NGO Risk Management. Principles and Promising Practice
|
|
|
- Charity Sullivan
- 9 years ago
- Views:
Transcription
1 NGO Risk Management Principles and Promising Practice With heightened levels of violence in some conflict settings, coupled with proliferating legal and fiduciary regulations related to anti-corruption and counter-terror efforts, humanitarian non-governmental organizations (NGOs) are contending with new and intensified risks to their personnel, operations, and organizations. Some of the larger international NGOs have begun to adopt organization-wide risk management frameworks to better enable effective programming in high-risk situations. This handbook is meant to serve as a primer and quick reference tool for humanitarian organizations on the basic principles of risk management. It presents concrete examples of promising practices as well as pitfalls to avoid. The handbook draws upon the findings of a 2016 study, NGOs and Risk, conducted by Humanitarian Outcomes for InterAction, with the participation of 14 major international NGOs. The full report, as well as a sample risk register template and a list of key resources, can be found here: An independent organisation providing research evidence and policy advice to inform better humanitarian action
2 Risk Management: Definitions and basic principles Key Terms Threat: A danger or potential source of harm or loss Risk: The likelihood and potential impact of encountering a threat Risk management: A formalized system for forecasting, weighing, and preparing for possible risks in order to minimize their impact Types of risk Organizations have their own ways of categorizing and grouping types of risk. Below is the generic categorization used for the NGOs and Risk study, with examples. Risk area Definition Examples Security Violence or crime Kidnapping of staff Armed attack on facilities Collateral damage from airstrike Safety Accident or illness Road accidents Fire in office or residence Fiduciary Resources not used as intended Diversion of aid materials (fraud/theft/bribery) Bribery of local officials Misallocation of earmarked donations Information Data loss, breach, or misuse Theft of donor credit card information Breach of personnel data or other sensitive information Inappropriate communications by staff on social media Legal/compliance Violation of laws/regulations Violations of host-country labor codes or other laws Violations of international sanctions or counter-terror restrictions Reputational Action, information or Negative media stories perceptions damaging to Negative public statements or litigation by staff, integrity or credibility ex-staff or stakeholders Operational Inability to achieve Human error objectives Capacity deficits Financial deficits The risk management approach Organizational risk management frameworks seek to integrate all major areas of risk within a unified conceptual and planning platform. Sometimes referred to as enterprise risk management or ERM, this approach has its roots in the private sector and has only recently been taken up by aid organizations. The most well developed risk management frameworks include: a risk register tool for analyzing and prioritizing risks and planning mitigation measures; decision-making and implementation procedures flowing directly from that assessment and planning; a systematic follow-up or audit process to ensure good implementation and understanding; and, to incorporate learning; and a means for weighing criticality, or the degree to which the action is urgent or life-saving, in order to guide decision-making on acceptable levels of risk (sometimes called program criticality ). 2
3 The risk register: A tool to assess, prioritize and mitigate organization-wide risks A sample risk-register matrix template, compiled from examples used by the participating NGOs, can be downloaded here: A risk register is a way to build a comprehensive picture of the most serious risks facing an organization at any given time. It should be built from the ground up, with each country office and each functional area of the organization (e.g., program, legal, communications) conducting an exercise to identify and rank the risks they face in all categories. These in turn inform the organization-wide risk register, which is compiled at the central level at least once per year. Using the same logic as for a security risk assessment, completing a risk register involves ranking risks in all categories by their perceived degree of likelihood as well as the level of impact they would have on the organization if realized. Once the risks are identified and prioritized, the process involves developing strategies to mitigate them, including outlining ways that procedures and practices may need to be adjusted. The risk register also provides a valuable tool for benchmarking progress against these plans throughout the year, including through risk audits or other follow-up measures. 3
4 Promising (and poor) practices in risk management Some promising practices related to risk management identified in the report include: Catalogue missteps and realized risks: The senior management of one INGO compiled a list of all significant mistakes or bad outcomes that affected the organization over the year, (and ways they may have been avoided or mitigated) and shared it with the entire organization as a learning tool. Because many staff members tended to be only vaguely aware or misinformed of such incidents, this new practice helped foster openness and lesson-learning. Adapt to work with high-risk partners: Specific steps can be taken when working with highrisk national-partner NGOs, such as those that lack the capacity to meet donor requirements or don t have financial reserves. INGO staff can be seconded to sit within a partner organization; funds can be disbursed in smaller amounts or more frequently; and additional funds can be obtained for mentoring and capacity building. INGOs should also assess their motivations for partnering and their capacity to partner before initiating the partnership. Prepare for host-country legal challenges: Tax, registration, and other legal compliance issues take time and energy and are so country-specific that they are difficult for a globally operating organization to resolve and foresee. Some INGOs have found that retaining national lawyers can avoid legal missteps, deal quickly with situations that arise, and provide input into relevant policies, e.g., country-specific HR policies. Hire external experts to conduct IT security audits: Many INGOs are under-informed about the increase in information risks, which include hacking into fundraising systems (to steal donors credit card or other sensitive information) and defrauding national-staff administration software. External professionals can conduct IT security audits to identify technological and procedural problems and fix vulnerabilities. Ensure that brief and user-friendly tools are available in the field: Basic, digestible tools get used. For example, sample risk-register templates can be posted in field offices. Focus and insist on tools and trainings that are practically-oriented. Review and improve national-staff security: One INGO made the unprecedented decision to evacuate national-staff members and their families when a province was overrun by anti-government forces and they were deemed to be at direct risk. The ad hoc decision revealed the need for, and helped to spark, policy development on this issue. Generally, many INGOs could take steps to mitigate national-staff security risks, including improving off-hours transportation, communications, and site security at home. Admit and disclose fraud: Several INGOs have taken a decision to proactively disclose incidents of fraud or financial mismanagement. This can demonstrate openness and good management, which institutional as well as private donors can appreciate. 4
5 Poor practices Miscalculating risks by focusing on likelihood over potential impact: An INGO working in Turkey providing cross-border aid to Syria was storing humanitarian goods inside Syria instead of Turkey, in order to comply with Turkish customs regulations. The INGO s stocks in Syria were stolen, which contributed to a suspension of the program. In retrospect, the potential negative impact of storing the goods in Turkey was far less than that of storing them in Syria and a systematic risk assessment could have prevented the situation. Another INGO noted that it focused on known risks, such as small diversion, rather than less-understood but potentially more impactful ones, such as bid rigging by vendors. Failing to balance risk-taking with program criticality: An INGO noted that one of its field teams was crossing a frontline regularly to conduct supervision and quality improvement visits not lifesaving outputs. They re-assessed and decided that the risk was not worthwhile because the program would have to stop if the staff members were shot. Transferring risks to national staff and/or partners without support: Many INGOs interviewed observed that their national NGO partners are exposed to high levels of risk, often without support or training. On the financial side, INGOs perceive risks to still be on their shoulders, which has led to oversight procedures and capacity building. But, INGOs tend not to sufficiently acknowledge or discuss the security risks faced by their national NGO partners, especially when they depend on them for access. Similarly, INGOs security risk mitigation for national staff (e.g., off-hours transportation, communication, site security) is seen as often insufficient. Maintaining a culture of silence on corruption, fraud, and diversion: In the highest-risk environments, some aid agencies are forced to compromise or make concessions in order to maintain access. These can include paying money at checkpoints, paying unofficial taxes to local authorities, altering targeting criteria so that powerful actors receive aid, employing staff connected with local militia, or working in one region and not another to avoid antagonizing a local authority or armed actor. Organizations too often are reluctant to discuss these practices, even internally, leaving local field staff to face difficult ethical dilemmas without support, and sometimes putting them at physical risk. Failing to talk to armed groups because it s not allowed : Frontline humanitarian staff are sometimes under the misimpression that engaging in dialogue with armed actors for the purpose of reaching those in need is illegal or against counter-terror regulations. This is not the case. Effective dialogue and negotiation are key to enabling access in high-risk environments, and staff should be empowered to discuss these options with their organizations when carrying out these activities becomes necessary. 5
6 Useful resources SO Risk Management: Operational Security Management in Violent Environments: Security to Go: Counter-terrorism Laws: What Aid Agencies Need to Know: Risk Management Toolkit in Relation to Counterterrorism Measures: Transparency International, Handbook of Good Practice: Preventing Corruption in Humanitarian Operations, 2010: An independent team of professionals providing evidence-based analysis and policy consultation to governments and international organisations on their humanitarian response efforts
LGMA Qld Governance and Corporate Planning Village Forum
www.pwc.com.au Fraud Risk Management Fraud Risk Assessments LGMA Qld Governance and Corporate Planning Village Forum March 2015 Agenda Introductions Fraud Risk Management Fraud Statistics s Global Economic
Security Risk Assessment Tool
Security Risk Assessment Tool Version: (Draft) 24 April 2014 This tool was developed by the ACT Safety & Security Community of Practice (SSCP) for use by ACT Alliance members and partners. 1. Purpose of
These guidelines can help you in taking the first step and adopt a sustainability policy as well as plan your further sustainability communication.
SUSTAINABILITY POLICY AND COMMUNICATION GUIDELINES Why communicate about sustainability? IFU encourages all our investments to be transparent and informative about business and sustainability performance
Compliance. Compliance Toolkit. Protecting Charities from Harm. Chapter 2 Due Diligence, Monitoring and Verification of End Use of Charitable Funds
Compliance Compliance Toolkit Protecting Charities from Harm Chapter 2 Due Diligence, Monitoring and Verification of End Use of Charitable Funds The Charity Commission The Charity Commission is the independent
Risk Management Strategy and Policy. The policy provides the framework for the management and control of risk within the GOC
Annex 1 TITLE VERSION Version 2 Risk Management Strategy and Policy SUMMARY The policy provides the framework for the management and control of risk within the GOC DATE CREATED January 2013 REVIEW DATE
WFP ENTERPRISE RISK MANAGEMENT POLICY
WFP ENTERPRISE RISK MANAGEMENT POLICY Informal Consultation 3 March 2015 World Food Programme Rome, Italy EXECUTIVE SUMMARY For many organizations, risk management is about minimizing the risk to achievement
IFAD Policy on Enterprise Risk Management
Document: EB 2008/94/R.4 Agenda: 5 Date: 6 August 2008 Distribution: Public Original: English E IFAD Policy on Enterprise Risk Management Executive Board Ninety-fourth Session Rome, 10-11 September 2008
http://appserver.lhsc.on.ca/policy/search_res.php?polid=gen041&live=1
Page 1 of 5 Policy Administration Console Policy: Standards for Business Conduct Policy Owner: VP Finance & CFO SLT Sponsor: VP Finance & CFO Approval By: Senior Leadership Team Date: 2008-06-25 Effective
Operational Risk Management Policy
Operational Risk Management Policy Operational Risk Definition A bank, including a development bank, is influenced by the developments of the external environment in which it is called to operate, as well
RUTGERS POLICY. Section Title: Legacy UMDNJ policies associated with Information Technology
RUTGERS POLICY Section: 70.2.20 Section Title: Legacy UMDNJ policies associated with Information Technology Policy Name: Information Security: Incident Management Formerly Book: 95-01-09-02:00 Approval
Wowprime Corporation Ethical Corporate Management Best Practice Principles
Wowprime Corporation Ethical Corporate Management Best Practice Principles Chapter I General Provisions Article 1: Purpose and scope The Ethical Corporate Management Best Practice Principles ("Principles")
PRIORITIZING CYBERSECURITY
April 2016 PRIORITIZING CYBERSECURITY Five Investor Questions for Portfolio Company Boards Foreword As the frequency and severity of cyber attacks against global businesses continue to escalate, both companies
Ensuring the Protection Aid Workers: Why a Special Mandate Holder is Necessary
www.protectaidworkers.org Florian Seriex / ACF Jordanie Ensuring the Protection Aid Workers: Why a Special Mandate Holder is Necessary Discussion Paper Strengthening the protection of aid workers goes
Business Conduct, Compliance and Ethics Program. important
Business Conduct, Compliance and Ethics Program important Table of Contents Letter from Troy Kirchenbauer As healthcare s first online direct contracting market, aptitude is committed to upholding the
The College of New Jersey Enterprise Risk Management and Higher Education For Discussion Purposes Only January 2012
The College of New Jersey Enterprise Risk Management and Higher Education For Discussion Purposes Only Agenda Introduction Basic program components Recent trends in higher education risk management Why
Corporate risk register
EXECUTIVE BOARD EB133/10 133rd Session 17 May 2013 Provisional agenda item 7.3 Corporate risk register Organization-wide strategic risk management in WHO Report by the Secretariat 1. This report is submitted
REPORT 2014/078 INTERNAL AUDIT DIVISION
INTERNAL AUDIT DIVISION REPORT 2014/078 Audit of the Office for the Coordination of Humanitarian Affairs (OCHA) Managing Agent role for the Somalia Common Humanitarian Fund Overall results relating to
Federal Bureau of Investigation s Integrity and Compliance Program
Evaluation and Inspection Division Federal Bureau of Investigation s Integrity and Compliance Program November 2011 I-2012-001 EXECUTIVE DIGEST In June 2007, the Federal Bureau of Investigation (FBI) established
Inventec Corporation Ethical Corporate Management Best Practice Principles
Inventec Corporation Ethical Corporate Management Best Practice Principles (This English version is a translation based on the original Chinese version. Where any discrepancy arises between the two versions,
Data Protection Breach Reporting Procedure
Central Bedfordshire Council www.centralbedfordshire.gov.uk Data Protection Breach Reporting Procedure October 2015 Security Classification: Not Protected 1 Approval History Version No Approved by Approval
Our vision. A company where the best people want to work.
Code of Conduct Our vision A company where the best people want to work. The world leader in chemical distribution, providing unparalleled connectivity between customers and suppliers. 2 Univar s guiding
Module 4. Risk assessment for your AML/CTF program
Module 4 Risk assessment for your AML/CTF program AML/CTF Programs Risk assessment for your AML/CTF program Page 1 of 27 Module 4 Risk assessment for your AML/CTF program Risk assessment for your AML/CTF
RISK APPETITE IN THE WORLD FOOD PROGRAMME
RISK APPETITE IN THE WORLD FOOD PROGRAMME Informal Consultation 7 December 2015 World Food Programme Rome, Italy INTRODUCTION 1. WFP s risk appetite reflects its overall approach to risk management. Since
KNOW YOUR THIRD PARTY
Thomson Reuters KNOW YOUR THIRD PARTY EXECUTIVE SUMMARY The drive to improve profitability and streamline operations motivates many organizations to collaborate with other businesses, increase outsourcing
Fraud Risk Management
Fraud Risk Management Overview Discussion Questions 1) Does your organization follow a specific risk management model? If so, which one? Do you think this model adequately addresses the risks your organization
Location of the job: CFO Revenue Assurance
JOB PROFILE Title of position: Manager: Revenue Assurance Operations Number of subordinates: 5-10 Location of the job: CFO Revenue Assurance Level: 3 Position Code: Time span: 2-3 years Key Performance
Department of Veterans Affairs Office of Inspector General Strategic Plan FY 2009-2015
Department of Veterans Affairs Office of Inspector General Strategic Plan FY 2009-2015 Plans are nothing; planning is everything. -Dwight D. Eisenhower The Strategic Plan of the VA Office of Inspector
Social Performance Management
SPTF Universal Standards for Social Performance Management 1 2 3 DEFINE AND MONITOR SOCIAL GOALS ENSURE BOARD, MANAGEMENT, AND EMPLOYEE COMMITMENT TO SOCIAL GOALS DESIGN PRODUCTS, SERVICES, DELIVERY MODELS
Code of Ethics and Professional Conduct
Code of Ethics and Professional Conduct CHAPTER 1. VISION AND APPLICABILITY 1.1 Vision and Purpose As practitioners of project management, we are committed to doing what is right and honorable. We set
ICSH Guidance Document: Preparing a Risk Register/ Risk Management Plan
ICSH Guidance Document: Preparing a Risk Register/ Risk Management Plan What is a Risk Register? A Risk Register is a document which outlines the potential threats to the ongoing operation of an organisation,
General Assembly Security Council
United Nations A/67/775 General Assembly Security Council Distr.: General 5 March 2013 Original: English General Assembly Sixty-seventh session Agenda item 69 Promotion and protection of human rights Security
Information technology Security techniques Information security management systems Overview and vocabulary
INTERNATIONAL STANDARD ISO/IEC 27000 Third edition 2014-01-15 Information technology Security techniques Information security management systems Overview and vocabulary Technologies de l information Techniques
PROCEDURES RISK MANAGEMENT FRAMEWORK AND GUIDELINES PURPOSE INTRODUCTION. 1 What is Risk?
PROCEDURES RISK MANAGEMENT FRAMEWORK AND GUIDELINES PURPOSE This Framework and Guidelines have been developed in support of the CQUniversity Risk Management Policy and are intended for use by the CQUniversity
FRAUD PREVENTION STRATEGY FOR UGU DISTRICT MUNICIPALITY (UGU)
FRAUD PREVENTION STRATEGY FOR UGU DISTRICT MUNICIPALITY (UGU) CONTENTS 1. Introduction.. 3 2. Characteristics of Fraud.. 5 3. Fraud Strategy..... 6 4. Building the Fraud Prevention Plan........ 8 Fraud
Position Area Manager Grade D2 Department Programs and Operations (Field Based) Date January 2016
Job Description Position Area Manager Grade D2 Department Programs and Operations (Field Based) Date January 2016 & Location Duration 3 year fixed term contract Reports to Operations Manager (position):
MEMORANDUM. Municipal Officials. From: Karen Horn, Director, Public Policy and Advocacy; and Abby Friedman, Director, Municipal Assistance Center
MEMORANDUM To: Municipal Officials From: Karen Horn, Director, Public Policy and Advocacy; and Abby Friedman, Director, Municipal Assistance Center 89 Main Street, Suite 4 Montpelier, Vermont 05602-2948
Security Management Training Course Notes
Security Management Training Course Notes SECURITY MANAGEMENT Security Management Framework Context Analysis Who are we? Mission Values People Political stance Where are we? Historical background Political
Information Security Awareness Training
Information Security Awareness Training Presenter: William F. Slater, III M.S., MBA, PMP, CISSP, CISA, ISO 27002 1 Agenda Why are we doing this? Objectives What is Information Security? What is Information
Instruction note for ECHO staff on Remote Management
Ref. Ares(2013)168580-08/02/2013 EUROPEAN COMMISSION DIRECTORATE-GENERAL HUMANITARIAN AID AND CIVIL PROTECTION ECHO Instruction note for ECHO staff on Remote Management Commission européenne/europese Commissie,
1. Compliance with Laws, Rules and Regulations
CODE OF BUSINESS CONDUCT - EXAMPLE INTRODUCTION This Code of Business Conduct covers a wide range of business practices and procedures. It does not cover every issue that may arise, but it sets out basic
Fraud Prevention and Deterrence
Fraud Prevention and Deterrence Fraud Risk Assessment 2016 Association of Certified Fraud Examiners, Inc. What Is Fraud Risk? The vulnerability that an organization faces from individuals capable of combining
Ethics Everywhere Jones Lang LaSalle Incorporated Annual Report for Calendar Year 2013 Program
Ethics Everywhere Jones Lang LaSalle Incorporated Annual Report for Calendar Year 2013 Program Introduction JLL is committed to a corporate culture that embraces and promotes strong principles of business
Enterprise Risk Management
Cayman Islands Society of Professional Accountants Enterprise Risk Management March 19, 2015 Dr. Sandra B. Richtermeyer, CPA, CMA What is Risk Management? Risk management is a process, effected by an entity's
AfDB New Procurement Policy: Training Program for the Bank s Procurement Staff. Risk-based design of Procurement Arrangements - Introduction
11 AfDB New Procurement Policy: Training Program for the Bank s Procurement Staff Risk-based design of Procurement Arrangements - Introduction 2 Bank's new Approach to Procurement New Vision of the Procurement
CIMA CODE OF ETHICS. For professional accountants
CIMA CODE OF ETHICS For professional accountants October 2007 CIMA PREFACE As chartered management accountants, CIMA members (and registered students) throughout the world have a duty to observe the highest
1 Human Rights Governance of the VPSHR at Barrick
Table of Contents Forward... 2 1 Human Rights Governance of the VPSHR at Barrick... 3 A. Our Commitment... 3 B. Security Management System... 3 C. Monitoring and Reporting... 4 2 Implementation of the
State University of New York at Potsdam. Workplace Violence Prevention Policy and Procedures
State University of New York at Potsdam Workplace Violence Prevention Policy and Procedures Revision Date: September 15, 2015 Page 1 of 7 TABLE OF CONTENTS Policy... 3 Statement... 3 Definitions... 3 Application
Global Corporate IT Security Risks: 2013
Global Corporate IT Security Risks: 2013 May 2013 For Kaspersky Lab, the world s largest private developer of advanced security solutions for home users and corporate IT infrastructures, meeting the needs
Data Privacy and Gramm- Leach-Bliley Act Section 501(b)
Data Privacy and Gramm- Leach-Bliley Act Section 501(b) October 2007 2007 Enterprise Risk Management, Inc. Agenda Introduction and Fundamentals Gramm-Leach-Bliley Act, Section 501(b) GLBA Life Cycle Enforcement
CODE OF CONDUCT. It s how we do what we do
CODE OF CONDUCT It s how we do what we do 2 FOREWORD Our organization brings together people from a wide range of cultural backgrounds all with different skills and different viewpoints. The diversity
ERM Program. Enterprise Risk Management Guideline
ERM Program Enterprise Management Guideline Table of Contents PREAMBLE... 2 When should I refer to this Guideline?... 3 Why do we need a Guideline?... 4 How do I use this Guideline?... 4 Who is responsible
Ethical Corporate Management Principles
Ethical Corporate Management Principles Article 1 Purpose and applicability of the Principles The Principles are specifically set up to assist the Company in establishing an ethical corporate culture and
A Comparison. Safety and Health Management Systems and Joint Commission Standards. Sources for Comparison
and Standards A Comparison The organizational culture, principles, methods, and tools for creating safety are the same, regardless of the population whose safety is the focus. The. 2012. Improving Patient
National Standards for Disability Services. DSS 1504.02.15 Version 0.1. December 2013
National Standards for Disability Services DSS 1504.02.15 Version 0.1. December 2013 National Standards for Disability Services Copyright statement All material is provided under a Creative Commons Attribution-NonCommercial-
Considerations for Outsourcing Records Storage to the Cloud
Considerations for Outsourcing Records Storage to the Cloud 2 Table of Contents PART I: Identifying the Challenges 1.0 Are we even allowed to move the records? 2.0 Maintaining Legal Control 3.0 From Storage
KENYA NATIONAL BUREAU OF STATISTICS RISK MANAGEMENT POLICY
KENYA NATIONAL BUREAU OF STATISTICS RISK MANAGEMENT POLICY SEPTEMBER 2009 Table of Contents Pg No. FOREWARD... ii PREFACE...iii CHAPTER ONE... 1 INTRODUCTION... 1 1.0 Background... 1 1.1 KNBS policy statement...
STANDARDS PROGRAM For Canada s Charities & Nonprofits
STANDARDS PROGRAM For Canada s Charities & Nonprofits Revised October 2014 Lions Foundation of Canada Dog Guides SickKids Foundation World Vision Enhancing governance and effectiveness Founding and presenting
Managing in a Litigious World. Anna Elento-Sneed Alston Hunt Floyd & Ing
Managing in a Litigious World Anna Elento-Sneed Alston Hunt Floyd & Ing Discussion Topics Current trends in employment litigation Management s responsibilities Ten tips for managing employment litigation
Anti-Bribery and Corruption Policy (including Gifts and Hospitality)
Anti-Bribery and Corruption Policy (including Gifts and Hospitality) Royal Mail Group has a strict zero tolerance policy towards bribery and corruption. This policy sets out the standards of behaviour
Anti-Bribery and Corruption Policy
Newcrest strictly prohibits bribery and other unlawful or improper payments made to any individual or entity, as outlined in this Anti-Bribery & Corruption Policy. Newcrest's Anti- Bribery & Corruption
THE SOUTH AFRICAN HERITAGE RESOURCES AGENCY ENTERPRISE RISK MANAGEMENT FRAMEWORK
THE SOUTH AFRICAN HERITAGE RESOURCES AGENCY ENTERPRISE RISK MANAGEMENT FRAMEWORK ACCOUNTABLE SIGNATURE AUTHORISED for implementation SIGNATURE On behalf of Chief Executive Officer SAHRA Council Date Date
In this document you will find additional information on each plug in by clicking the appropriate box.
Today we present you the latest version of the Talent Management Roadmap. Two mindsets on sustainable HR were added: - Corporate Social Responsibility - Business Model In this document you will find additional
The potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
Objective Oriented Planning Module 1. Stakeholder Analysis
III. Stakeholder Analysis Stakeholders are people, groups, or institutions, which are likely to be affected by a proposed project (either negatively or positively), or those which can affect the outcome
POLICY SUBJECT: EFFECTIVE DATE: 5/31/2013. To be reviewed at least annually by the Ethics & Compliance Committee COMPLIANCE PLAN OVERVIEW
Compliance Policy Number 1 POLICY SUBJECT: EFFECTIVE DATE: 5/31/2013 Compliance Plan To be reviewed at least annually by the Ethics & Compliance Committee COMPLIANCE PLAN OVERVIEW Sound Inpatient Physicians,
The guidance 2. Guidance on professional conduct for nursing and midwifery students. Your guide to practice
The guidance 2 Guidance on professional conduct for nursing and midwifery students Your guide to practice The Nursing & Midwifery Council Vision, mission and values Our vision To safeguard the public by
Corporate Code of Ethics
FERROVIAL CORPORATE CODE OF ETHICS Corporate Code of Ethics Our complete commitment to the ethics and integrity of our workforce highlights us as a serious company committed to its stakeholders interests.
Financial Services Regulatory Commission Antigua and Barbuda Division of Gaming Customer Due Diligence Guidelines for
Division of Gaming Customer Due Diligence Guidelines for Interactive Gaming & Interactive Wagering Companies November 2005 Customer Due Diligence for Interactive Gaming & Interactive Wagering Companies
Cyber Risks in the Boardroom
Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing
The Role of Internal Audit in Risk Governance
The Role of Internal Audit in Risk Governance How Organizations Are Positioning the Internal Audit Function to Support Their Approach to Risk Management Executive summary Risk is inherent in running any
Institutional Policy. Tackling the risk: Handicap International s Safety and Security Policy. Federal Executive Division 2012 IP 05
Institutional Policy Tackling the risk: Handicap International s Safety and Security Policy Federal Executive Division 2012 IP 05 Institutional Policy Tackling the risk: Handicap International s Safety
Sobel & Co. s Nonprofit and Social Services Group presents. Your Organization is Vulnerable: The Facts About Nonprofits and Fraud
Sobel & Co. s Nonprofit and Social Services Group presents Your Organization is Vulnerable: The Facts About Nonprofits and Fraud Why Smart People Do Dumb Things If you are above average intelligence -
LATEST ON THE DODD-FRANK ACT AND INTERNATIONAL COMPLIANCE RISKS
Missouri Bar Annual Meeting, September 12, 2014 LATEST ON THE DODD-FRANK ACT AND INTERNATIONAL COMPLIANCE RISKS Presented by: Jennafer Watson, Chief Compliance Officer Layne Christensen Company Emmanuel
WHISTLE BLOWING GUIDELINES FOR PENSIONS
PenCom WHISTLE BLOWING GUIDELINES FOR PENSIONS RR/P&R/08/014 www.pencom.gov.ng About this Guideline The Whistle Blowing Guideline for Pensions is divided into six (6) sections. Section one is the introduction,
An Organizational Ethics Decision-Making Process
The management team of Memorial Medical Center must make a decision regarding the continuation of one of its outpatient clinics. To provide better community service, MMC developed three outpatient clinics
Adopted by the Board of Directors on 23 April 2015 with entry into force as of 24 April 2015. OPERATIONAL RISK MANAGEMENT POLICY
Adopted by the Board of Directors on 23 April 2015 with entry into force as of 24 April 2015. OPERATIONAL RISK MANAGEMENT POLICY 1 Contents 1 Purpose... 3 2 Definition of operational risk and general approach...
Does Fraud Matter? ASIS Middle East Security Conference and Exhibition Dubai, February 16, 2015. Torsten Wolf, CPP Head of Group Security Operations
Does Fraud Matter? ASIS Middle East Security Conference and Exhibition Dubai, February 16, 2015 Torsten Wolf, CPP Head of Group Security Operations Agenda Introduction Economic Crime Landscape Economic
Orange Polska Code of Ethics
Orange Polska Code of Ethics our conviction The fundamental ethical standards and values people should follow in their mutual relations both private and business have been known and unchanging for centuries.
Keren Elazari Hackers: The Internet s Immune System
Keren Elazari Hackers: The Internet s Immune System For the past three decades, hackers have done a lot of things, but they have also impacted civil liberties, innovation and Internet freedom, so I think
Reproductive Medicine Associates of New Jersey, LLC
NOTICE OF PRIVACY PRACTICES Effective Date: September 20, 2013 Last Modified: May 12, 2013 THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO
SUPERVISION GUIDELINE NO. 9 ISSUED UNDER THE AUTHORITY OF THE FINANCIAL INSTITUTIONS ACT 1995 (NO. 1 OF 1995) RISK MANAGEMENT
SUPERVISION GUIDELINE NO. 9 ISSUED UNDER THE AUTHORITY OF THE FINANCIAL INSTITUTIONS ACT 1995 (NO. 1 OF 1995) RISK MANAGEMENT Bank of Guyana July 1, 2009 TABLE OF CONTENTS 1.0 Introduction 2.0 Management
CONDUCTING A RISK ASSESSMENT
CONDUCTING A RISK ASSESSMENT This article should be read in conjunction with the attached Risk Identification Questionnaire and Sample Risk Identification & Assessment Chart. Many firms are preparing for
REGULATIONS ON OPERATIONAL RISK MANAGEMENT OF THE BUDAPEST STOCK EXCHANGE LTD.
REGULATIONS ON OPERATIONAL RISK MANAGEMENT OF THE BUDAPEST STOCK EXCHANGE LTD. Date and number of approval/modification by the Board of Directors: 36/2010 September 15, 2010 No. and date of approval by
The Essential Guide to: Risk Post IPO
S TRATEGIC M ARKETS G ROWTH The Essential Guide to: Risk Post IPO Embracing risk for reward Introduction So you ve made it you have taken your business public. It s been a rollercoaster ride and you have
WHISTLE BLOWING POLICY & PROCEDURES
Management Circular No: GCSL/01.2013 Revised: 01/2014 WHISTLE BLOWING POLICY & PROCEDURES All rights reserved. No part contained in this Policy may be reproduced or copied in any form without the written
Corporate Governance. R esponse. T arget. A ddress. M anagement
S trategy M anagement A ddress R esponse T arget Enforcement of Ethical Business Practices Risk and Crisis Management Code of Conduct Ethical Corporate Culture Strengthening Transparency and Management
august09 tpp 09-05 Internal Audit and Risk Management Policy for the NSW Public Sector OFFICE OF FINANCIAL MANAGEMENT Policy & Guidelines Paper
august09 09-05 Internal Audit and Risk Management Policy for the NSW Public Sector OFFICE OF FINANCIAL MANAGEMENT Policy & Guidelines Paper Preface Corporate governance - which refers broadly to the processes
VENDOR MANAGEMENT. General Overview
VENDOR MANAGEMENT General Overview With many organizations outsourcing services to other third-party entities, the issue of vendor management has become a noted topic in today s business world. Vendor
ASTRAZENECA GLOBAL POLICY SAFETY, HEALTH AND ENVIRONMENT (SHE)
ASTRAZENECA GLOBAL POLICY SAFETY, HEALTH AND ENVIRONMENT (SHE) THIS POLICY SETS OUT HOW WE WILL MEET OUR COMMITMENT TO OPERATING OUR BUSINESS IN A WAY THAT PROTECTS PERSONAL HEALTH, WELLBEING AND SAFETY
Enterprise-Wide Risk Assessment
Enterprise-Wide Risk Assessment Agenda 1. Definition of risk. 2. Risk drivers in higher education today. 3. Implementing an enterprise-wide risk management (ERM) program to effectively assess, manage,
Continuous context-specific protection analysis
KEY ELEMENTS OF RESULTS-BASED PROTECTION A key element is a necessary action to achieve measurable results. Why? Detailed understanding of the risk patterns people experience, as far as possible from their
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
