.e. where the
occurrence of one event results in non-occurrence of the other event. Such events cannot be
true at the same time. Therefore, the happening of one event makes the happening of another
event impossible. These are also known as disjoint events.
Let’s take an example of tossing of a coin, where the result would either be head or tail. Both
head and tail cannot occur simultaneously. Take another example, suppose if a company
wants to purchase machinery, for which it has two options Machine A and B. The machine
which is cost effective and productivity is better, will be selected. The acceptance of machine
A will automatically result in the rejection of machine B and vice versa.
As the name suggests, independent events are the events, in which the probability of one
event does not control the probability of the occurrence of the other event. The happening or
non-happening of such an event has absolutely no effect on the happening or non-happening
of another event. The product of their separate probabilities is equal to the probability that
both events will occur.
Let’s take an example, suppose if a coin is tossed twice, tail in the first chance and tail in the
second, the events are independent. Another example for this, Suppose if a dice is rolled
twice, 5 in the first chance and 2 in the second, the events are independent.
The significant differences between mutually exclusive and independent events are
elaborated as under:
1. Mutually exclusive events are those events when their occurrence is not simultaneous.
When the occurrence of one event cannot control the occurrence of other, such events
are called independent event.
2. In mutually exclusive events, the occurrence of one event will result in the non-
occurrence of the other. Conversely, in independent events, occurrence of one event
will have no influence on the occurrence of the other.
3. Mutually exclusive events are represented mathematically as P(A and B) = 0 while
independent events are represented as P (A and B) = P(A) P(B).
4. In a Venn diagram, the sets do not overlap each other, in the case of mutually
exclusive events while if we talk about independent events the sets overlap.
Conclusion
So, with the above discussion, it is quite clear that both the events are not same. Moreover,
there is a point to remember, and that is if an event is mutually exclusive, then it cannot be
independent and vice versa. If two events A and B are mutually exclusive, then they can be
expressed as P(AUB)=P(A)+P(B) while if the same variables are independent then they can
be expressed as P(A∩B) = P(A) P(B).
How to Protect Your Business’s
Proprietary Information
June 9, 2014/in Business /
By Leiza Dolghih
Every successful business has some information that gives it a competitive advantage – its “secret sauce” so to
speak. It can include customer lists, customer preferences, financial data, business or marketing plans, formulas,
or technical information, which, if known to a competitor or general public, would destroy the business. So, how
can a company ensure that its secret and proprietary information is legally protected? Here’s how:
1. Identify Your Trade Secrets and Proprietary Information. Before you start implementing any security
measures, you need to identify what information you are trying to protect. Ask yourself two questions: (1) what
information do I have that gives my business a competitive advantage? and (2) is this information publicly
available? As a starting point, the Texas Uniform Trade Secrets Act defines “trade secrets” as “formula, pattern,
compilation, program, device, method, technique, process, financial data, or list of actual or potential customers
or suppliers.” This information, however, is not likely to qualify as proprietary if it is “commonly known” or
available in the public domain.
2. Implement Access System on the “Need to Know Basis.” Limit the access to the proprietary information
only to those employees who need it in order to perform their jobs; password-protect employees’ computers and
phones; and, if the information is maintained in a hard format, make sure the filing cabinet or the room where it
is stored is locked.
3. Require Key Employees to Sign Non-Disclosure Agreements (NDAs). Employees with access to
confidential information should be required to execute NDAs prior to receiving such information. A NDA can
be a part of an offer letter or employment agreement or it can be a free-standing contract.
4. Require Third Parties to Sign Non-Disclosure Agreements. If you are sharing your business’s proprietary
information with another party, such as your supplier, marketing agent, join venturer, etc., make sure that they
execute a NDA as well. Ideally, you should not be sharing your proprietary information with anybody who has
not executed a NDA.
5. Have a Written Confidentiality Policy. Your employee handbook and/or company policy should contain a
statement regarding what information the company considers to be confidential, prohibition of disclosure of
such information, description of the consequences of such disclosure, such as disciplinary action, and a
requirement that all key employees execute a NDA.
6. Provide Training Regarding the Confidentiality Policy and Enforce It. Such training can remind
employees not to discuss the confidential information in public, not to access such information from public
computers, and alert them regarding various ways of inadvertent disclosure that they can encounter in their day-
to-day lives.
7. When Key Employees Leave, Have Them Sign A Non-Disclosure Confirmation Form, Obtain
Information About Their New Company, and Conduct Forensic Imaging of Their Computers. When key
employees leave, during the exit interview have them sign a statement in which they acknowledge that they
have not taken any of your confidential information. You should also ask them about where they are going,
what duties they will be performing there and other information that will help you assess the likelihood of them
using the company’s confidential information at their new company. Finally, it is worth paying a few hundred
dollars to have their computers, iPads, etc., forensically examined to make sure that they have not printed,
emailed themselves or otherwise took any of the company’s proprietary information.
8. If You Suspect That an Employee Is Stealing or Has Stolen Your Proprietary Information, Act
Quickly. The more time passes between you discovering that your employee has taken or is using your
confidential information and your actions, the less likely a court is to find that the information was a “trade
secret.” In other words, if you are not trying to prevent other parties from using your information, then why
should the court do so?
Real Option
What is a Real Option
A real option is a choice made available to the managers of a company with respect to
business investment opportunities. It is referred to as “real” because it typically references
projects involving a tangible asset instead of a financial instrument. Real options are choices
a company’s management makes to expand, change or curtail projects based on changing
economic, technological or market conditions. Factoring in real options affects the valuation
of potential investments, although commonly used valuations, such as net present value
(NPV), fail to account for potential benefits provided by real options. Using real options
value analysis (ROV), managers can estimate the opportunity cost of continuing or
abandoning a project and make decisions accordingly.
Real options do not refer to a derivative financial instrument, but to actual choices or
opportunities of which a business may take advantage or may realize. For example, investing
in a new manufacturing facility may provide a company with real options of introducing new
products, consolidating operations or making other adjustments to changing market
conditions. In the course of making the decision to invest in the new facility, the company
should consider the real option value the facility provides. Other examples of real options
include possibilities for mergers and acquisitions (M&A) or joint ventures.
BREAKING DOWN Real Option
The precise value of real options can be difficult to establish or estimate. Real option value
may be realized from a company undertaking socially responsible projects, such as building a
community center. By doing so, the company may realize a goodwill benefit that makes it
easier to obtain necessary permits or approval for other projects. However, it’s difficult to pin
an exact financial value on such benefits. In dealing with such real options, a company’s
management team factors potential real option value into the decision-making process, even
though the value is necessarily somewhat vague and uncertain.
Still, valuation techniques for real options do often appear similar to the pricing of financial
options contracts, where the spot price refers to the current net-present value of a project,
while the strike price corresponds to non-recoverable costs involved with the project. The
most common method of valuing real options currently is a form of binomial tree following a
latticed (flexible) model. Monte Carlo simulations are also often used in the evaluation of real
options.
the trading of currencies. This market determines the foreign exchange rate. It
A healthy work culture generally rests on the aptitude of the seniors in the organization,
especially the C-suite. It is often observed that though the senior management is a very well-
qualified one, their ability to train line managers and mid-senior staff really makes or breaks a
risk contingency plan. One complaint that plagues the management is the fact that team
leaders’ push for task completion can often come at the cost of risk oversight. To simplify,
your internal environment largely influences risk standpoints and the quality of your strategy
itself.
2. Objective Setting
When it comes to objectives, given the extent of the enterprise-wide risk strategy,
organizational vision and mission must be the guidebook for the risk management plan
template that incorporates mitigation strategies. Besides monetary and resource investments,
your risks could also alter the drive your employees have and the way your clients perceive
you, as an organization.
Two things that you’ll really need to evaluate here include –
Risk Appetite
This is the high-level view of the risks that you are likely to face and the level of complexities
that the organization is willing to take responsibility for.
Risk Tolerance
The next step is to then account for the different variations and the likelihood of the risks that
the projects may spill into, in accordance with the risk appetite.
Once both these aspects are defined and aligned with the organization’s overall strategy, you
can go onto define them for portfolios as well as projects. For instance, managing risks in a
vendor-driven situation might range from having to postpone the release of a product so that
there is lesser room for error from the vendor’s end to actually assessing the vendor’s
credentials itself in extreme cases.
Former multinational Enron’s infamous scandal and complex business model that hid its poor
performance with make-believe profitability is an example often visited over ethical
malpractices that overrun moral code of conduct for larger organizations. To reiterate, such
risks are never worthwhile.
3. Event Identification
The next crucial step to take would be that of identifying the risks and events in the course of
project execution. COSO lists down negative risks and differentiates them from positive
opportunities. That is, events that disrupt the project are risks and events that present tangible
value and progress are opportunities that justify the deterrents. The extent of harnessing these
opportunities though is something that the organization must tie in with its strategy on the
whole.
One of the things prescribed here is that of developing organizational awareness in terms of
identifying events that could be potential risks and those that are potential opportunities. To
develop that maturity for your entire portfolio, it is essential that you define the components
from a strategic standpoint as opposed to an operational one. Also, it is not too uncommon for
new portfolio managers to expect very few or no events to play spoilsport in the project plan.
This ambitious idea of perfection can cause a lot of confusion when unforeseen risks play
spoilsport. To avoid succumbing to false notions of the aftereffects of risk, create a risk
management plan template that documents the type, category, project area(s) affected such
that future project teams can reach a consensus on the action plans at the earliest.
In terms of the processes that identify the risks, besides one-off events, you’ll also need to
factor in the consequential risks and delays that are not always ad hoc. While the COSO
ERM may take an internal environment-centric, event-driven route, you’ll need to also have
one that factors in the external atmosphere. An in-depth analysis of events in the course of the
external risks is often tied to the core of the risk strategy.
4. Risk Assessment
While event identification goes hand in hand with analysis, assessment on its own is
prescribed as a component as well to emphasize the role played by inter-linked risks. The
framework places a lot of importance on this component by stressing both on qualitative
methods as well as quantitative ones of risk assessment.
Besides the methods, assessment on its own must also be tied to the objective setting again,
much like all other components. To revisit, internal risks include operational ones, resource-
centric ones as well as individual business induced. On the other hand, external ones could be
anything from a market slowdown, changes in physical environment or loss of brand identity.
The assessment then is all about sound measurement and accurate prioritization of risks such
that the worst is mitigated and the best is harnessed so as to maximize the value obtained.
Risks are collective measure and individually evaluated based on how they influence one
another. What is important to understand is the fact that risks are never isolated from one
another. They interact with each other and therefore a seemingly insignificant one may be the
root cause for several things going awry. It is recommended that risks are viewed in a
probability chart with diagrams that help you find the right grey area that merges value within
your tolerance level and the opportunity you are looking for.
5. Risk Response
Once risks aligned with the organization’s tolerance and appetite levels are chosen, a review
of the response is to be made. Broadly, the framework advocates following responses-
a.Reduce
b.Accept
c.Avoid
d.Transfer
In this component, the portfolio view of a risk is especially stressed upon more so when
diversified assets are involved. And your portfolio management strategy, will need to address
the magnitude of the risk on the whole. It has been established with enough details that risks
cannot be isolated from each other, as seen in the component above.
The response plan, in turn, must not only account for the financial liability involved but also
that of the product and resource impact. Responses, in general, depend upon the nature of
regulations that the organization subscribes to as well as the projects involved. For example,
when health and safety become a huge cause of concern, as they do in construction projects
with extreme weather conditions or an exposure to harmful chemicals, certain set principles
like the ALARP or the As Low As Reasonably Practicable is put to use. This set scheme
compares trouble, time and money needed to control the risks and prescribes actions.
On the whole, leaders need to empower teams with the flexibility to monitor and implement
risk responses such that a holistic approach is adopted towards strategic planning process.
6. Control Activities
Regulations and policies are put in place to make sure that responses do not exceed the
predetermined scope of things. When designed meticulously, controls not only encompass
guidelines and systems but also go into the very DNA of the organization’s control of
situations.
Control becomes essential simply because this is one of the components in which the human
involvement is at its peak. For example, when a vendor’s bad quality affects the product
output and it is up to the line manager to negotiate new terms with the clients, the manager’s
judgment bias, perceptions and way of communication outweighs almost every scheme of
control that the organizational policy can mandate. However, with effective training and
nurture, if the managers can all be encouraged to embrace a common code of ethics, internal
control becomes far more realistic.
As a part of processes, clarified list of duties and responsibilities along with transparency in
terms of controls can be some of the things that ensure that fraudulent behaviour cannot go
unnoticed, while the exercise of action is realistic.
But the beauty of the framework is the fact that, it stresses on the management’s involvement
in being reciprocative of communication. For example, managers typically go into depths of
negative reports while portfolios that are seemingly healthy are left untouched. This typical
callousness can often face the brunt of unforeseen risks. Few proactive measures can put a
permanent end to this patterns.
Similarly, staff must be trained to recognize potential risks and communicate it to their
leaders. This means the training provided must be of quality and cover all forms of risks that
cover the realm of the objectives discussed. Keeping seniors in the loop in emails to having
them assess logical liabilities, are seemingly small measures that can help you stay notified of
huge roadblocks.
8. Monitoring
Ultimately, what doesn’t adapt in good time, perishes. Your risk contingency plan is no
different. It is crucial that the organizations invest in constantly monitoring and modifying the
plan. One of the core activities that the framework pushes is that of an annual review.
The management system should be monitored and modified if necessary. In the likes of the
much appreciated Turnbull report that stresses on regular as well as period monitoring, the
framework also focuses on the importance of feedback and action. Also, any potential
weaknesses can be assessed and fixed during such reviews.
Evaluation and auditing can be another important annual meeting to have if you want to
establish diversified portfolios and have a separate risk management wing. Experts often say
that it is not advisable to adopt such processes after the portfolio has been put into action.
Instead, it must come with a strategic change management initiative that addresses risks well
before the portfolio goes live.
Risk Management is always work in progress. The fact that COSO releases reviews year after
year only testifies the fact. And projects evolve with time. Your Enterprise Risk Management
strategy could go from strength to strength with a sound PPM tool.