orm

Supreme Court Will Decide if Former Employees Can Sue Over Post-Employment Benefits

Ellen Donovan McCann says post-employment benefits are often the first to be amended when businesses experience budget challenges, but employers may have to take more care in changing them if SCOTUS decides that former employees can sue over those benefits.

SHRM

View (Subscription required)




orm

New Normal: New Challenges: Guidance for Navigating Facial Covering Requirements and the Challenges of Non-Compliance

Chelsea Lewis provides recommendations for navigating the challenges that may arise when customers or clients refuse to abide by COVID-19 mandates.

ACC South Florida

View Article 




orm

Positive discrimination: the case for legal reform

Raoul Parekh and Natasha Adom write in support of updating laws to help give employers more freedom to create the real change that so many want and promote more diversity and equality in workplaces.

The Law Society Gazette

View




orm

The New Normal: Continuing Considerations of Hybrid and Remote Work




orm

UK: The Employment Rights Bill – Phase One of Employment Law Reform

  • UK Employment Rights Bill includes 28 individual employment law reforms.
  • The Bill will now make its way through Parliament and may be amended along the way.
  • This Insight summarizes key provisions of the Bill, when they would take effect, and what proposals did not make it into the 158-page document.




orm

COVID-19: The New Normal – International Guide Supplement

Due to the effects of the COVID-19 pandemic, governments across the world have implemented various measures to slow the spread of the virus, protect workers’ health and safety, and assist employers to recover from the economic crisis, among other programs.




orm

Inaugural Report of Littler’s Global Workplace Transformation Initiative

The COVID-19 pandemic required nearly every employer around the globe to take stock of its workforce, policies and practices, and adapt to a rapidly changing and unpredictable environment.  COVID-19 will eventually pass, but transformative issues laid bare by the pandemic—which were already in motion—will remain, likely at an accelerated pace.




orm

Global Non-Compete Reform – At a Glance

The United States is not the only country currently debating reform to the law on non-competes. Notably, the UK Government has announced legislation that would limit the duration of non-competes to a period of three months after the termination of employment.




orm

Global Non-Compete Reform – At a Glance Tracker (Updated March 2024)

The United States is not the only country currently debating a reform to the law on non-competes. Notably, the UK Government has announced legislation that would limit the duration of non-competes to a period of 3 months after termination of employment.




orm

Governor’s Veto Will Likely Result in Continued Delayed or Non-Performable Background Checks in California

A May 2021 court decision in California, All of Us or None v.




orm

Governor’s Veto Will Likely Result in Continued Delayed or Non-Performable Background Checks in California

Rod Fliegel, William Simmons and Wendy Buckingham discuss the current limitations on the use of background checks for employment in California.

SHRM Online

View (Subscription required.)




orm

California Bill Would Limit Use of Criminal History Information

Rod Fliegel discusses California’s proposed Fair Chance Act of 2023, which would further restrict how employers can use information about the criminal histories of job seekers and employees, and offers tips for complying with the current Fair Chance Act.

SHRM Online

View (Subscription required.)




orm

The FDIC Proposes Revised Regulations Concerning Section 19 of the Federal Deposit Insurance Act to Conform to the Fair Hiring in Banking Act

  • The FDIC has proposed revised regulations implementing Section 19 of the Federal Deposit Insurance Act.
  • Section 19 generally prohibits individuals convicted of certain offenses from participating in the affairs of an FDIC-insured depository institution.
  • The rule would affect approximately 4,680 FDIC-insured depository institutions.
  • Comments to the rule are due by January 16, 2024.




orm

California Court of Appeal Thwarts Efforts to Conceal Important Driving History Information from Employers

Employers with operations in California are all too familiar with how state and local officials continue to restrict the access employers have to public records, including criminal history information.1 For example, lengthy delays in completing standard criminal background checks are now routine in California.2 Apart from criminal background checks, many employers rely on motor vehicle record checks (MVRs) to vet candidates for positions that require driving as part of the job.  In Doe v. California Dept.




orm

Settled a Lawsuit with a Government Agency Last Year? Form 1098-F Reporting of Fines and Penalties is Coming Due

  • 2017 Tax Cuts and Jobs Act changed rules relating to when penalties/fines paid to or at the direction of a government agency can be deducted as a business expense.
  • Certain payments to government agencies, such as the EEOC, as part of employment lawsuit settlements, are affected.
  • To this end, Agencies will start issuing information returns, IRS Form 1098-F, to affected employers.




orm

Mexico's Human Trafficking Law Reform: Are Employers at Risk of Criminal Sanctions for Scheduling Overtime?




orm

Federal regulators urge HR to perform AI bias audits

Jim Paretti offers advice on the EEOC's latest warning about AI bias in hiring, which may prompt employers to conduct AI audits, either done internally or with independent third parties.

TechTarget

View




orm

The National Association of State Chambers and Littler’s Workplace Policy Institute Form Coalition and Support Workforce Development Legislation

In a letter sent to Congress today, the Coalition expresses support for legislation that would modernize America’s workforce development and education system




orm

TechNet and Littler’s Workplace Policy Institute Support the Illinois Senate’s Passage of Biometric Information Privacy Act Reform Bill

Update: On August 2, 2024, Illinois Governor J.B. Pritzker signed SB 2979 into law, reforming the liability guidelines under the Illinois Biometric Information Privacy Act.

CHICAGO (April 11, 2024) – Today, the Illinois Senate passed SB 2979, which would reform the liability guidelines under the state’s Biometric Information Privacy Act (BIPA). The bill marks an important milestone in the broader effort to resolve BIPA’s vague statutory language and courts’ expansive interpretations of the law, which have posed a threat to businesses that capture biometric information.




orm

Proposed BIPA Penalty Reforms Advance In Ill. Legislature

Shannon Meade talks about how the Biometric Information Privacy Act (BIPA) has affected employers in Illinois and how SB 2979 would update it and tweak its liability guidelines.

Law360

View (Subscription required.) 




orm

BIPA reform is ‘huge step in the right direction,’ proponents say

Orly M. Henry calls a law to amend language addressing claim accrual in BIPA litigation long overdue and “a huge step in the right direction.”

Chicago Daily Law Bulletin

View (Subscription required.)




orm

Court Thwarts Efforts to Conceal Driving History Information from Employers

Rod M. Fliegel and Cirrus Jahangiri discuss what a recent court of appeal decision means for employers in California, who are often restricted from access to employees’ public records, including criminal history information.

SHRM Online

View (Subscription required)




orm

Damage Control: Illinois Enacts Amendment to the State’s High Risk Biometric Information Privacy Act

On August 2, 2024, Illinois Governor J.B. Pritzker signed into law Senate Bill 2979 (the “Amendment”), implementing long-awaited, highly anticipated reform to the Illinois Biometric Information Privacy Act (BIPA). The Amendment is a milestone in the broader ongoing effort to resolve BIPA’s vague statutory language and courts’ expansive interpretations of the law, which have resulted in businesses across Illinois paying hundreds of millions of dollars to settle the 1,000+ BIPA class actions filed in state and federal courts to date.




orm

BIPA Reform Becomes Law, But Damages Concerns Persist

Orly Henry says a recent BIPA amendment is an important change that will help protect businesses and help Illinois remain competitive in the global economy.

Law360

View (Subscription required)




orm

Mailbag: We rejected a job candidate. When can we delete their information?

David Goldstein discusses how long employers should keep rejected job candidates’ records and says their ATS system for storing those records should be configured to comply with applicable laws.

HR Dive

View




orm

Just 11% of Legal Departments Predict Gen AI Will Be 'Transformative,' As Its Honeymoon Phase Fades

Marko Mrkonich says it’s important for companies to establish their AI compliance framework at the beginning, instead of after employees have already gotten used to deploying AI in certain ways.

Corporate Counsel

View (Subscription required)




orm

ETSI launches a new group on information exchange between maritime surveillance authorities

ETSI launches a new group on information exchange between maritime surveillance authorities

Sophia Antipolis, 3 May 2019

ETSI has recently launched a new Industry Specification Group on a European Common Information Sharing Environment Service and Data Model (ISG CDM). The ETSI group will define technical standards to allow data exchange among different maritime legacy systems in a cooperative network. Enhancing information exchange between maritime surveillance authorities is one of the key strategic objectives of the European Union under the Integrated Maritime Policy with increased coordination between different policy areas (transport, environmental protection, fisheries control, border control, general law enforcement, customs and defence).

Read More...




orm

First ETSI NFV API conformance test event in remote mode

First ETSI NFV API conformance test event in remote mode

Sophia Antipolis, 10 May 2019

From February 4 to April 15, 2019, ETSI organized a remote NFV API Plugtests® event with the support of its Centre for Testing and Interoperability. The Remote NFV API Plugtests was not only the first to be entirely remote; it was also the first entirely dedicated to the testing of NFV APIs.

Read More...




orm

ETSI publishes a white paper on Network Transformation - Building on key technologies for 5G

ETSI publishes a white paper on Network Transformation - Building on key technologies for 5G

SDN NFV World Congress, The Hague, 14 October 2019

ETSI is proud to announce the availability of a new white paper, entitled Network Transformation: Orchestration, Network and Service Management Framework, written by several of its Industry Specification Groups’ (ISG) Chairs. These groups have released specifications on key building block technologies for next-generation networks, feeding the 3GPP 5G specifications.

Read More...




orm

ETSI standardizes new Secure Platform to address IoT, 5G, and security sensitive sectors

ETSI standardizes new Secure Platform to address IoT, 5G, and security sensitive sectors

Sophia Antipolis, 18 November 2019

Trust and privacy together with cost and flexibility are key to security solutions for many applications in today’s digital world. To address this challenge, ETSI Technical Committee Smart Card Platform, who standardized the former generations of SIM cards, has been working on a brand-new security platform called Smart Secure Platform (SSP). The ETSI committee is pleased to unveil the first three technical specifications to launch this new security platform.

Read More...




orm

ETSI Top 10 Webinars in 2020 - Starring: cybersecurity, the Radio Equipment Directive, the new smart secure platform and AI

ETSI Top 10 Webinars in 2020 - Starring: cybersecurity, the Radio Equipment Directive, the new smart secure platform and AI

Sophia Antipolis, 8 December 2020

As 2020 comes to an end, we have selected for you our most popular webinars of the year. If you missed them, listen to the recorded presentations and their Q&A sessions, deep dive into cybersecurity novelties, discover the RED latest developments and find out about the new smart secure platform and AI.

Read More...




orm

Homage to Pierre Laffitte, founder of Sophia-Antipolis and former Senator

Homage to Pierre Laffitte, founder of Sophia-Antipolis and former Senator

Sophia Antipolis, 8 July 2021

We were very sad to hear that Pierre Laffitte passed away on 7 July, at the age of 96. President and founder of the Sophia-Antipolis technopole, a scientist and politician, he has spent countless hours contributing to making Sophia-Antipolis the largest technopole in Europe.

Read More...




orm

ETSI and MIPI Alliance Announce Incorporation of MIPI I3C Basic into ETSI Smart Secure Platform

ETSI and MIPI Alliance Announce Incorporation of MIPI I3C Basic into ETSI Smart Secure Platform

I3C Interface for SSP provides higher data rate and improved integration flexibility with decreased power consumption

Piscataway, N.J. and Sophia Antipolis, France 30 June, 2022

The MIPI Alliance, an international organization that develops interface specifications for mobile and mobile-influenced industries, and ETSI Technical Committee Secure Element Technologies (TC SET) today announced the adoption of the I3C Interface for SSP (ETSI TS 103 818) specification, allowing the MIPI I3C Basic specification to serve as a physical and logical link layer for the ETSI Smart Secure Platform (SSP). The I3C Interface for SSP joins the family of specifications that underpin the ETSI SSP, the next-generation platform for Universal Subscriber Identity Module (USIM) and Secure Elements to meet new market requirements driven by emerging Internet of Things (IoT), 5G and other security-sensitive applications.

Read More...




orm

ETSI TeraFlowSDN Winner of the Layer123 Network Transformation ‘Upstart of the Year’ Award

ETSI TeraFlowSDN Wins Layer123 Network Transformation ‘Upstart of the Year’ Award

Sophia Antipolis, 7 December 2022

The ETSI TeraFlowSDN group (ETSI TFS), launched only six months ago, has won the ‘Upstart of the Year’ award at the Layer123 Network Transformation Awards ceremony, held at the prestigious Berkley Hotel in Knightsbridge, London, last night. This award also recognizes the ETSI strategy to provide new software development tools and practices to an evolving standardization ecosystem.

Read More...




orm

ETSI to transform the standards development landscape with Software Development Groups

Sophia Antipolis, 2 February 2023

ETSI, the organization for globally applicable standards for information and communication technology (ICT), has adopted a new instrument, Software Development Groups (SDGs). This game-changing move will help ETSI adapt to the ever-evolving landscape of technology and standards development. Developing software to accompany standards will accelerate the standardization process, providing faster feedback loops and improving the quality of standards.

Read More...




orm

New ETSI White Paper: Unlocking Digital Transformation with Autonomous Networks

Sophia Antipolis, 23 March 2023

Autonomous Networks (AN) are considered one of the most important evolutions to enable Digital Transformation, offering new service opportunities and significant cost saving in network operation. It is one of the most attractive environments where to leverage Artificial Intelligence in the Network and activities around Autonomous Networks have gained momentum in Standards and ICT Industry.

Read More...




orm

The ETSI IoT conference 2023 focuses on Green and Digital Transformation

Sophia Antipolis, 18 April 2023

ETSI’s annual flagship event returns in 2023. This new edition of the ETSI IoT Conference - IoT Technologies for Green and Digital Transformation - will take place on 4-5-6 July 2023 in ETSI premises, Sophia Antipolis, France.

Read More...




orm

ETSI IoT conference: standards are key to achieving green and digital transformation

Sophia Antipolis, 7 July 2023

The new edition of the ETSI IoT Conference, IoT Technologies for Green and Digital Transformation, ended on 6 July, highlighting through use cases and demonstrations how IoT standards can be real enablers in achieving the green and digital transformation. The programme is available here and the very stimulating presentations from our 54 international speakers are available here.

Read More...




orm

TeraFlowSDN Release 3 Provides a Cloud-based Network Automation Platform Featuring New Optical SDN Controller and Expanded Support for Disaggregated Networks

Sophia Antipolis, 30 April 2024

The ETSI TeraFlowSDN community is proud to announce the third release of TeraFlowSDN, an innovative and robust SDN orchestrator and controller, delivering a fully featured Network Automation Platform. In this latest release, TeraFlowSDN enhances its capabilities with the integration of an Optical SDN controller, expanding device support to include gNMI and OpenConfig protocols. It also features enriched network integrations for end-to-end orchestration like IP over DWDM, L3VPN, MEC, and network topology exposure. The management of network topologies is improved with the addition of a new BGP-LS speaker able to discover the topologies, and a new Forecaster component is introduced, providing predictive insights for network management. These additions substantially augment the versatility and management capabilities of the TeraFlowSDN platform.

Read More...




orm

ETSI Announces 1st Release of SDG OpenCAPIF Delivering a Robust, Secure, and Efficient 3GPP API Management Platform

Sophia Antipolis, 9 July 2024

ETSI is excited to announce OpenCAPIF Release 1 is now available in the ETSI Labs.

OpenCAPIF develops a Common API Framework as defined by 3GPP and this new version introduces several improvements and new features to deliver a more robust, secure, and efficient API Management Platform. These advancements are developed in tight collaboration and incorporating feedback from a growing Research Ecosystem including SNS projects such as 6G-SANDBOX, FIDAL, IMAGINEB5G, SAFE6G, ORIGAMI, ENVELOPE and SUNRISE6G.

Read More...




orm

Reconstruction and the Formerly Enslaved

New essay by W. Fitzhugh Brundage, "Reconstruction and the Formerly Enslaved," added to Freedom's Story: Teaching African American Literature and History, TeacherServe from the National Humanities Center.




orm

How does agricultural productivity growth affect agrifood system transformation goals?




orm

2024 Martin J. Forman Lecture | Supporting and shaping the global nutrition agenda with evidence




orm

2024 Martin J. Forman Lecture | Supporting and shaping the global nutrition agenda with evidence




orm

FY 2024 State and Local Cybersecurity Grant Program Adds CISA KEV as a Performance Measure

The CISA Known Exploited Vulnerabilities (KEV) catalog and enhanced logging guidelines are among the new measurement tools added for the 2024 State and Local Cybersecurity Grant Program.

Last month, the Department of Homeland Security announced the availability of $279.9 million in grant funding for the Fiscal Year (FY) 2024 State and Local Cybersecurity Grant Program (SLCGP). Now in its third year, the four-year, $1 billion program provides funding for State, Local and Territorial (SLT) governments to implement cybersecurity solutions that address the growing threats and risks to their information systems. Applications must be submitted by December 3, 2024.

While there are no significant modifications to the program for FY 2024, the Federal Emergency Management Agency (FEMA), which administers SLCGP in coordination with the Cybersecurity and Infrastructure Security Agency (CISA), identified key changes, some of which we highlight below:

The FY 2024 NOFO adds CISA’s KEV catalog as a new performance measure and recommended resource

The FY 2024 notice of funding opportunity (NOFO) adds the CISA Known Exploited Vulnerabilities (KEV) catalog as a recommended resource to encourage governments to regularly view information related to cybersecurity vulnerabilities confirmed by CISA, prioritizing those exploited in the wild. In addition, CISA has added “Addressing CISA-identified cybersecurity vulnerabilities” to the list of performance measures it will collect through the duration of the program.

Tenable offers fastest, broadest coverage of CISA’s KEV catalog

At Tenable, our goal is to help organizations identify their cyber exposure gaps as accurately and quickly as possible. To achieve this goal, we have research teams around the globe working to provide precise and prompt coverage for new threats as they are discovered. Tenable monitors and tracks additions to the CISA KEV catalog on a daily basis and prioritizes developing new detections where they do not already exist.

Tenable updates the KEV coverage of its vulnerability management products — Tenable Nessus, Tenable Security Center and Tenable Vulnerability Management — allowing organizations to use KEV catalog data as an additional prioritization metric when figuring out what to fix first. The ready availability of this data in Tenable products can help agencies meet the SLCGP performance measures. This blog offers additional information on Tenable’s coverage of CISA’s KEV catalog.

FY 2024 NOFO adds “Adopting Enhanced Logging” as a new performance measure

The FY 2024 NOFO also adds “Adopting Enhanced Logging” to the list of performance measures CISA will collect throughout the program duration.

How Tenable’s library of compliance audits can help with Enhanced Logging

Tenable's library of Compliance Audits, including Center for Internet Security (CIS) and Defense Information Systems Agency (DISA), allows organizations to assess systems for compliance, including ensuring Enhanced Logging is enabled. Tenable's vulnerability management tools enable customers to easily schedule compliance scans. Users can choose from a continuously updated library of built-in audits or upload custom audits. By conducting these scans regularly, organizations can ensure their systems are secure and maintain compliance with required frameworks.

FY 2024 NOFO continues to require applicants to address program objectives in their applications

As with previous years, the FY 2024 NOFO sets four program objectives. Applicants must address at least one of the following in their applications:

  • Objective 1: Develop and establish appropriate governance structures, including by developing, implementing, or revising Cybersecurity Plans, to improve capabilities to respond to cybersecurity incidents, and ensure operations.
  • Objective 2: Understand their current cybersecurity posture and areas for improvement based on continuous testing, evaluation, and structured assessments.
  • Objective 3: Implement security protections commensurate with risk.
  • Objective 4: Ensure organization personnel are appropriately trained in cybersecurity, commensurate with responsibility.

How Tenable can help agencies meet Objective 2 of the program

Tenable is uniquely positioned to help SLTs meet Objective 2 through the Tenable One Exposure Management Platform. In addition to analyzing traditional IT environments, Tenable One analyzes cloud instances, web applications, critical infrastructure environments, identity access and privilege solutions such as Active Directory and more — including highly dynamic assets like mobile devices, virtual machines and containers. Once the complete attack surface is understood, the Tenable One platform applies a proactive risk-based approach to managing exposure, allowing SLT agencies to successfully meet each of the sub-objectives outlined in Objective 2 (see table below).

Sub-objectiveHow Tenable helps
2.1.1: Establish and regularly update asset inventoryTenable One deploys purpose-built sensors across on-premises and cloud environments to update inventories of human and machine assets, including cloud, IT, OT, IoT, mobile, applications, virtual machines, containers and identities
2.3.2. Effectively manage vulnerabilities by prioritizing mitigation of high-impact vulnerabilities and those most likely to be exploited.

Tenable One provides an accurate picture of both internal and external exposure by detecting and prioritizing a broad range of vulnerabilities, misconfiguration and excessive permissions across the attack surface.

Threat intelligence and data science from Tenable Research are then applied to give agencies easy-to-understand risk scores. For example, Tenable One provides advanced prioritization metrics and capabilities, asset exposure scores which combine total asset risk and asset criticality, cyber exposure scoring which calculates overall exposure for the organization, peer benchmarking for comparable organizations, as well as the ability to track SLAs and risk patterns over time.

Further, Tenable One provides rich critical technical context in the form of attack path analysis that maps asset, identity and risk relationships which can be exploited by attackers. It also provides business context by giving users an understanding of the potential impact on the things that matter most to an agency, such as business critical apps, services, processes and functions. These contextual views greatly improve the ability of security teams to prioritize and focus action where they can best reduce the potential for material impact. These advanced prioritization capabilities, along with mitigation guidance, ensure high-risk vulnerabilities can be addressed quickly.

2.4.1 SLT agencies are able to analyze network traffic and activity transiting or traveling to or from information systems, applications, and user accounts to understand baseline activity and identify potential threats.

Tenable provides purpose-built sensors, including a passive sensor, which can determine risk based on network traffic. After being placed on a Switched Port Analyzer (SPAN) port or network tap, the passive sensor will be able to discover new devices on a network as soon as they begin to send traffic, as well as discover vulnerabilities based on, but not limited to:

  • Services
  • User-agents
  • Application traffic
2.5.1 SLT agencies are able to respond to identified events and incidents, document root cause, and share information with partners.

Tenable One can help SLT agencies respond to identified events and incidents and document root cause more quickly. SOC analysts managing events and incidents and vulnerability analysts focused on remediation of vulnerabilities have access to deep technical content in the form of attack paths, with risk and and configuration details to verify viability, as well as business context to understand the potential impact to their agency.

This information is valuable not only to validate why IT teams should prioritize mitigation of issues before breach, but to prove that a successful attack has occurred. Further, agencies can deliver dashboards, reports and scorecards to help share important security data in meaningful ways across teams and with partners. Agencies are able to customize these to show the data that matters most and add details specific to their requirements. 

Source: Tenable, October 2024

Tenable One deployment options offer flexibility for SLT agencies

Tenable offers SLT agencies flexibility in their implementation models to help them best meet the requirements and objectives outlined as part of the SLCGP. Deployment models include:

  • Centralized risk-based vulnerability program managed by a state Department of Information Technology (DoIT)
  • Multi-entity projects
  • Decentralized deployments of Tenable One managed by individual municipalities,
  • Managed Security Service Provider (MSSP) models that allow agencies to rapidly adopt solutions by utilizing Tenable’s Technology Partner network.

Whole-of-state approach enables state-wide collaboration and cooperation

A “whole-of-state” approach — which enables state-wide collaboration to improve the cybersecurity posture of all stakeholders — allows state governments to share resources to support cybersecurity programs for local government entities, educational institutions and other organizations. Shared resources increase the level of defense for SLTs both individually and as a community and reduce duplication of work and effort. States get real-time visibility into all threats and deploy a standard strategy and toolset to improve cyber hygiene, accelerate incident response and reduce statewide risk. For more information, read Protecting Local Government Agencies with a Whole-of-State Cybersecurity Approach.

FY 2024 NOFO advises SLT agencies to adopt key cybersecurity best practices

As in previous years, the FY 2024 NOFO again recommends SLT agencies adopt key cybersecurity best practices. To do this, they are required to consult the CISA Cross-Sector Cybersecurity Performance Goals (CPGs) throughout their development of plans and projects within the program. This is also a statutory requirement for receiving grant funding.

How Tenable One can help agencies meet the CISA CPGs

The CISA CPGs are a prioritized subset of cybersecurity practices aimed at meaningfully reducing risk to critical infrastructure operations and the American people. They provide a common set of IT and operational technology (OT) fundamental cybersecurity best practices to help SLT agencies address some of the most common and impactful cyber risks. Learn more about how Tenable One can help agencies meet the CISA CPGs here.

Learn more




orm

2021 Global food policy report: Transforming food systems after COVID-19: Synopsis [in Chinese]

2020年在诸多方面都让我们始料未及。新冠肺炎(COVID-19)疫情为全球带来了一场大规模的公共卫生灾难,各国均陷入了疫情及其相关应对政策带来的不同程度的经济困境,面临服务严重中断和人员流动严重受限的局面。无论是富裕国家还是贫穷国家,均未能幸免。在中低收入国家,许多弱势群体直接面临食物安全、医疗和营养方面的威胁。丧失生计、营养不良、教育中断和资源枯竭造成的长期影响可能性非常巨大,特别是对许多国家来说,距离新冠肺炎疫情的结束还遥遥无期。此外,疫情还凸显并加剧了我们食物系统的薄弱环节和不平等状况。一年过去了,全球因新冠肺炎疫情而进一步偏离了到2030年实现可持续发展目标(SDG)的进程。显然,食物系统可以在推动我们走上正轨方面发挥核心作用。要想实现可持续发展目标,就必须对食物系统进行转型,帮助我们更好地为下一次冲击做好准备,同时造福世界贫困人口和弱势群体以及我们的地球。




orm

2022 annual research and policy conference: Agricultural transformation and food security in Sudan [in Arabic]




orm

Canadian securities regulators warn public about unregistered trading platform Nova Tech Ltd

Toronto – The Canadian Securities Administrators (CSA) is warning the public that Nova Tech Ltd (NovaTech), which operates the website www.novatechfx.com, is not registered with a securities regulator in any province or territory in Canada.




orm

Unleashing the potential of Generation Z for food system transformation in Africa

Africa’s population is the youngest of any region, with more than 400 million young people aged 15 to 35 out of a total of 1.5 billion. But even though rising numbers of this cohort—a “youth bulge”—enter the labor market every year, African economies a... Source: IFPRI Malawi: Malawi Strategy Support Program




orm

Informe de políticas alimentarias mundiales 2023: Repensar las respuestas a las crisis alimentarias: Sinopsis

En 2022, el mundo se enfrentó a múltiples crisis. Continuaron las perturbaciones de los sistemas alimentarios debidas a la prolongada pandemia de COVID-19, las grandes catástrofes naturales, los disturbios civiles y la inestabilidad política, así como los crecientes efectos del cambio climático, mientras la guerra entre Rusia y Ucrania y la inflación agravaban una crisis mundial de alimentos y fertilizantes.