GAC Group will be present at the Human Resources Solutions exhibition! 

Find us from September 22 to 24, 2020 to HR Solutions Fair, stand D03, to find out how GAC Group supports companies on all of their HR Performance (from economic performance to social performance).

In particular, you can find out more about our 2 innovative solutions in HR management:

  • D²BI : HR management and analytics solution via the DSN 
  • AT Advance : AT / MP piloting solution

Practical information

September 22 to 24, 2020

Stand D03

Paris Porte de Versailles
Hall 4.1 / 4.2

Occupational risk management represents a human and economic stake important. 

In the current context, the questions raised by employers in matters of work accidents and occupational diseases are numerous:

  • How to declare an occupational accident linked to Covid-19?
  • Do I have to report the accident of an employee working from home?
  • How are occupational accidents and diseases dealt with, and those linked to COVID-19?
  • What will be the impacts on my AT / MP contribution rate?

Sign up for our targeted online training courses related to current events "Work accidents (AT), Occupational disease (PD), AT / PM pricing and reform of ATMP instruction".

Program and pre-registrations:

  • Optimize the management of your AT files: Thursday June 4 from 9 a.m. to 12 p.m. - REGISTRATION
  • Manage your PM files to prevent the impact on your AT / PM rate: Thursday June 11 from 9 a.m. to 12 p.m. - REGISTRATION
  • Control the evolution of your AT / MP contribution rate: Thursday June 18 from 9 a.m. to 12 p.m. - REGISTRATION
  • Understand the procedure for examining cases resulting from the reform - REGISTRATION

Why participate?

  • Optimize administrative management of your files
  • Control evolution of your contribution rate
  • Manage your disputes related to AT / PM
  • Understand the consolidation and its suites
  • Our training courses are referenced DATADOCK

Information

Emmanuelle STYRANEC
01 44 82 20 58
estyranec@group-gac.com 

Webinar REPLAY C3S COSMA

Replay C3S Webinar “Take action before May 15 on the amount of your C3S”

#1 - Context and fields of application

The Social Contribution of Solidarity of Companies (C3S) has existed since 1970. Today, it represents more than 20,000 taxpayers for almost 3.8 billion budget in 2018.

In what context was it created and how has it evolved?

Which companies does it concern?

 

#2 - Calculation and assessment

The rate is a single contribution of 0.16% of turnover, but what do we mean by this concept of turnover? It is therefore necessary to provide some clarification.

 

#3 - Vigilance points and reporting formalities

Among the various C3S base deductions, you will find the specific base for opaque intermediaries, transactions from one foreign country to another, the transfer of intra-community stocks but also the disposal of fixed assets.

It should also be noted that there are various reporting formalities to be observed for companies liable for this contribution.

 

 

> See more videos

——————————————————

To not miss any news on this subject, do not hesitate to subscribe to our Financial Performance Newsletter.

 

C3S Webinar April 24 Cosma

Did you know ? 

The C3S (Contribution Sociale de Solidarité des Sociétés) is based on the turnover of companies. Doomed to disappear a few years ago, the contribution is still relevant and contributes to the financing of old-age insurance costs. His recovery, since 1er January 2019, is managed by URSSAF.

Despite its single rate (0.16%), the calculation of his plate remains subtle and can be error prone : many companies declare and pay an excessive amount of C3S each year.

Certain specific deductions are indeed applicable and allow the adjustment of this tax : our consultants ensure that each company fulfills the correct amount of tax.

Our financial performance experts offer to give you some keys to lowering the amount of this tax.

This webinar will be hosted by:

  • Alexandre Boutier (Tax Consultant at GAC Group)

Useful information

Friday April 24, at 8:30 a.m.

 

Registration:

 

[RAW]

[/ raw]

——————–

To not miss any of our news on this subject, subscribe for free to our publication dedicated (BILE).

This coronavirus acts as a electroshock: we must think and act differently!

It is essential to rethink our way of envisioning the future, of consuming, of interacting with our customers and our employees ...

Finally, why not see in this period an opportunity to understand differently our way of producing value?

Benefit from the expertise of consulting firms in Digital design and in innovation marketing strategy to optimize your way out of the crisis!

Use Design and GAC Group invite you to an interactive webinar, Friday April 24 at 11 a.m. to give you simple, quick and effective advice to put in place to save time with regard to your current and future business challenges.

5 key points will be discussed :

  • Why is pausing your innovations a mistake?
  • How to create more value with less budget?
  • How to use Design Thinking to get out of the crisis?
  • How to improve the creative productivity of your employees?
  • How to take advantage of this period to get ahead of your competitors?

Registration

 

[RAW]


[/ raw]

 

Today, Cloud Computing, although increasingly popular and used, is still seen as "storage space". Yet the power and potential of this technology is endless!

Henry Michel Ronzenblum, General Delegate of Eurcloud organizes Thursday April 09, 2020 a webinar with Gerard Peliks (member of ARCI and professor in Cybersecurity).

Taking the example of homomorphic encryption, 2 key points will be addressed:

  • How can you reassure your customers so that they are convinced (at all levels) that it is also a great tool for innovating (for example, via ultra-secure data processing)?

 

  • How to properly use the exhaustiveness of the financial systems available to advance research work and Cloud innovation projects, while respecting new legal developments?

Registration

 

In parallel with the webinar, Gérard Peliks explains how this technology applies to cloud security? What is its state of the art?

Gérard Peliks has worked for more than 20 years in digital security, including 16 years at AIRBUS Cybersecurity as a security expert.

Today, he is an active member of ARCSI (Association of Reservists for Figures and Information Security), he gives courses on cybercrime / cybersecurity in masters and MBAs of engineering schools and leads the “Cybersecurity Mondays”.

The data availability and their perimeter protection.

The public cloud is a wonderful solution for storing data.

For a controlled cost of services, companies have the possibility of having all the space they need, without having to invest in additional servers and disks, when a need for more storage space appears.

As security is not, in most cases, the business of companies using cloud services, they can ensure, by contract, that their data is secure in the cloud of their provider. When companies are not in control of the security and safety of their digital data, they face multiple threats and few companies are able to effectively counter them. Cloud providers, on the other hand, are supposed to have a good command of cybersecurity and supposed to have the skills in this area.

What about the confidentiality and theintegrity data entrusted to an external cloud?

Remember that the confidentiality of information is the assurance that it can only be read by persons authorized to take cognizance of it, while integrity is the assurance that it can only be written or modified by persons also authorized to do so.

One solution would be to only use the space of a public cloud to host non-sensitive data. But then we deprive ourselves of the advantage of the almost infinite space offered by the cloud to host them. Encrypting sensitive data and placing it in a public cloud is also a solution, but who manages the keys? The ideal is of course, for companies that entrust their data in a public cloud, to manage the encryption keys themselves. Entrusting the management of the encryption keys to its cloud provider finds its limits in the trust that client companies place in their provider. Managing encryption keys internally in the company is a complex task for which digital data security is not the job. Entrusting the management of the keys to another service provider other than the one hosting the encrypted data seems to be a better solution. The confidentiality and integrity of sensitive data are thus guaranteed.

If the data is stored unencrypted with the service provider, then the customer can have it available for processing, but they are accessible to any malicious person with privileged access to the service provider. If the data is stored encrypted, then it is difficult to have it available for processing.

The problem : " how to perform processing on encrypted data? "

It is quite obvious that, for example for an addition between two numbers which are encrypted, the sum of the two encrypted numbers does not give, during decryption, the expected result. It is of course possible to repatriate internally the data to be processed, decrypt them to perform the processing, encrypt the results and possibly put them back in the Cloud. This solution is obviously not really playable.

So is the Cloud doomed to remain only storage space, without allowing computing space? Couldn't the data to be handled remain in the Cloud, encrypted, and the processing carried out on the encrypted data giving the right result when decrypted by the user?

There is a very elegant solution already operational for certain treatments, and which is advancing in research centers to take into account all the possible treatments, it is the homomorphic encryption.

With this type of encryption, the Cloud is no longer just a secure storage space but also becomes a secure computing and consultation space. It will really be used, not only to host sensitive information, but also to use it… without leaving the Cloud. Only the results after treatment will be released to be deciphered and used.

Has the Cloud also become a space for calculations and processing?

At least that's what we would like to expect, but today homomorphic encryption only works for certain operations. It does not allow, for example, to consult an encrypted database to obtain the desired result in clear. If an encryption says " fully homomorphic »Existed today, if any processing could be carried out on the encrypted data entrusted to a public cloud, their confidentiality and their integrity would be guaranteed. But we're not there yet, and operations that may already work pose some performance issues, but research is well underway to offer this invaluable power.

Note, without going too far into the technique, and while simplifying, that the encryption algorithm used by the RSA, which is the basis of public key encryption, is, by nature, homomorphic for the multiplication. Indeed, the product of two numerical numbers is equal to the numerical product of the two numbers. This result, once deciphered, is the same as if we multiply the two numbers in the clear. A homomorphic cipher that would work for addition AND for multiplication is called "doubly homomorphic cipher". We are approaching it today, but with problems of the width of the encrypted elements and digital noise generated by the processing. The difficulty of homomorphic encryption is to keep the “digital noise”, which operations generate, below a reasonable threshold. otherwise the algorithms diverge and everything becomes indecipherable. We will not study these complex problems here, but we can hope that mathematicians will find an elegant solution to the problems posed by doubly homomorphic encryption.

Searchable encryption

Homomorphic encryption should not be confused with searchable encryption which makes it possible to specify a decryption procedure to a computation result in the encrypted domain. This last type of encryption offers a solution to consult an encrypted database, to obtain a result which, decrypted, gives the expected result.

Practical application: Internet voting

As a practical application, let's see how homomorphic encryption provides a solution to Internet voting. We are not talking about electronic voting machines here, but the voter who votes from their browser.

With the use of El Gamal algorithms, the homomorphic product of the encrypted ballots is equal to the homomorphic sum of the ballots. Voters' choices are never deciphered. At the close of the ballot, a homomorphic multiplication of all the ballots is carried out. We get the encrypted sum and we decrypt it. This sum is therefore the result of the votes which is obtained immediately. Yes, the homomorphic encryption of El Gamal (among other cryptologists who have advanced this technology) allows this.

 

The ballots are encrypted by the public key of the ballot box, the decryption of the sum of the ballots is done by the private key of the ballot box. This private key can be divided into several pieces held by the president of the polling station and his assessors. At the opening of the ballot, the president and his assessors reconstitute the decryption key and obtain the expected result almost immediately.

 

That the homomorphic product of the encrypted ballots is equal to the homomorphic sum of the ballots is a nice application of this type of encryption. This method is elegant in its ease of use. The ballots in the ballot box are never deciphered yet we know the result of the sum of the votes, which is also the only information that is interesting and not confidential after the close of the poll.

This method has already been used for the elections of representatives of French people living abroad. It can also be used for the elections of staff representatives or in company boards. But for presidential, senatorial or legislative elections, it is not authorized in France. We are only talking here about the cryptological foundation of a practical application of a working homomorphic cipher. Internet voting, which does not require you to go through a voting booth, and which does not require the Republican vote counting ceremony, is it to be recommended?

It is an interesting debate but one in which we will not take sides here.

 

 

Impact of the Coronavirus on your business: pragmatic advice from chartered accountants and innovation financing advice to better manage this period.

 

A few weeks after the onset of the crisis, what strategy (s) to put in place between ad effects and simple and effective solutions to get you out of it?

Ads have turned into prescriptions: how can you benefit from them?

The accounting firms TGS, ACC and innovation consulting GAC Group are joining forces during a webinar to provide you with concrete and additional information on the financing solutions currently available to you.

Appointment Friday April 03 at 11 a.m. for an interactive webinar. 

Take advantage of the registration form to ask your questions! 

Speakers:

  • Gaetan Petitpres: Chartered accountant @TGS
  • Florie d'Halluin: Expert in innovation financing @GAC
  • Romain Froment: Chartered accountant @ ACC

5 key points covered :
– Customer / supplier / employee relationship : how to handle the situation skillfully?
Relationship with your bank / URSSAF : what can they do for you?
– CIR (and CII / JEI) : accelerated reimbursement: what are the subtleties?
– Government announcements : what about the guaranteed cash loan, tax breaks…?
– Bpifrance devices : What do the different loans on offer involve?

Count on us to provide you with expert advice to meet your current and future challenges!

Registration

 

[RAW]

 

[/ raw]

 

Replay Webinar AT Advance, module for managing your claims 

#1 - Features of AT Advance

ATAdvance is a management module that allows you to digitize and optimize all your management of occupational risks and occupational diseases by analyzing your claims experience and its evolution in order to refine prevention actions.

What needs does the tool meet and how does the platform work?

 

#2 - Declare a claim on AT Advance

This module also allows:

  • To gain serenity and free up time
  • Better management and better control of your AT / MP
  • To have a global vision of your claims experience
  • To make the right decisions

 

#3 - Questions Answers

Finally, you will find many answers to the questions asked beforehand about the tool.

 

 

> See more videos

——————————————————

To not miss any news on this subject, do not hesitate to subscribe to our HR Newsletter

 

Replay C3S

Replay Webinar C3S “Increase your resources by analyzing your C3S”

#1 - Context and fields of application

The Social Contribution of Solidarity of Companies (C3S) has existed since 1970. Today, it represents more than 20,000 taxpayers for almost 3.8 billion budget in 2018.

In what context was it created and how has it evolved?

Which companies does it concern?

 

#2 - Calculation and assessment

The rate is a single contribution of 0.16% of turnover, but what do we mean by this concept of turnover? A few clarifications should be made.

 

#3 - Vigilance points and reporting formalities

Among the various C3S base deductions, you will find the specific base for opaque intermediaries, transactions from one foreign country to another, the transfer of intra-community stocks and the disposal of fixed assets.

It should also be noted that there are various reporting formalities to be observed for companies liable for this contribution.

 

 

> See more videos

——————————————————

To not miss any news on this subject, do not hesitate to subscribe to our Financial Performance Newsletter.

 

CYBERDAY / ECOLE DE GUERRE ECONOMIQUE - WEDNESDAY 11 MARCH 2020: WORKSHOP BY GAC

10:45 am / 11:15 am:

How to innovate and develop your growth without putting yourself in danger?

In the program :
•            How can you raise your employees' awareness around "cyber hygiene and a culture of daily innovation"?
• What skills should be put in place to protect your business?
• How to develop know-how adapted to cyber challenges, without limiting the creation of value?

Participants in the round table:

  • Gerard PELIKS: VP @ CyberEdu-ANSSI / Ex-expert Cybersecurity @Airbus / Professor of Cybercrime @ Mines / ILV 
  • Marc QUENTIN: CEO @Riafas Conseil / Ex-Service Special @ Army

2 p.m. / 2.45 p.m .:

Marketing and financial strategy for Cyber / Cloud / IT innovation 

In the program :

  • PTZI, CIR / CII / JEI, European, national, regional aids, private funds, bank loans… How to use these devices in an agile way to finance your projects?
  • What strategy to put in place to proactively and sustainably innovate in the face of disruption? How does it create today what your customers will demand tomorrow?

Registration

 

[RAW]

 

[/ raw]