 We are talking about challenges in a in the upcoming world, and we are talking about the trends in Azure M. We have discussed about the issue of ethics. And now we are going to talk about one of the major issues that are emerging in the current environment. And that is about safety, security and counterterrorism. You know that this is one of the major issues in the global environment, how to remain safe and secure from various different disasters, including terrorism, which has hit the global environment and on a large scale. And whether it is the developed countries, or it is the developing countries, they are being equally hit by this emerging threat. And you know that time and again, various different countries, places, they are being hit by these kind of events, including the 9 11. And our country, Pakistan has also been a major target of terrorism. And we have to make sure that our facilities, they are well protected, and measures have to be taken in order to keep our citizens, our employees, our people in a safe and secure environment. So the issue of safety, security, that is that leads to an area of corporate risk management. So now this is a well defined area in which the organization is supposed to look at different dimensions of risks that are involved in whether they are physical risks, or they are legal risks, or whether they are cyber risks, they are intangible risks, many types of risks that are existing in the environment, and the organization has to manage it as a separate area of risk management. So the different dimensions or areas in which risk management has to be taken, has to be done. They are number one, natural disaster protocols, natural disasters in the form of what kind of protocols and systems you should have. Other than that, emergency and disaster preparedness plans for M&E's, plant and facilities. So if there is a natural disaster or any kind of disaster, including a terrorist attack, there are such issues. So in that, what kind of systems should be established, and you have to give training to your employees, or to your security staff, these are all things that come into your emergency and disaster preparedness plans. Then workplace violence policies, or if there are any people in the workplace who are on the side of violence, then how do you control it? Then industrial theft and sabotage control, your internal industry can have different types of theft and sabotage, your systems can be sabotaged, your physical facilities, your inventory, procurement, that is one of the biggest areas of theft and Pelfrage, when you locate people that you want to purchase things, then there are a lot of corruption and issues that come into the procurement, because people buy something else, write something else, or buy something else, and something else goes somewhere else. So procurement is also an issue, and for that, your systems should be established. And then you are in-house security, that you have to keep your internal safety and security standards. So for that, an MNE risk audit is done, which is done on different areas, the multinational companies audit that the company has established their different areas of risk, have they got particular systems established and protocols established for that or not. So the MNE risk audit is done in areas where they talk about all their sub dimensions. So number one, it is about in-facility emergency and disaster preparedness. This is something which I have just said that if there is an in-facility emergency or a disaster, what should we do? It is about including being in compliance with the local safety laws and standards, creating a command center and triage area, protocols for transport evacuation and the systematic location of the employees, for example, if there is a fire, where is the fire exit, and all the maps should be displayed, or if a terrorist attacks, where should we get out of? For that, you have alternative staircases, ways to get out, if you want to break the window, you have to put a hammer with the window, so these are the things. LIZON and public sector emergency, workers and media relations. So you have to, for example, you have to display the numbers of the local fire brigade department of the local emergency services. For example, for example, the number of the local fire brigade department or the police number or the number of the local SHO, so these are the things that should be displayed. Apart from that, in facility security, it is comprised of perimeter security, that you have to secure your perimeter, you know, these days, all the facilities, corporate facilities like barbed wires or proper fences, all these search protocols into and out of facilities, if you want to search the facilities, what will be the protocols? Internal search protocols, braum threat procedures, for example, God forbid, the bomb is detected, so what will be the procedure, how to report it and how to then evacuate people? Risk control for violence in the facility and threats to management, how to manage it? Protection and lighting in parking areas and use of cameras in the workplace. So you know, this is something which we are very much familiar now, that you should have installed cameras, everything should be monitored, which is your fences, parking areas, there should be lighting proper and all these things you have to do. Then, industrial espionage, theft and sabotage, these are activities to secure internal communication. You know that communication is also a very important thing and people intercept communication, they know your important secrets. So this used to be in letters, then this telecommunication system, and now this is your internet based system, it is necessary to protect it so that your emails, phone calls are all protected. Then how to protect open records, how to protect them legally, how to protect them, employee privacy regulations, what data and how you have to protect employee's privacy, physical and intangible privacy, clearly defined physical inspections and search processes, for example, if you want to do inspection or search, what processes should be done. Apart from that, there is a very important area that is cyber terrorism, how you have to save your organization from cyber terrorism, you must have seen movies where they hack accounts and transfer huge amount of money from one bank to their own accounts and all that. So this is something which is quite real and that is something from which you need to protect yourself. So people hack data, they hack accounts, so how do you save your organization from that. So hardware, software and human systems to deal with hacking, information theft, internal sabotage, the sabotage of software systems and the development and maintenance of an architecture of backup systems and multiple independent operations for information systems. So you have to keep your data in backup, you have to save it from theft, you have to save it from being transferred, you have to save it from being opened. So these are all things that come in the area of cyber terrorism and so you need to have systems in which you have to have multiple layers of protection so that if someone breaches one layer, they stop you on the next layer. So obviously anything which is man made that is, there is not error free but you need to establish systems for security and protection. And then out of facility, fire and travel risk, so if your employees are outside of the facility, that is your physical facilities, your buildings, if they are traveling somewhere outside of the facility, then what protocols did you have to establish for example, if providing traveling managers with portable five minute airpacks, travel policies prohibiting employees staying in hotel rooms above the seventh floor because seven floors above the fire brigade, which is not a CD, policies prohibiting top level managers from traveling on the same airline or the same private aircraft that all your board members are sitting in the same place because if they all sit and God forbid if there is an issue, then your company that is going to have no top level management, then who will lead it? So if your commander is not there, then your army will be directionless. So all the top level managers, you don't have to sit in the same aircraft. So that is also a protocol. Hotel evacuating training if traveling teams of employees are staying at the same hotel. So if you are staying at the same hotel, then you have to give them evacuation training that if there is a problem, then how can they get out of there? So these are the protocols and systems that an organization, a multinational particularly they have to establish and this risk audit evaluates the multinational on these different areas, whether they are doing proper risk management in their organization or not. So these are the various different aspects of the current trends, the emerging trends which are related with issues of IHRM in the international context.