E-Club of Arizona Annual Assembly

What was a Rotary e-Club meant to be and what it was not meant to be?

Let me begin with what I don’t think it was meant to be. It is my firm belief that the Trustees never intended an e-club to be just a place to hang your Rotary number when you no longer wished to be engaged. I understand that there are some of us who for health reasons can no longer actively participate, and that is OK, the club can use your moral support, but short of that you either are or you are not a Rotarian. It is possible to be a member of Rotary and not be a Rotarian.

I believe that the Trustee’s intent was for every e-Club to be a viable active club in every Rotary tradition except for it having the flexibility of its members not having to physically attend meetings. That said, I also believe that every club member should make an honest attempt to consistently attend the club’s online meetings. If a 45 minute time commitment at your personal convenience twice a month is too much to ask of a member then I think that both the club and the member should rethink the why of having or being a member!

I sincerely hope that you will have found our online meeting profile worthy of your time and that you will advise us ASAP as to your personal interests in order that we may engage you in your club’s committees and social activities.

Have a great day!

Dick

President Rotary Year 2016/2017

four-way-test

2016/2017 Club Officers & Committees

OFFICERS & Directors:

President-Dick Eisenach

Immediate Past President-Eric Hichman

Secretary / President Elect-Beth Sheehan

Treasurer-Aaron Fritz

Tom Wright-Director

COMMETTIE CHAIRS:

Foundation Chairman- Tom Wright

International Outreach Chairman-Dick Eisenach/Tom Wright

Membership-All Officers & Directors

Website Meeting Manager-Aaron Fritz

Website Manager-TBD

Social Chairman-TBD

T1617_EN_0_1422968455

President’s Closing Remarks

I genuinely appreciate your thoughtful attention today, because I am convinced that e-clubs will be the new generation of Rotary in North America and I would like to see the Arizona Rotary E-Club create the model for all e-clubs. That said, this can not be done without a significant commitment on the part of our membership, and YOU are the membership. I know, you feel you have paid your Rotary dues and it is time to let someone else shoulder the load. Hell, I am 86 years old and have been a Rotarian for over 43 years, but I would rather make a contribution to the world I still live in then to simply take up space! Besides, I just read that being sedentary is more injurious to one’s health then is smoking. In addition to that, just getting off your butt will make you feel better.

Come on ALL, there is so much talent among you! And I really need your input.

As long as you are now setting in front of your computer screen, drop me a note, dick@eisenach.org and tell me what you would like to do. I will promise you, we can do some good in a world that really needs us right now, and we can have a lot of fun while we are doing it right from our desktops. Deal?

I look forward to hearing from you,

Dick

Where Does Your Food Come From?

Knowing where your food comes from is the basis to knowing everything about what you eat. Where was it grown or raised? Who handled it? Where did it go from there? All of these things are essential in understanding the food production process and the importance of traceability. The food production system is diverse, and without a standardized way of assessing a product’s true source of origin, tracing a product from farm to fork is nearly impossible – and inaccurate. Which is why we have Source Verification.

 

The Where Food Comes From Source Verified® Label

Where Food Comes From® is a unique labeling program utilizing the authenticity of third-party source verification and the accessibility of Quick Response (QR) Code technology to instantly connect you to the food you eat. Every Where Food Comes From labeled product carries a unique QR Code that is easily scanned and read by any Smart Phone, giving you immediate and unprecedented access to information about the people and processes behind your food.

Don’t have time to scan and read? No problem. If you see the Where Food Comes From label on a package, you can be sure that product comes from a verifiable source. We know them, have audited them, and can verify that their products come from where they say they do.

Learn more at http://wherefoodcomesfrom.com

WFCF-Team

How to Help Thousands from the Comfort of your own Home

We’ve all seen the email blasts or Facebook posts claiming to help you get rich while sitting on your couch… Well what if I told you it was true?

What if I invited you to join me in the most rewarding endeavor of your life? ROTARY!

You see value is what you place on something. Rotary offers you and I the chance to make a difference in the lives of people all around the world. Rotary multiply’s our gifts and coordinates projects so huge that great leaders of the world look to Rotary to help resolve issues.

In life, sometimes the experiences that matter the most are the briefest. They pass in the blink of an eye: a few days, a few hours, a few moments. They are the experiences that illuminate the landscape of our memory, shining brightly even years later. They are the moments in which we see, suddenly, something we had not seen; we understand something we had not understood; we forge a connection we had not expected.

When you embrace the ideals of Rotary, you experience the world with a different sense of perspective and a maybe even with a different purpose. There is an awareness of being part of something larger than yourself. When you board a plane or a train, or leave your home in the dark hours of early morning, you may be leaving for lands unknown – but at your destination, there will be no strangers. There will be Rotarians, waiting and welcoming. There will be work to do, something to learn, and perhaps something to teach.

There will be connections to forge, friendships to build, and memories to carry for a lifetime.

The Koreans have a saying: 사람이 나면 서울로 보내라. In English we would say, “When a person is born, send them to Seoul.” For Seoul is a city of opportunities: a wonderful destination with rich traditions, modern conveniences, and a culture unlike any other.

We invite you to experience Rotary as we have experienced it: in all its diversity, all its warmth, and all its potential. You will be greeted as an old friend by people you have never met; you will share your thoughts, even without a shared language. You will learn with wonder of what Rotary has achieved, and leave inspired to achieve even more.

Consider what becoming a Rotarian can do for those in need.  Consider making the commitment to make this world a better place today.

E-Club of Arizona Membership application

 

 

Chicago – Rotary’s Birthplace

 

Our 1.2 million-member organization started with the vision of one man—Paul P. Harris. The Chicago attorney formed one of the world’s first service organizations, the Rotary Club of Chicago, on 23 February 1905 as a place where professionals with diverse backgrounds could exchange ideas and form meaningful, lifelong friendships. Rotary’s name came from the group’s early practice of rotating meetings among the offices of each member.

OUR ONGOING COMMITMENT

Rotarians have not only been present for major events in history—we’ve been a part of them. From the beginning, three key traits have remained strong throughout Rotary:

We’re truly international. Only 16 years after being founded, Rotary had clubs on six continents. Today we’re working together from around the globe both digitally and in-person to solve some of our world’s most challenging problems.

We persevere in tough times. During WWII, Rotary clubs in Germany, Austria, Italy, Spain, and Japan were forced to disband. Despite the risks, many continued to meet informally and following the war’s end, Rotary members joined together to rebuild their clubs and their countries.

Our commitment to service is ongoing. We began our fight against polio in 1979 with a project to immunize 6 million children in the Philippines. Today, only two countries (Afghanistan and Pakistan) remain polio-endemic—down from 125 in 1988.

What is Wrong With the World Today?

Many people are looking for the answers to what is wrong with the world today. The answer could be quite simple. It is all about the worldview. It is how we see the world around us and what we, as humanity, make our top priority. If our worldview resonates with the natural order and the laws that govern the Universe, then we are able to find harmony in life. If our worldview is distorted, the Nature will try to do its best to guide us back to the path of spiritual evolution through accidents, problems with health, personal and professional life. If we want to find the solution to the material problems, we need to look on the next level of consciousness, on the level of higher consciousness.

“No problem can be solved from the same level of consciousness that created it.”

~ Albert Einstein

In order to change the world around us, we first need to identify what is wrong with it, and not only on the material level since it is quite obvious, but also on the level of higher consciousness. According to the energy-informational map used in the new spiritual science Infosomatics, as well as several esoteric sources, there are seven planes or levels of consciousness: Material, Ether, Astral, Mental, Causal, Bodhi and Atman (there are many other models describing levels of consciousness out there, the key is to find the one that resonates with you the most).

The material level is governed by matter. It is where our physical body exists and functions. Ether plane is the vast world that we perceive through our senses. The main energy of the astral plane is our emotions. The mental plane is defined by our logical thought process and the worldview. Causal or Karmic plane of consciousness holds the information regarding all the events in our current as well as previous lives. The true values of life characterize Bodhi level of consciousness. Atman is the highest point of consciousness and it is something that is nearly impossible to describe in words. It is the ultimate absolute of one higher consciousness.

It seems that most people today believe in the following hierarchy of the levels of consciousness:

Mental level of consciousness: Top priority is given to the logical way of thinking and to the worldview that does not take into account the whole picture of the Universe and its laws. Most people believe that human species are the top of the evolutionary process and that our ability to think logically is primal.
Causal level of consciousness: Many people believe that they have the full control of what happens in their lives. They concentrate on their own ego and often do not take into account what is happening around them. People want to exercise control often without even considering cooperation, which is a much more effective way to keep the balance and harmony created by Nature.

Bodhi level of consciousness: People think that they know what the true values that are vital for a happy life are. In most cases, people give an absolute priority to wealth, power, social success, freedom to do anything they please and unquestionable respect for authority.

Material level of consciousness: It is generally accepted that matter is the foundation of everything. People judge the quality of their experiences mainly through the physical plane and if something does not have a material representation, it does not exist for them.
Ether level of consciousness: It is assumed that our senses and what we can feel through them is the result of our physical actions or manipulation of certain material objects.
Astral level of consciousness: From the early childhood most people are taught to control their emotions and not express freely what they really feel. Most people are used to keeping their true emotions to themselves without sharing them with others.
The priority in the hierarchy of the higher levels of consciousness described above is what makes generally accepted worldview go against the laws of Universe, which inevitably leads to conflict with Natural processes. There is also a missing link in the modern worldview. It is the search for the purpose of life itself which is represented by the Atman level of higher consciousness. How many people do you know that really give attention to their unique mission or purpose in life? Most people are eager to substitute their own true ideals for the ones of someone else or those society lives by.

What is wrong with the world today

The real change of the world around us can only start with the shift in the worldview and the right priority to the levels of higher consciousness. We all should strive for a higher purpose by giving the top priority to realizing unique missions in life through our own creative essence. We should give value to the belief systems that take us closer to finding our own purpose. Our karma or cause and effect process should be guided by our true values. Our mental thought process should be concentrated on the events that happen in our life and on those processes that we have the ability and passion to change for the better. We should refine our emotions to truly allow ourselves experience the vibrations of the world around us. Perception of the world and our state of vitality depends on how accurately we can interpret the information we receive from our senses. The densest energy of the material plane gives us the understanding of our existence and helps us realize our mission. When the critical mass of people will be able to synchronize their energies with the etalon state given by Nature, the world will wake up to the new paradigm.

What Are You Willing To Trade Your Life For?

Consider what you would do if your child fell into a gorilla exhibit.

The media has been critical of the mother of that child, but what can we do to prevent tragedy like this form happening?

Rotary International has been working on that premise with the eradication of Polio…

Douglas Jackson is the President and CEO of Project Cure, an international charity that delivers unused medical supplies to medical teams all around the world. He is also a Rotarian that cares about our world. Poverty is not necessary.

 

Click Here to learn more about Project Cure.

CYberSecurity: 10 Little-Known Facts Every User Should Know

10 Surprising Cyber Security Facts That May Affect Your Online Safety

The cyber security industry is growing as you’re reading this. More specialists join the ranks, more malware is being launched every day than ever before: 230,000 new malware samples/day according to the latest statistics. Naturally, more resources are being deployed to counter cyber attacks. That’s why I thought it would be helpful to sum up 10 cyber security facts that define the current information security landscape.

One of these essential facts is the estimated annual cost for cyber crimecommitted globally which has added up to 100 billion dollars! And don’t think that all that money comes from hackers targeting corporations, banks or wealthy celebrities. Individual users like you and me are also targets.

total cost of cyber crime in 2015 in 7 countries

Source: 2015 Cost of Cyber Crime Study: Global by Ponemon

As long as you’re connected to the Internet, you can become a victim of cyber attacks.

So that’s why we wanted to walk you through some of the most shocking cyber security facts that you maybe wish you’d known until the present moment.

These will give you a much more accurate idea of how dangerous it really is to go online without proper protection.
1.The most wanted cyber criminals in the world
On FBI’s Most Wanted List for cyber criminals you will currently find 19 individuals, each being responsible for consumer losses ranging from $350,000 to more than $100 million. They are from all over the world and huge rewards are offered for their capture.

most wanted cyber criminals in the world heimdal security

For example, FBI’s most wanted cyber criminals at this moment are the JABBERZEUS subjects, a group of individuals involved in a wide-ranging racketeering enterprise and scheme that installed, without authorization, malicious software known as Zeus on victims’ computers. This type of financial malware was used to capture bank account numbers, passwords, personal identification numbers, and other confidential information necessary to log into online banking accounts.

Starting in September of 2011, the FBI began investigating a modified version of the Zeus Trojan, known as GameOver Zeus (GOZ), which we covered in depth. Thousands of corporations were infected with GameOver Zeus and as many as 1.2 million computers were infected prior to the take down of Zeus. It is believed GameOver Zeus is responsible for financial losses of more than $100 million USD.

How it affects you and what can you do to get protected:

  • Zero Day attacks can be powerful and very dangerous.
  • If you keep up to date with major news in the cyber security industry, it might help you identify attacks and know what to do about them.
  • Keep your software updated and take all necessary precautions to keep your financial and confidential information safe.

2. The most expensive computer virus of all times

Ever wondered how much damage a computer virus can do? Let us give you a compelling example through this next cyber security fact. MyDoom is considered to be the most expensive virus in the world and in cyber security history, having caused an estimated financial damage of $38.5 billion!

MyDoom was first spotted in January 2004 and it became the fastest-spreading email worm ever, exceeding all previous records. The virus’s origins are believed to be in Russia, but its author was never discovered.

Mydoom was mainly transmitted by email, disguised as spam email. A user might inadvertently open the attachment in the email and the worm would re-send itself to every address it could find. The original version contained a payload that did two things: it opened a backdoor into the user’s computer, allowing remote control of it, while also conducting a DDoS attack (Direct Denial Of Service) against SCO group’s website.

most expensive computer virus heimdal security
How it affects you and what can you do to get protected:

  • Viruses such as MyDoom can be extremely dangerous, because if a cyber criminal gains control over your computer, there’s no telling if and how you may regain control over your device.
  • Severe malware usually morphs and has a very low detection score, so antivirus solutions can’t detect it.
  • You need a proactive solution that can work as a supplement for your AV, scanning your Internet traffic and warnning you when potential threats appear, while also blocking access to hacker controlled servers and keeping your data from leaking.

3. Social media – a hackers’ favorite target

Currently, according to in depth statistics, there are more than 1.6 billion social network users worldwide with more than 64% of internet users accessing social media services online. Moreover, social networking is one of the most popular ways for online users to spend their time, and a preferred way to stay in contact with friends and families.

This is precisely why cyber attackers love social media as well! Users that spend a lot of time on social networks are very likely to click links posted by trusted friends, which hackers use to their advantage. Here are some of the most popular types of cyber attacks directed at social media platforms:

  • Like-jacking: occurs when criminals post fake Facebook “like” buttons to webpages. Users who click the button don’t “like” the page, but instead download malware.
  • Link-jacking: this is a practice used to redirect one website’s links to another which hackers use to redirect users from trusted websites to malware infected websites that hide drive-by downloads or other types of infections.
  • Phishing: the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by disguising itself as a trustworthy entity in a Facebook message or Tweet.
  • Social spam: is unwanted spam content appearing on social networks and any website with user-generated content (comments, chat, etc.). It can appear in many forms, including bulk messages, profanity, insults, hate speech, malicious links, fraudulent reviews, fake friends, and personally identifiable information.

social media hacking heimdal security

Why are cyber attacks on social media so frequent?

Because social media users usually trust their circles of online friends. The result: more than 600.000 Facebook accounts are compromised every single day! Also, 1 in 10 social media users said they’ve been a victim of a cyber attack and the numbers are on the rise. Now this is a cyber security statistic which we don’t want you to become part of.

How it affects you and what can you do to get protected:

4. 99% of computers are vulnerable to exploit kits

Cyber security fact: Oracle Java, Adobe Reader or Adobe Flash is present on 99% of computers. That means that 99% of computer users are vulnerable to exploit kits (software vulnerabilities).

Why? Because the vulnerabilities that these types of software often present are extremely critical: all it takes is one click on an infected advertising banner to give a hacker full access to your computer.

99 percent of computers are vulnerable heimdal security

Adobe Flash has a huge number of vulnerabilities, so cyber criminals target it in the majority of their attacks. By using these security holes in Flash, attackers can infect your computer with ransomware, such as various CryptoLocker variants or Teslacrypt and CTB-Locker.

The rise of exploit kits-as-a-service and the increasing use of automation has led to more sophisticated and aggressive attacks. Without adequately protecting your browsers and your entire system, you’ll leave yourself vulnerable to a huge range of cyber threats.

How it affects you and what can you do to get protected:

  • Keep your software updated at all times (the experts say so, not just us) or install a solution that does that automatically and silently.
  • Keep your operating system up to date.
  • Install an AV solution and a supplement that can do what AV fails to do: protect your system proactively from cyber threats by scanning incoming and outgoing Internet traffic.

5. Security warning: inside jobs
Maybe you’ll be surprised to find out that a shocking 59% of employees steal proprietary corporate data when they quit or are fired. But there are more types of insider threats to get protection against:

  • Malicious insiders are the least frequent, but have the potential to cause significant damage due to their level of access. Administrators with privileged identities are especially risky. According to the Ponemon Institute, “data breaches that result from malicious attacks are most costly.”
  • Exploited insiders may be “tricked” by external parties into providing data or passwords they shouldn’t.
  • Careless insiders may simply press the wrong key and accidentally delete or modify critical information.

cyber security insider jobs heimdal security

These types of security risks is being acknowledged by companies everywhere, and strategies are put together to mitigate them:

“Almost half of European organizations believe that insider threats are now more difficult to detect, with senior IT managers being very worried about the things their own users can do with corporate data”

said Andrew Kellett, principal analyst at Ovum.

How it affects you and what can you do to get protected:

  • If a soon-to-be-ex-colleague decides to do some damage before he/she leaves the company, make sure your work goes unaffected.
  • Be careful how you manage your passwords: use a password management application, use strong passwords and change them regularly.
  • Protect your shared documents and keep updated backups of all the information you’re working on.

6. Social engineering – cyber criminals’ favorite way to manipulate victims

People are the weakest link when it comes to cyber security, which is why psychological manipulation of cyber attack victims is so common.

According to the definition, social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. This is a type of confidence trick for the purpose of information gathering, fraud, or system access, and the first type of attack of this kind known in history is the Trojan horse itself (not the computer virus, but the Greek mythical event).

For example, in a recent attack, an international cyber crime ring based out of Eastern Europe managed to steal $1 billion in 2 years from 100 different banksin nearly 30 countries using spear phishing emails targeting bank employees. The spear phishing technique is, by far, the most successful on the internet today, accounting for 91% of attacks!

social engineering cyber hacking heimdal security

How it affects you and what can you do to get protected:

  • Always check the recipient of an email and the source of a message.
  • Don’t click any strange links and know what a phishing attack looks like.
  • Don’t install software from untrusted sources.
  • Don’t trust people blindly and don’t give away confidential information to strangers.

7. Your government is making you more vulnerable

Cyber security fact: governments around the world are creating malware and using it as digital weapons or in espionage programs. In the past 5 years, more than a handful of government malware have been discovered (such as Stuxnet), but their origins have yet to receive full attribution.

Besides civilians and private organizations becoming collateral damage, there are also other severe consequences.

government malware heimdal security

In an article on Dark Reading, some key points are made as to how governments are making all of us more vulnerable to cyber attacks:

  • Government malware accelerates the evolution of criminal malware – cyber criminals do a lot of reverse engineering on government malware, and use its tactics and technical approach to create new, more advanced malware of their own.
  • Governments have fortified zero day vulnerability black markets – Zero Day vulnerabilities auctions have become common, but governments are buying the intelligence related to these vulnerabilities and weapon zing them, instead of disclosing them responsibly, as is the norm in the cyber security industry.
  • Governments try to restrict/backdoor/break encryption – in the name of transparency and protection against cyber criminals and terrorists, governments all over the world are trying to limit every individual’s right to encrypt confidential information. This is why “cyber policies” can do more damage than good.

changing attacker profiles

Source: McAfee Labs Threats Report, August 2015

How it affects you and what can you do to get protected:

  • Increase your individual protection by installing an AV solution and a complementary solution that can strengthen your defenses.
  • Educate yourself about cyber security and keep an eye on news in the industry.
  • Use a VPN solution and encryption technology to protect your confidential information.

8. There is a real-time map that shows cyber attacks in action

Ever wondered how cyber attacks look at a global scale? Now you have the chance to do it with this real-time map put together by Norse.

real time map of cyber attacks heimdal secuity

You might notice that the U.S. is one of the favorite targets for cyber criminals. For example, Chinese attackers alone caused more than $100 million worth of damage to U.S. Department of Defense networks according to leaked documents from Edward Snowden. Back in 2012, the same department used to suffer more than 10 million cyber attacks per day, and, given the evolution of cyber criminals, we can assume that these figures have climbed dramatically since then. For example, the U.S. Navy, which receives 110.000 cyber attacks every hour.

9. Hacktivism is the main motivation that drives cyber attacks

Hacktivism accounts for half of the cyber attacks launched in the world. The term represents a subversive use of computers and computer networks to promote a political agenda. With roots in hacker culture and hacker ethics, its ends are often related to the free speech, human rights, or freedom of information.

hacktivism statistic heimdal security

Although it may seems like the terms has a positive spin, it really depends on who is using the term. Hacktivism can be a politically motivated technology hack, a constructive form of anarchic civil disobedience, or an undefined anti-systemic gesture. It can signal anticapitalist or political protest; it can denote anti-spam activists, security experts, or open source advocate.

Hacktivists use code, website mirroring, geo-bombing and anonymous blogging to achieve their objectives, the oldest events of this type dating back to 1989. Anonymous may be the most widely known hacktivist group in the world, but there are many others that carry on cyber attacks of this kind.

How it affects you and what can you do to get protected:

  • Be careful about the websites you visit and always make sure they use the SSL security protocol.
  • Keep your passwords long, complicated, updated often and managed through dedicated app (NEVER store them in your browser).
  • Keep your system and software updated and also keep an eye out for trouble.

10. 68% of funds lost as a result of a cyber attack were declared unrecoverable

Cyber crime is not only costly, but poses other problems as well for organizations worldwide.

It’s becoming increasingly difficult to detect cyber attacks and resolve the security issues created by them: the average time to detect a malicious or criminal attack by a global study sample of organizations was 170 days(according to a research conducted by the Ponemon Institute). Moreover, no industry is safe: all business sectors are affected to a higher or lower degree.

financial losses cyber hacking heimdal security

The same research conducted by the Ponemon Institute found the average annualized cost of cyber crime incurred by a benchmark sample of U.S. organizations was $12.7 million, representing a 96% increase since the study was initiated 5 years ago.

As a result, organizations experienced a 176% increase in the number of cyber attacks, with an average of 138 successful attacks per week, compared to 50 attacks per week when the study was initially conducted in 2010.

And what’s more worrisome is that 68% of all these funds that were lost as a result of a cyber attack were never recovered and will probably never be.

How it affects you and what can you do to get protected:

  • Keep your financial information protected by using a password manager application to enter your passwords in your online banking website.
  • Be aware of phishing attempts and never give your confidential information over email or other means of electronic communication.
  • Get additional protection through software that can detect cyber threats and block them before they infect your system and leak financial data.

However big or small, cyber security threats should be treated with caution. You may not be a millionaire (yet) or a C-level manager, but that doesn’t mean that you’re protected against a potential hacker attack. Don’t spare any precautions you can take and try to develop your own protection system with the tools and information you find online, such as this list of cyber security facts.

We recently published a guide to help you choose the best antivirus solution for you and there are plenty more security guides you can use to secure your social media accounts, your email, your operating system and more. Use them and navigate the web with a lot more peace of mind.

See the full infographic below:

Cyber Security Facts Infographic

Rotary in Arizona

Did you know that there is a website for all Rotary Clubs and projects in the state of Arizona? This site helps those looking join community leaders in giving back to the community, trying to exchange ideas or simply want to take action and improve our world.

Rotary is more than just a humanitarian organization. It’s a avenue to live out your dreams. Connect with a club today and see how the power of the Rotary cog (our symbol that represents power in a small package) can work for you.

http://www.arizonarotary.org

Why We Do What We Do

Rotarians are always striving to find innovative solutions for the world’s problems. Tony Robbins talks this week about why we are motivated to succeed. Think about your motivation for Rotary and how you can innovate for those around you.

 

Rotary Council on Legislation Update -2016

Every three years, Rotarians meet at the Council on Legislation to review and vote on proposed legislation. The Council gives us a voice in how our organization is governed.

 

2016 COUNCIL ON LEGISLATION

The 2016 Council on Legislation met in Chicago 10-15 April. With the Council adjourned, an official report of action will be compiled, sent to clubs, and posted online within two months. Clubs have an opportunity to record opposition to any action during the following two months. If at least 5 percent of the votes entitled to be cast by the clubs oppose an action, the legislation is suspended and the general secretary conducts a ballot-by-mail. A majority vote would cause the proposal to be rejected. All Council actions otherwise go into effect 1 July.

The Council has seen the value of clubs and is now removing all contingencies to make clubs exactly the same as all other Rotary clubs. This is something Rotarians have already practiced, but when the first eClub was created there were strict requirements to allow for this alternative meeting style. Now clubs meet in the morning, Noon and evening hours, on modified schedules like once or twice a month, and this new flexability has opened the door to members that previously were unable to make the weekly commitment.

WHAT THE COUNCIL DOES

Each Rotary district sends a representative to the Council. Representatives deliberate and act upon all proposed enactments and resolutions. Enactments seek to change Rotary’s constitutional documents, and resolutions express an opinion or make a recommendation to the RI Board.

The RI Board reviews and acts on resolutions adopted by the Council and items referred to the Board.

2016 COUNCIL ON LEGISLATION DOCUMENTS

ARCHIVE


CONTACT INFORMATION

General Secretary
c/o Council Services
Rotary International
1560 Sherman Avenue
Evanston, IL 60201 USA
Fax: +1-847-556-2123
Email: