APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • CXO Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Compliance
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    Editor's Pick (1 - 4 of 8)
    left
    Welcoming Big Data Technology amidst Changes

    Darren Cockrel, CIO, Coyote Logistics

    Leveraging Compliance to Your Advantage

    Mark Bloom, Global CIO, Aegon

    Demystifying the Role of IT in Millennial Organizations

    Jeff Fithian, VP, Strategic Initiatives and CIO, Dynamic Materials Corporation

    Productivity and Security- Can you ever have both?

    Julie Cullivan, SVP, Business Operations & CIO, Fireeye

    Lessons Learned from a CIO

    John Miller, Vice President and CIO, American Textile Company

    New Hr Capabilities To Face Evolving Technologies

    Anti Deisnasari, Director Of Compliance, Seabank Indonesia

    Strengthening The Compliance Fortress In The Banking Sector

    Chuan Lim Ang, Managing Director And Sg Head Of Compliance, Cimb

    Navigating Legal Challenges By Adapting To Technological Shifts

    Valerie Feria Amante, Chief Legal, Ethics & Compliance Officer, Jollibee Group Of Companies

    right

    Intersection of Compliance with IT in Business

    Jane A. Levine, SVP, Worldwide Director of Compliance and Business Integrity, Sotheby’s

    Tweet
    content-image

    Jane A. Levine, SVP, Worldwide Director of Compliance and Business Integrity, Sotheby’s

    As the chief compliance counsel for Sotheby’s, the international art auction house whose business stretched back centuries before the digital age, I am often asked what are some of the compliance challenges in my role and how do I approach them.  One lesson applicable across multiple compliance environments, with technology being no exception, is that even small incidents or accidents can have significant consequences legally, financially and reputationally, making strong compliance a business necessity.

    Sotheby’s business is global and fast paced, thus we face similar challenges relating to compliance technology as many other companies around the world.  With the increasing prevalence of cyber data breaches and other data loss events, has come increased awareness among both regulators and consumers of the importance of information security and data protection.  Sotheby’s uses a best practice information security strategy, which can be best described as a defense-in-depth methodology.  This simply means that our security precautions are implemented as a series of layers (physical/infrastructure/application) to provide multiple barriers that must be breached before there is a loss of information.  This strategy is tested on a regular basis through internal and external audits.  

    To further mitigate the chances of a breach or incident, Sotheby’s maintains compliance policies and procedures that govern data collection, storage, maintenance, destruction, sharing with third parties, and security. We further undertake regular risk assessments to reevaluate our procedures and in anticipation of and in reaction to new developments.  Sotheby’s has a dedicated compliance team that monitors changes to laws and regulation worldwide and to see that our cyber security policies are up to date and reflect current best practices. 

    “Sotheby’s maintains compliance policies and procedures that govern data collection, storage, maintenance, destruction, sharing with third parties, and security”

    Another factor contributing to the success and effectiveness of Sotheby’s cyber compliance program is that the compliance team works closely with the IT team and our chief technology officer to formulate and set standards governing, among other things, the safe use of mobile devices for business purposes, data access controls, and confidentiality.  In addition to maintaining detailed and robust policies setting forth our information security practices and procedures, Sotheby’s compliance team delivers regular, relevant targeted training to all staff, management and the Board of Directors on these subjects. 

    We conduct live training sessions in which we reinforce the message that cybersecurity is important to our clients, shareholders and our company, and we address specific practices and behaviors that we expect staff to abide by in order to protect the data we hold.  For instance, we not only review our incident response plan with relevant managers and staff, but we have also conducted “table top” exercises where we have worked through how we would handle a breach.  This type of training and education is in place to enhance our preparedness to swiftly act and to contain a cyber-breach event should one occur. In addition to taking appropriate precautions with, documents and verbal communications and with the art work and other extraordinary objects that Sotheby’s handles on a daily basis, we stress the need to apply special care to digital and electronic communications taking place over the internet and voicemail. When using Sotheby’s technology, or when using personally owned technological devices for Sotheby’s business, Sotheby’s requires staff to adhere to our password requirements and rules prohibiting unauthorized downloading of applications or email attachments. 

    On those occasions when Sotheby’s works with third parties, we take steps to conduct due diligence into their technology security practices, and to secure enforceable representations that there will be ongoing security maintained.  We expect any third party to apply equally stringent cyber-security standards as we do.

    The use of technological social media has brought another sea change in behavior in the last decade.  At Sotheby’s, we encourage our employees to participate responsibly on Social Media channels, and to be responsible in the use of online tools in a way that is consistent with all Sotheby’s policies. Regardless of where staff accesses the Internet via Sotheby’s systems or on personal computers, the obligation to protect all confidential information about clients, the Company, and employees must be respected. 

    At Sotheby’s the Compliance and Business Integrity Department also works hand in glove with our IT Department to coordinate our approach to technology and compliance, as we recognize that it takes both strong IT systems and a strong culture of compliance to create a business environment that is protected from cyber and data loss threats.

    tag

    Information Security

    Pharmaceutical

    Weekly Brief

    loading
    Top 10 Compliance Solutions Providers in APAC - 2025
    ON THE DECK

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Driving Culture Change to Power Digital Innovation

    Driving Culture Change to Power Digital Innovation

    Yew Jin Kang, Chief Technology Officer, Plus Malaysia
    The Data Leader's Playbook for Smarter Business Decisions

    The Data Leader's Playbook for Smarter Business Decisions

    Agus Jamaludin, Deputy Data Science Manager, Petrosea
    Advancing Retail through E-Commerce, Cloud and Cyber security

    Advancing Retail through E-Commerce, Cloud and Cyber security

    John Gaspar Antonio, CIO/Vice President for Information Technology & E-Commerce / Data Protection Officer, Metro Retail Stores Group
    From Code To Impact: Leading Enterprise Ai With Purpose

    From Code To Impact: Leading Enterprise Ai With Purpose

    Jingting Cher, Deputy Director, Data Science, Sp Group
    Reimagining Pension Services Through Responsible Innovation

    Reimagining Pension Services Through Responsible Innovation

    Maz Mirza, Chief Digital Officer, KWAP Malaysia
    Maritime: Beyond Systems, Beyond Seas

    Maritime: Beyond Systems, Beyond Seas

    Ron Fong, Cio, Station Satcom
    Human-Centered Innovation in the GenAI Era

    Human-Centered Innovation in the GenAI Era

    CJ Meadows, Head of Innovation-Asia, Executive Education Designer, Professor & Head of Mbaconsulting, S P Jain School Of Global Management
    The Art and Science of Selling

    The Art and Science of Selling

    Scott White, Senior Manager Sales and Marketing Operations, Airbus
    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://compliance.apacciooutlook.com/cxoinsights/intersection-of-compliance-with-it-in-business-nwid-785.html