Compliance Creates Alliance: Internal Compliance Program

Size: px
Start display at page:

Download "Compliance Creates Alliance: Internal Compliance Program"

Transcription

1 Compliance Creates Alliance: Internal Compliance Program By G.C.Y. Gillessen and M.E. Farrell 1 The New World Throughout the world there is a great variety of trade laws and regulations and every company that takes its business abroad is confronted with them. For example, a Dutch company doing business in the United States (U.S.) and in Turkey will have to take into consideration U.S., Dutch, European Union (EU) and Turkish trade laws and regulations. However, for many companies and its compliance officers it can be a daunting task to become and remain compliant with all the laws and regulations that affect their businesses. For example, in recent years, multiple companies and individuals have been heavily penalized, because they were not compliant with all the trade laws and regulations that affected their organization. The penalties they endured ranged from; fines, imprisonment of the involved employees, mandatory compliance audits, and denied export privileges. 2 The biggest challenge that came up in these cases was that being in-control is more than simply meeting the obligations in regards to trade compliance. Companies have to be proactive in implementing changes in regulatory requirements and have to ensure that the measures they take to be compliant are embedded in the day-to-day business operations of their organization. Only by staying ahead of regulatory changes and embedding them in the dayto-day business operations, can a company ensure it remains trade compliant and confidently operate in a globalized business environment. Hence, the purpose of being in-control in the area of trade compliance is more than just meeting legal requirements; it creates trust, and keeps you in business. 3 Step One: The Know-How The first step in becoming trade compliant is, of course, obtaining and understanding all the information about the various trade laws and regulations that affect your company. In the above example, the Dutch company should gain a thorough understanding of the U.S. International Traffic in Arms Regulations 4 and Export Administration Regulations 5 ; EU Export 1 We thank Alexander P. Bosch for his contributions to this article. 2 Recent examples of companies and individuals that are penalized can be found at the websites of the U.S. State Department/Directorate of Defense Trade Controls, the U.S. Department of Commerce/Bureau of Industry and Security, and Anna Wetter, Enforcing European Union Law on Exports of Dual-Use Goods, Stockholm International Peace Research Institute, 2009, (accessed on January 30, 2014). 3 Michael E. Farrell, Welcome to Full Circle Compliance, Full Circle Compliance, December 19, 2013, (accessed on January 30, 2014). 4 U.S. Department of State/Directorate of Defense Trade Controls, International Traffic in Arms Regulations (ITAR), U.S. Department of State/Directorate of Defense Trade Controls, February 11, 2014, (accessed on February 11, 2014). Compliance Creates Alliance: Internal Compliance Program page 1-13

2 Control Regime6; Dutch Strategic Goods Regulation7; and Turkish Export Regime, because all these laws and regulations are involved when it does business in the U.S. and Turkey.8 Hence, obtaining and understanding these trade compliance laws and regulations is the first step in becoming trade compliant. Step Two: The Do-How Only when a company knows how trade compliance laws and regulations affect its business can it take the measures to ensure that it remains compliant with them. The next step then is to embed the measures that have to be taken in order to be compliant in the company s organization in such a way that they become an integral part of the day-to-day business operations. As figure 1 below makes clear, setting up trade compliance requires a significant investment, while improving it to take advantage of the opportunities trade compliance can bring to an organization, requires a decreasing amount of resources. Therefore, it is important to translate the know-how into do-how, because this will ultimately lead to fewer costs and better value from your compliance function. Simply put, investing in trade compliance keeps you in-control and out of trouble. Figure 1. The investment of trade compliance It is this translation from know-how into do-how that proofs to be the most challenging for companies. The main question is: How does one put being and staying trade compliant into U.S. Department of Commerce/Bureau of Industry and Security, Export Administration Regulation Downloadable Files, U.S. Department of Commerce/Bureau of Industry and Security, February 10, 2014, (accessed on February 11, 2014). 6 European Commission, Dual-Use Controls, European Commission, February 7, 2014, (accessed on February 11, 2014). 7 Government of the Netherlands, Export Controls of Strategic Goods, Government of the Netherlands, (accessed on February 11, 2014). 8 Republic of Turkey Ministry of Economy, Export, Republic of Turkey Ministry of Economy, 2012, (accessed on February 11, 2014). 5 Compliance Creates Alliance: Internal Compliance Program page 2-13

3 practice? Trade compliance is inextricably bound up with a company s internal control framework. After all, a company is not in-control if an important part of the company policy is not guaranteed in its systems. However, the accompanying ambition level and managing methods can differ per company. Nonetheless, an efficient Internal Compliance Program (ICP) will transform reactivity into proactivity, create an effective and secure working environment and promote a stronger, more commercially viable business proposition while also creating an auditable environment supporting compliance with regard to dual use and military environments. Such an ICP identifies the relationship between the organizational risks and the internal control measures in the area of trade compliance laws and regulations. This framework or management system should be supported by the right processes and procedures as well as by the necessary awareness, capabilities, attitudes and mindset amongst management and staff members. Nonetheless, there is no off-the-shelf solution that encompasses all the specific requirements and needs that individual companies have. After all, companies differ in the countries they do business in, which means that differing combinations of trade laws and regulations will affect different companies, and companies also differ in the products they produce and export, meaning that trade laws and regulations will have a different effect on companies depending on the product they export. However, FCC has created a framework ICP, based on its experience with the Committee of Sponsoring Organizations of the Treadway Commision (COSO), Export Compliance Management System (ECMS) guidelines and additional guidelines and frameworks, that can be used as a starting ground for building a tailored ICP. Annex A shows how FCC s ICP compares to other ECMS s and guidelines for developing an ICP. FCC s ICP framework allows for the incorporation of a client s specific requirements and needs, which depends on the trade laws and regulations that affect its business and the products, services, and technologies that it exports. 9 Therefore, this framework is ideally suited to be a building ground for tailor made ICP s for different companies, in different industries, producing and exporting different products, services, and technologies. The starting point of FCC s ICP is the five components of COSO: control environment; risk assessment; control activities; information and communication; and monitoring. The reason for this is that the COSO framework can be adapted to different situations and companies. 10 This allows for a flexibility that is lacking in other internal control frameworks. Below each component will be further explained. Control Environment Trade Compliance is more than just being compliant. It creates safety and comfort. The internal environment encompasses the tone of an organization, and sets the basis for how risk is viewed and addressed by an entity s people, including a compliance risk management philosophy and risk appetite, integrity and ethical values, 9 Committee of Sponsoring Organizations of the Treadway Commission, Enterprise Risk Management Integrated Framework, COSO, 2004, (accessed on January 30, 2014). 10 Ibid., 2. Compliance Creates Alliance: Internal Compliance Program page 3-13

4 and the environment in which the organization operates. Moreover, this is supported by a well-organized compliance function. Its role has shifted from that of a mere scorekeeper to that of a real organization partner who at the same time monitors the various trade compliance components. 11 Risk Assessment The purpose of a risk assessment is to identify and analyze the risks involved in achieving a company s objectives. A company s objectives in the area of trade compliance are derived from specific laws and regulations, as well as standard agreements and licenses. 12 The management of an organization should clearly establish what these objectives are, because only then can it be determined what the risks are to fulfilling these objectives. Any effective ICP should incorporate the assessment and analysis of potential risks, and consider their likelihood and impact on the fulfillment of a company s objectives. Moreover, the risk assessment should serve as a basis for determining how the risks should be managed and how the ICP could be made more effective. 13 Control Activities Policies and procedures are established and implemented to help ensure the risk responses are effectively carried out. Control activities are represented by detailed, physical process documentation as well as a wealth of knowledge gained related to the importance and workings of the organization s business processes (logistics, warehousing, production, Research & Development (R&D), etc.). Possible control activities are: screening, classification, and training. 14 Information and Communication Relevant information must be identified, captured, and communicated in a form and timeframe that enables people to carry out their responsibilities in a compliant manner. In order to do so, organizations have turned, for example to the Transglobal Secure Collaboration Program (TSCP) or cloud computing. TSCP provides in common business language collaboration across the Defense and Aerospace Industry and examines areas, such as identity management, certification and accreditation, privacy, information security, physical security and encryption. This way information can be effectively captured and communicated. 15 In addition, cloud computing provides companies both with an opportunity to spread relevant information quickly throughout its operations, but it provides difficulties in the sense that cloud computing can be difficult to monitor and securitize. The need to resort to means to effectively identify, capture, and communicate changes in laws and regulations become even more relevant when changes laws and regulations 11 Committee of Sponsoring Organizations of the Treadway Commission, Enterprise Risk Management Integrated Framework, COSO, 2004, (accessed on January 30, 2014) Examples of standard agreements are: License and Option Agreements (LOA s), Memorandum of Understandings (MOU s), Technical Assistance Agreements (TAA s), Manufacturing License Agreements (MLA s), Department of State Policies (DSP s), and EU General Export Authorizations. 13 Committee of Sponsoring Organizations of the Treadway Commission, Enterprise Risk Management Integrated Framework, COSO, 2004, (accessed on January 30, 2014), Ibid., Transglobal Secure Collaboration Program, Mission & Vision, TSCP, 2013, (accessed on February 11, 2014). Compliance Creates Alliance: Internal Compliance Program page 4-13

5 occur quickly in succession, such as in the current U.S. Export Control Reform Initiative (ECRI). ECRI changes the U.S. Export Control system quickly and in a very significant way. Therefore, companies must identify the changes it brings at the earliest possibility and determine its affects upon its business operations as quickly as possible and clearly and coherently communicated throughout the company so that all employees are able to perform their responsibilities in a compliant manner. Furthermore, effective communication also occurs in a broader sense, flowing down, across, and up the organization.16 Monitoring Compliance begins at the top and starts at the bottom. The entirety of an ICP is monitored and modifications are made as necessary. Monitoring is accomplished through ongoing management activities, separate evaluations, or both. You get what you measure. 17 Figure 2. COSO Internal Control Framework The cube shown in figure 2 makes clear that the five COSO components are only the beginning of setting-up an ICP. In addition, a wide variety of other factors have to be taken into account in the establishment of an ICP, because they too play a dynamic role in becoming and remain trade compliant. Incorporating the interdependency between the components of the COSO model, the applicable laws and regulations and the company s Committee of Sponsoring Organizations of the Treadway Commission, Enterprise Risk Management Integrated Framework, COSO, 2004, (accessed on January 30, 2014), Ibid., Compliance Creates Alliance: Internal Compliance Program page 5-13

6 organization is key in establishing an effective ICP, because it incorporates different views and ways of dealing with being compliant. Hence, an ICP is not strictly a serial process, where one component affects only the next. It is a multidirectional, iterative process in which almost any component can and will influence another. FCC has determined ten elements that provide guidance in setting-up an effective ICP. Below the ten elements on the top axis will be further elaborated upon, as they require additional explanation. Management Commitment: The single most important aspect of an effective ICP is senior Management Commitment. A strong and unquestioned commitment of senior management is essential to a successful ICP and should include: communicating the commitment; active involvement senior management; providing and assigning resources to develop and implement the system; and evaluating the functioning of the system. In other words, senior management must effectively communicate its strong and unyielding commitment to export compliance to all employees in a written policy statement that is clear. Moreover, management must provide sufficient resources (time, money and quality export compliance personnel) to develop and implement the ICP. In addition, senior management must take an active role in evaluating the functioning of the system. Audits must be conducted and employees must be encouraged to report suspected violations and procedures for such reports should be developed and implemented. Compliance standards should be enforced and actions should be taken to prevent and detect violations in the future. Compliance Organization: A compliance function must be set up and staff should be assigned to the compliance function to make sure that the ICP can work. Therefore, organizational charts that clearly describe the authority, function and duties of key persons in the day-to-day export compliance should be created and updated on a regular basis. Management must ensure that a sufficient number of personnel are dedicated to export compliance functions. Knowledgeable back-up personnel that can maintain the compliance function in the absence of key persons should be assigned and a contact list should be available that includes at least name, title, and phone number of all key persons and backup export compliance personnel. Management should also provide incentives to recruit, train and motivate quality export compliance personnel and should structure pay scales, bonuses, evaluations and promotions. Export compliance personnel should be positioned at the appropriate levels to enforce export compliance. Compliance Creates Alliance: Internal Compliance Program page 6-13

7 Risk Assessment: Through adequate risk assessments the organization will be able to manage trade compliance risks. Such a risk assessment would identify risks, monitor the occurrence of these risks, assess the implications and ensure timely reporting to the board. Examples of export control risks are: The risk that as a result of inadequate internal communication with respect to export control, employees exchange data (i.e. with third parties) without the required license; The risk that management due to inadequate reporting procedures, are not sufficiently informed with regard to non-compliance with export regulations; The chance that staff consider export control as not important due to unclear roles and responsibilities of the internal compliance organization; The risk that legal requirements are not fully understood and insufficiently incorporated due to limited resources (time, money, people); Insufficient know-how to perform export control tasks due to insufficient training of staff; The risk that due to failure to retain end use statements, export control rules are not complied with; Policies & Procedures: Policies and procedures are the moving parts of the framework. This is where corporate strategy translates into policies. In turn, policies consist of processes. Processes consist of procedures and at the most detailed level of work instructions. This is where the work actually gets done and how. Therefore, having established effectively policies & procedures is vital to being and staying trade compliant. Contract Management & License Applications: Contract Management is about the processes and requirements applicable to external parties that deal with the business. It is very important that export compliance begins at all the interfaces the company has with other parties, i.e. it may apply to the entire supply chain. The reason for this is that trade compliance is more than just being trade compliant yourself; you have to make sure that the other parties you do business with are compliant as well. Screening: Screening refers to the screening of personnel, customers, suppliers, subcontractors or any other parties dealing with your organization. It also includes reviewing your exports and reexports and making sure that deemed exports do not take place. The questions address the effectiveness of your screening procedures and how these procedures are adaptable to a changing regulatory environment. Training and Communication: Communication about trade compliance is a key ingredient in the export organization. Without proper communication on trade compliance, an ICP is ineffective, because no one in your organization knows what it must do or not do in order to stay compliant. Compliance Creates Alliance: Internal Compliance Program page 7-13

8 Training programs can assist in communicating clearly about trade compliance. The reason is that substantively informed personnel lower the likelihood that violations will occur. Therefore, a training program (including frequent refresher and update) and training records should be in place to ensure this. Qualified trade compliance personnel or external trade compliance specialists must conduct the training programs to ensure that your personnel gets the most of their training. In addition, trainers have to bridge the gap between the legal languages of regulations and the language that is familiar to the company. The training program should create further trade compliance awareness to all personnel. An intermediate training program for personnel who regularly deal with export control issues should be developed based on the specific job functions of the attendees. Furthermore, a company should provide an advanced training program to internal trainers and personnel who frequently deal with export control compliance. After a training program, a company could decide to test personnel for basic comprehension of trade compliance issues. Training materials should be developed as a collaborative effort. Memoranda, newsletters or s should be sent to personnel periodically reaffirming the company s requirements and advising personnel of any changes to export control regulations or the company s policies or procedures. Physical / IT Security: The security environment refers to the physical and IT security measures taken in the organization. This element includes appointing security officers, controlled access to locations and IT along with back-up procedures. A special focus should be given to cyber security and cloud computing as they bring new challenges to being and remaining trade compliant. Recordkeeping: A properly functioning documentation and recordkeeping system is an essential part of any control management system, specifically when your company may be required to present data about past transactions to the authorities. Because of the complexity of trade law and regulations, guidance must be given to personnel on how to properly maintain and preserve the integrity of pertinent records. These practices should be incorporated into existing recordkeeping and business systems to the extent possible. Specific export-related recordkeeping procedures should be developed and implemented. For example, recordkeeping procedures for certain communication with foreign nationals and certain communication with government officials must be clearly established. The company should be able to retrieve any required documents within 48 hours of request for retrieval. Compliance Creates Alliance: Internal Compliance Program page 8-13

9 Compliance Audits: A comprehensive audit system is a necessary element of any ICP. A comprehensive audit system is the way your company will be able to evaluate and continuously improve its ICP. Internal assessments can successfully focus management attention on risk areas at an early stage affording the opportunity to correct the deficiencies before they result in major problems. These internal audits should focus both on the trade compliance process and the specific export transactions of the company to ensure that it is complying with existing procedures. To be effective, audits results must be reported appropriately. To be able to implement audit recommendations arising from the audits, clear responsibilities must be assigned. Handling Violations & Voluntary Self-Disclosures: Although organizations are not mandated to make voluntary disclosures, the authorities will usually consider an organization s filing of a voluntary disclosure as a mitigating factor in determining any penalties or other enforcement actions against an organization. An organization s failure to voluntary discloses violations with legislation may be viewed as an aggravating factor, particularly in case of willful, knowing or repeated violations. Therefore, organizations must have a clear procedure in place on how it will handle violations and do voluntary disclosures. It is the combination of the five COSO components, the ten elements, a company s organization, and the applicable trade laws and regulations that ensure that an ICP is effective and keeps your organization in-control. The incorporation of all these factors in FCC s ICP framework make that it is flexible, inclusive, and provides you with the confidence that your organization is and will remain in-control in regards to trade compliance. Conclusion Companies and compliance officers have found it difficult to comply with all the trade laws and regulations that affect their organizations. The result being that multiple organizations have been penalized in recent years, because they were not in-control in regards to being trade compliant. The main reason for not being in-control was that these companies failed to embed their knowledge of trade laws and regulations into their organization s day-to-day business operations. In order to assist organizations in becoming and staying in-control in regards to trade compliance, FCC has developed an ICP framework. FCC s ICP framework has proven to be an ideal platform for building customized ICP s for its customers, because it allows for the incorporation of an organization s specific requirements and needs in changing regulatory environments. Moreover, if your company already has an ICP in place, FCC can assess your company s ICP against the framework. This benchmark test helps your company to determine its compliance risks and allows it to take the necessary measures to enhance its ICP. Whether your company needs to build an ICP from scratch or wants to ensure that its current ICP is effective enough, using FCC s ICP framework allows your company to be in-control in the area of trade compliance, which minimizes compliance risks and provides a solid foundation to confidently do business around the world. Compliance Creates Alliance: Internal Compliance Program page 9-13

10 Annex A: ICP Framework Comparison Compliance Creates Alliance: Internal Compliance Program page 10-13

11 Key to Table FCC: Internal Control Program Framework BIS: Compliance Guidelines 18 CEEC: Best Practices for Export Controls 19 CIS: Common Industry Standards for European Aerospace and Defence 20 COBIT: Framework for IT Governance and Control 21 COSO: Internal Control Integrated Framework 22 DDTC: Compliance Program Guidelines 23 FCPA: Good Practice Foreign Corrupt Practices Act Compliance 24 FSG: U.S. Federal Sentencing Guidelines 25 GPA JSF: Global Project Authorization for Joint Strike Fighter 26 NW: Nunn-Wolfowitz Task Force Report 27 OECD-B: OECD Business Approaches to Combating Corrupt Practices 28 OECD-G: OECD Guidelines for Multi-national Enterprises 29 UK: Adequate Procedures Per New UK Bribery Act 30 Woolf: Business Ethics, Global Companies and the Defence Industry from the Woolf Committee U.S. Department of Commerce/Bureau of Industry and Security, Compliance Guidelines: How to Develop an Effective Export Management and Compliance Program and Manual, Bureau of Industry and Security, June 2011, (accessed on July 31, 2013). 19 Coalition for Excellence in Export Compliance, Best Practices, CEEC, (accessed on October 9, 2013). 20 Aerospace and Defence Industries Association of Europe, Common Industry Standards for European Aerospace and Defence, ASD, April 26, 2007, Common-Industry-Standards.pdf (accessed on July 31, 2013). 21 IT Governance Institute, COBIT 4.1: Framework for IT Governance and Control Excerpt, ISACA, 2007, (accessed on July 31, 2013). 22 Committee of Sponsoring Organizations of the Treadway Commission, Enterprise Risk Management Integrated Framework, COSO, 2004, (accessed on January 30, 2014). 23 U.S. Department of State/Directorate of Defense Trade Controls, Compliance Program Guidelines, Directorate of Defense Trade Controls, (accessed on July 31, 2013). 24 Criminal Division of the U.S. Department of Justice and the Enforcement Division of the U.S. Securities and Exchange Commission, FCPA: A Resource Guide to the U.S. Foreign Corrupt Practices Act, U.S. Department of Justice, Nov. 14, 2012, (accessed on October ). 25 The District of Columbia Sentencing and Criminal Code Revision Commission, Voluntary Sentencing Guidelines Manual, DC Sentencing and Criminal Code Revision Commission, June 18, 2012, (accessed on Sept 2, 2013). 26 U.S. Department of State, Global Project Authorization (GPA) for Joint Strike Fighter Program SDD Phase GC (Washington: GPO, 2002). 27 Nunn-Wolfowitz Task Force, Nunn-Wolfowitz Task Foce Report: Industry Best Practices Regarding Export Compliance Programs, King & Spalding, July 25, 2000, (accessed on July 31, 2013). 28 The Organisation for Economic Co-operation and Development (OECD), Business Approaches to Combatting Corrupt Practices, June 2003, (accessed on July 31, 2013). 29 The Organisation for Economic Co-operation and Development (OECD), OECD Guidelines for Multinational Enterprises, May 25, 2011, (accessed on Sept. 2, 2013). 30 UK Government, Bribery Act 2010, Legislation.gov.uk, April 8, 2010, (accessed on Sept ). 31 Woolf Committee, Business Ethics, Global Companies and the Defence Industry. Ethical business conduct in BAE System plc the way forward, BAE Systems, May 8, 2008, (accessed on July 31, 2013). Compliance Creates Alliance: Internal Compliance Program page 11-13

12 Bibliography Aerospace and Defence Industries Association of Europe. Common Industry Standards for European Aerospace and Defence. ASD. April 26, europe.org/fileadmin/user_upload/client_documents/dolores/asd-common- Industry-Standards.pdf (accessed on July 31, 2013). Coalition for Excellence in Export Compliance. Best Practices. CEEC. (accessed on October 9, 2013). Committee of Sponsoring Organizations of the Treadway Commission. Enterprise Risk Management Integrated Framework. COSO (accessed on January 30, 2014). Criminal Division of the US Department of Justice and the Enforcement Division of the US Securities and Exchange Commission. FCPA: A Resource Guide to the US Foreign Corrupt Practices Act. US Department of Justice, November 14, (accessed on September 14, 2013). District of Columbia Sentencing and Criminal Code Revision Commission. Voluntary Sentencing Guidelines Manual. DC Sentencing and Criminal Code Revision Commission. June 18, (accessed on July 31, 2013). European Commission. Dual-Use Controls. European Commission. February 7, (accessed on February 11, 2014). Farrell, Michael E. Welcome to Full Circle Compliance. Full Circle Compliance. December 19, (accessed on January 30, 2014). Government of the Netherlands. Export Controls of Strategic Goods. Government of the Netherlands. (accessed on February 11, 2014). IT Governance Institute. COBIT 4.1: Framework for IT Governance and Control Excerpt. ISACA (accessed on July 31, 2013). Nunn-Wolfowitz Task Force. Nunn-Wolfowitz Task Foce Report: Industry Best Practices Regarding Export Compliance Programs. King & Spalding. July 25, (accessed on July 31, 2013). Organisation for Economic Co-operation and Development (OECD). OECD Guidelines for Multinational Enterprises. OECD, May 25, (accessed on July 31, 2013). Organisation for Economic Co-operation and Development (OECD). Business Approaches to Combatting Corrupt Practices. OECD. June (accessed on July 31, 2013). Compliance Creates Alliance: Internal Compliance Program page 12-13

13 Republic of Turkey Ministry of Economy. Export. Republic of Turkey Ministry of Economy (accessed on February 11, 2014). Transglobal Secure Collaboration Program. Mission & Vision. TSCP (accessed on February 11, 2014). UK Government. Bribery Act Legislation.gov.uk. April 8, (accessed on Sept ). U.S. Department of Commerce/Bureau of Industry and Security. Compliance Guidelines: How to Develop an Effective Export Management and Compliance Program and Manual. Bureau of Industry and Security. June (accessed on July 31, 2013). U.S. Department of Commerce/Bureau of Industry and Security. Export Administration Regulation Downloadable Files. U.S. Department of Commerce/Bureau of Industry and Security. February 10, (accessed on February 11, 2014). U.S. Department of State/Directorate of Defense Trade Controls. Compliance Program Guidelines. Directorate of Defense Trade Controls. (accessed on July 31, 2013). U.S. Department of State/Directorate of Defense Trade Controls. The International Traffic in Arms Regulation (ITAR). U.S. Department of State/Directorate of Defense Trade Controls. February 11, (accessed on February 11, 2014). U.S. Department of State. Global Project Authorization (GPA) for Joint Strike Fighter Program SDD Phase GC Washington: GPO, Wetter, Anna. Enforcing European Union Law on Exports of Dual-Use Goods. Stockholm International Peace Research Institute (accessed on January 30, 2014). Woolf Committee. Business Ethics, Global Companies and the Defence Industry. BAE Systems, May 8, (accessed on July 31, 2013). Compliance Creates Alliance: Internal Compliance Program page 13-13

The Fraud Section's Foreign Corrupt Practices Act Enforcement Plan and Guidancel

The Fraud Section's Foreign Corrupt Practices Act Enforcement Plan and Guidancel U.S. Department of Justice Criminal Division Fraud Section Washington, D.C. 20530 The Fraud Section's Foreign Corrupt Practices Act Enforcement Plan and Guidancel Bribery of foreign officials to gain or

More information

A Primer on U.S. Export Controls

A Primer on U.S. Export Controls A Primer on U.S. Export Controls Presentation for the Pacific Northwest Defense Coalition By Akana K.J. Ma Partner, Ater Wynne LLP 16 July 2013 (503) 226-8489/[email protected] Akana K.J. Ma 2013 All Rights

More information

Key Elements of International Trade Compliance. Presented by:

Key Elements of International Trade Compliance. Presented by: Key Elements of International Trade Compliance Presented by: International Business Transactions International Civil Litigation 2 I. Introduction Every international shipment implicates at least TWO legal

More information

Export Controls and Cloud Computing: Legal Risks

Export Controls and Cloud Computing: Legal Risks Presenting a live 90-minute webinar with interactive Q&A Export Controls and Cloud Computing: Legal Risks Complying with ITAR, EAR and Sanctions Laws When Using Cloud Storage and Services TUESDAY, APRIL

More information

Protecting the Value of Your Transaction y

Protecting the Value of Your Transaction y International Trade Due Diligence: Protecting the Value of Your Transaction y by Megan A. Gajewski, Susan M.C. Kovarovics, Michael D. Mellen and Christina A. Zanette You just closed a deal for your client,

More information

CCBE RESPONSE REGARDING THE EUROPEAN COMMISSION PUBLIC CONSULTATION ON CLOUD COMPUTING

CCBE RESPONSE REGARDING THE EUROPEAN COMMISSION PUBLIC CONSULTATION ON CLOUD COMPUTING CCBE RESPONSE REGARDING THE EUROPEAN COMMISSION PUBLIC CONSULTATION ON CLOUD COMPUTING CCBE response regarding the European Commission Public Consultation on Cloud Computing The Council of Bars and Law

More information

Welcome to the World of Public Cloud Collaboration Allowing Enhanced Security

Welcome to the World of Public Cloud Collaboration Allowing Enhanced Security Whitepaper Welcome to the World of Public Cloud Collaboration Allowing Enhanced Security A New, More Secure, and More Efficient Approach to Storage, Management and Collaboration for ITAR-defined Technical

More information

Understanding Enterprise Risk Management. Presented by Dorothy Gjerdrum Arthur J Gallagher

Understanding Enterprise Risk Management. Presented by Dorothy Gjerdrum Arthur J Gallagher Understanding Enterprise Risk Management Presented by Dorothy Gjerdrum Arthur J Gallagher Learning Objectives Understand the components of a wellrun ERM program Review scope and process Explore the role

More information

SECTION B DEFINITION, PURPOSE, INDEPENDENCE AND NATURE OF WORK OF INTERNAL AUDIT

SECTION B DEFINITION, PURPOSE, INDEPENDENCE AND NATURE OF WORK OF INTERNAL AUDIT SECTION B DEFINITION, PURPOSE, INDEPENDENCE AND NATURE OF WORK OF INTERNAL AUDIT Through CGIAR Financial Guideline No 3 Auditing Guidelines Manual the CGIAR has adopted the IIA Definition of internal auditing

More information

white paper Mitigate Risk in Handling ediscovery Data Subject to the U.S. Export Control Laws and Regulations

white paper Mitigate Risk in Handling ediscovery Data Subject to the U.S. Export Control Laws and Regulations white paper Mitigate Risk in Handling ediscovery Data Subject to the U.S. Export Control Laws and Regulations WWW.EPIQSYSTEMS.COM 800 314 5550 Mitigate Risk in Handling ediscovery Data Subject to the U.S.

More information

COMPUTER & INTERNET. Westlaw Journal. Expert Analysis Software Development and U.S. Export Controls

COMPUTER & INTERNET. Westlaw Journal. Expert Analysis Software Development and U.S. Export Controls Westlaw Journal COMPUTER & INTERNET Litigation News and Analysis Legislation Regulation Expert Commentary VOLUME 31, ISSUE 1 / JUNE 13, 2013 Expert Analysis Software Development and U.S. Export Controls

More information

Sarbanes-Oxley Control Transformation Through Automation

Sarbanes-Oxley Control Transformation Through Automation Sarbanes-Oxley Control Transformation Through Automation An Executive White Paper By BLUE LANCE, Inc. Where have we been? Where are we going? BLUE LANCE INC. www.bluelance.com 713.255.4800 [email protected]

More information

ENTERPRISE RISK MANAGEMENT POLICY

ENTERPRISE RISK MANAGEMENT POLICY ENTERPRISE RISK MANAGEMENT POLICY TITLE OF POLICY POLICY OWNER POLICY CHAMPION DOCUMENT HISTORY: Policy Title Status Enterprise Risk Management Policy (current, revised, no change, redundant) Approving

More information

Framework-Document of 10 February 2012 on Antitrust Compliance Programmes

Framework-Document of 10 February 2012 on Antitrust Compliance Programmes RÉPUBLIQUE FRANÇAISE Framework-Document of 10 February 2012 on Antitrust Compliance Programmes Compliance programmes are instruments that enable economic players to increase their chances of avoiding breaches

More information

The ITAR and the FCPA: What You Disclose May Hurt You. October 7, 2014

The ITAR and the FCPA: What You Disclose May Hurt You. October 7, 2014 The ITAR and the FCPA: What You Disclose May Hurt You October 7, 2014 Presenters Mark Srere Bryan Cave LLP Susan Kovarovics Bryan Cave LLP 2 Agenda Background on the FCPA Background on ITAR ITAR Part 129

More information

FOREIGN CORRUPT PRACTICES ACT POLICY for PROJECT PROFESSIONALS GROUP PTY. LTD.

FOREIGN CORRUPT PRACTICES ACT POLICY for PROJECT PROFESSIONALS GROUP PTY. LTD. FOREIGN CORRUPT PRACTICES ACT POLICY for PROJECT PROFESSIONALS GROUP PTY. LTD. 1.0 Purpose and Scope of this Manual The purpose of this Policy is to ensure compliance by Project Professionals Group Pty.

More information

Cyberprivacy and Cybersecurity for Health Data

Cyberprivacy and Cybersecurity for Health Data Experience the commitment Cyberprivacy and Cybersecurity for Health Data Building confidence in health systems Providing better health care quality at lower cost will be the key aim of all health economies

More information

005ASubmission to the Serious Data Breach Notification Consultation

005ASubmission to the Serious Data Breach Notification Consultation 005ASubmission to the Serious Data Breach Notification Consultation (Consultation closes 4 March 2016 please send electronic submissions to [email protected]) Your details Name/organisation

More information

Addressing ITAR compliance with Teamcenter

Addressing ITAR compliance with Teamcenter Addressing ITAR compliance with Teamcenter White Paper Providing a framework for managing export control Teamcenter software enables companies to securely manage sensitive information and other highly

More information

Internal Auditing Guidelines

Internal Auditing Guidelines Internal Auditing Guidelines Recommendations on Internal Auditing for Lottery Operators Issued by the WLA Security and Risk Management Committee V1.0, March 2007 The WLA Internal Auditing Guidelines may

More information

LATEST ON THE DODD-FRANK ACT AND INTERNATIONAL COMPLIANCE RISKS

LATEST ON THE DODD-FRANK ACT AND INTERNATIONAL COMPLIANCE RISKS Missouri Bar Annual Meeting, September 12, 2014 LATEST ON THE DODD-FRANK ACT AND INTERNATIONAL COMPLIANCE RISKS Presented by: Jennafer Watson, Chief Compliance Officer Layne Christensen Company Emmanuel

More information

GAO. Standards for Internal Control in the Federal Government. Internal Control. United States General Accounting Office.

GAO. Standards for Internal Control in the Federal Government. Internal Control. United States General Accounting Office. GAO United States General Accounting Office Internal Control November 1999 Standards for Internal Control in the Federal Government GAO/AIMD-00-21.3.1 Foreword Federal policymakers and program managers

More information

Code of Conduct Sourcing & Supply Chain FAU-F-SPG-2400/EN

Code of Conduct Sourcing & Supply Chain FAU-F-SPG-2400/EN Code of Conduct Sourcing & Supply Chain FAU-F-SPG-2400/EN Background Faurecia, a global automotive supplier, is committed to growth founded on socially-responsible actions and behaviors in all countries

More information

AN AUDIT OF INTERNAL CONTROL OVER FINANCIAL REPORTING THAT IS INTEGRATED WITH AN AUDIT OF FINANCIAL STATEMENTS:

AN AUDIT OF INTERNAL CONTROL OVER FINANCIAL REPORTING THAT IS INTEGRATED WITH AN AUDIT OF FINANCIAL STATEMENTS: 1666 K Street, NW Washington, D.C. 20006 Telephone: (202) 207-9100 Facsimile: (202) 862-8430 www.pcaobus.org STAFF VIEWS AN AUDIT OF INTERNAL CONTROL OVER FINANCIAL REPORTING THAT IS INTEGRATED WITH AN

More information

Governance, Risk and Compliance Charter

Governance, Risk and Compliance Charter Governance, Risk and Compliance Charter Charter Owner Director GRC Charter Approver Board of Management Effective date November 15 th, 2013 Date of issue Version Name Title 15 Nov 2013 1.0 Fokko Kool Group

More information

Bossier Parish Community College

Bossier Parish Community College Bossier Parish Community College Department of Cyber Information Technology Welcome to the Program! Network Security & Networking Tracks Code of Conduct This marks the beginning of your journey through

More information

1-2 Corporate Compliance Practice Guide 2.03. Corporate Compliance Practice Guide

1-2 Corporate Compliance Practice Guide 2.03. Corporate Compliance Practice Guide 1-2 Corporate Compliance Practice Guide 2.03 Corporate Compliance Practice Guide Copyright 2009, Matthew Bender & Company, Inc., a member of the LexisNexis Group. Chapter 2 Creating a Basic Compliance

More information

Global Compliance Audit

Global Compliance Audit WHITE PAPER Global Compliance Audit Understanding the Critical Importance of FCPA and Export Management Compliance 333 Route 46 West Suite 200 Mountain Lakes, NJ 07046 1.866.611.7874 973.808.3366 fax 973.227.1873

More information

WMACCA Small Law Department Initiative. Scaling a Compliance Program To Your Organization And Small Law Department

WMACCA Small Law Department Initiative. Scaling a Compliance Program To Your Organization And Small Law Department WMACCA Small Law Department Initiative Scaling a Compliance Program To Your Organization And Small Law Department Michael C. Hardy, II Womble Carlyle Sandridge & Rice, LLP [email protected] 410.545.5873

More information

Data Protection in Clinical Studies Implications of the New EU General Data Protection Regulation

Data Protection in Clinical Studies Implications of the New EU General Data Protection Regulation June 19, 2012 Practice Group(s): Health Care Life Sciences Data Protection in Clinical Studies Implications of the New EU General Data Protection Regulation By Mathias Schulze Steinen and Daniela Bohn

More information

BUILDING AN EFFECTIVE COMPLIANCE AND ETHICS PROGRAM

BUILDING AN EFFECTIVE COMPLIANCE AND ETHICS PROGRAM BUILDING AN EFFECTIVE COMPLIANCE AND ETHICS PROGRAM IN THE BEGINNING Building an Effective Compliance and Ethics Program 1. Why have a compliance and ethics program? 2. What are the critical building blocks?

More information

Trade Compliance & Exports

Trade Compliance & Exports Trade Compliance & Exports GETTING MAXIMUM RESULTS WITH LIMITED RESOURCES CREATING A PRACTICAL, RISK-BASED TRADE COMPLIANCE PROGRAM Gwendolyn L. Hassan, JD Manager of Corporate Compliance Office of the

More information

Introduction to Braumiller Schulz LLP Why Trade Compliance? Establishing an Internal Compliance Program (ICP) Contracting Services to Outside Experts

Introduction to Braumiller Schulz LLP Why Trade Compliance? Establishing an Internal Compliance Program (ICP) Contracting Services to Outside Experts Olga Torres, Associate Ol T A i t Braumiller Schulz LLP International Trade Law www.globaltradelaw.net Overview Introduction to Braumiller Schulz LLP Why Trade Compliance? Establishing an Internal Compliance

More information

Harvard Export Control Compliance Policy Statement

Harvard Export Control Compliance Policy Statement Harvard Export Control Compliance Policy Statement Harvard University investigators engage in a broad range of innovative and important research both in the United States and overseas. These activities

More information

EXPORT CONTROLS COMPLIANCE

EXPORT CONTROLS COMPLIANCE Responsible University Official: Vice President for Research Responsible Office: Office for Export Controls Compliance Origination Date: May 1, 2014 EXPORT CONTROLS COMPLIANCE Policy Statement Northwestern

More information

EU Data Protection Directive and U.S. Safe Harbor Framework: An Employer Update. By Stephen H. LaCount, Esq.

EU Data Protection Directive and U.S. Safe Harbor Framework: An Employer Update. By Stephen H. LaCount, Esq. EU Data Protection Directive and U.S. Safe Harbor Framework: An Employer Update By Stephen H. LaCount, Esq. Overview The European Union Data Protection Directive 95/46/EC ( Directive ) went effective in

More information

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters When Recognition Matters WHITEPAPER ISO/IEC 27002:2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS www.pecb.com CONTENT 3 4 5 6 6 7 7 7 7 8 8 8 9 9 9

More information

2. u.s. GOVERNMENT AGENCY ACTIONS REGARDING ILLICIT FOREIGN PAYMENTS. Justice Department. Internal Revenue Service. Securities and Exchange Commission

2. u.s. GOVERNMENT AGENCY ACTIONS REGARDING ILLICIT FOREIGN PAYMENTS. Justice Department. Internal Revenue Service. Securities and Exchange Commission 2. u.s. GOVERNMENT AGENCY ACTIONS REGARDING ILLICIT FOREIGN PAYMENTS Justice Department Internal Revenue Service Securities and Exchange Commission State and Defense Departments u.s. GOVERNMENT AGENCY

More information

The Upside of Risk: Enterprise Risk Management and Public Real Estate Companies

The Upside of Risk: Enterprise Risk Management and Public Real Estate Companies The Upside of Risk: Enterprise Risk Management and Public Real Estate Companies James Barkley, Simon Property Group, Inc. and David E. Weiss, DDR Corp. Introduction: As lawyers, particularly real estate

More information

Uncheck Yourself. by Karen Scarfone. Build a Security-First Approach to Avoid Checkbox Compliance. Principal Consultant Scarfone Cybersecurity

Uncheck Yourself. by Karen Scarfone. Build a Security-First Approach to Avoid Checkbox Compliance. Principal Consultant Scarfone Cybersecurity Uncheck Yourself Build a Security-First Approach to Avoid Checkbox Compliance by Karen Scarfone Principal Consultant Scarfone Cybersecurity Sponsored by www.firehost.com (US) +1 844 682 2859 (UK) +44 800

More information

Federal Bureau of Investigation s Integrity and Compliance Program

Federal Bureau of Investigation s Integrity and Compliance Program Evaluation and Inspection Division Federal Bureau of Investigation s Integrity and Compliance Program November 2011 I-2012-001 EXECUTIVE DIGEST In June 2007, the Federal Bureau of Investigation (FBI) established

More information

Sarbanes-Oxley: Beyond. Using compliance requirements to boost business performance. An RIS White Paper Sponsored by:

Sarbanes-Oxley: Beyond. Using compliance requirements to boost business performance. An RIS White Paper Sponsored by: Beyond Sarbanes-Oxley: Using compliance requirements to boost business performance The business regulatory environment in the United States has changed. Public companies have new obligations to report

More information

FORUM ON TAX ADMINISTRATION

FORUM ON TAX ADMINISTRATION ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT FORUM ON TAX ADMINISTRATION Information Note: Tax Compliance and Tax Accounting Systems April 2010 CENTRE FOR TAX POLICY AND ADMINISTRATION TABLE

More information

European Code for Export Compliance

European Code for Export Compliance European Code for Export Compliance EU-CEC European Institute For Export Compliance EU-ECF EU Export Compliance Framework: EU Export Compliance Charter The European Code for Export Compliance EU-CEC 1.

More information

HILLENBRAND, INC. AND SUBSIDIARIES. Global Anti-Corruption Policy Statement and Compliance Guide

HILLENBRAND, INC. AND SUBSIDIARIES. Global Anti-Corruption Policy Statement and Compliance Guide HILLENBRAND, INC. AND SUBSIDIARIES Global Anti-Corruption Policy Statement and Compliance Guide Hillenbrand, Inc., including all of its subsidiaries (referred to collectively as the Company ), maintains

More information

Audit of the Test of Design of Entity-Level Controls

Audit of the Test of Design of Entity-Level Controls Audit of the Test of Design of Entity-Level Controls Canadian Grain Commission Audit & Evaluation Services Final Report March 2012 Canadian Grain Commission 0 Entity Level Controls 2011 Table of Contents

More information

Using Technology Control Plans in Export Compliance. Mary Beran, Georgia Tech David Brady, Virginia Tech

Using Technology Control Plans in Export Compliance. Mary Beran, Georgia Tech David Brady, Virginia Tech Using Technology Control Plans in Export Compliance Mary Beran, Georgia Tech David Brady, Virginia Tech What is a Technology Control Plan (TCP)? The purpose of a TCP is to control the access and dissemination

More information

GAO DEFENSE CONTRACT AUDITS. Actions Needed to Improve DCAA's Access to and Use of Defense Company Internal Audit Reports

GAO DEFENSE CONTRACT AUDITS. Actions Needed to Improve DCAA's Access to and Use of Defense Company Internal Audit Reports GAO United States Government Accountability Office Report to the Committee on Armed Services, U.S. Senate December 2011 DEFENSE CONTRACT AUDITS Actions Needed to Improve DCAA's Access to and Use of Defense

More information

Terms of Reference. Security Specialist (Istanbul, Turkey) Term

Terms of Reference. Security Specialist (Istanbul, Turkey) Term Terms of Reference Job Title: Department / Division: Grade: Job Location: Security Specialist (Istanbul, Turkey) GSDRS GF Istanbul, Turkey Recruitment Type: Appointment Type: Appointment Duration: Posting

More information

On the Setting of the Standards and Practice Standards for. Management Assessment and Audit concerning Internal

On the Setting of the Standards and Practice Standards for. Management Assessment and Audit concerning Internal (Provisional translation) On the Setting of the Standards and Practice Standards for Management Assessment and Audit concerning Internal Control Over Financial Reporting (Council Opinions) Released on

More information

Mitigating and managing cyber risk: ten issues to consider

Mitigating and managing cyber risk: ten issues to consider Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed

More information

Guide to Internal Control Over Financial Reporting

Guide to Internal Control Over Financial Reporting Guide to Internal Control Over Financial Reporting The Center for Audit Quality prepared this Guide to provide an overview for the general public of internal control over financial reporting ( ICFR ).

More information

A Risk-Based Audit Strategy November 2006 Internal Audit Department

A Risk-Based Audit Strategy November 2006 Internal Audit Department Mental Health Mental Retardation Authority of Harris County ENTERPRISE RISK MANAGEMENT A Framework For Assessing, Evaluating And Measuring Our Agency s Risk A Risk-Based Audit Strategy November 2006 Internal

More information

TELEFÓNICA UK LTD. Introduction to Security Policy

TELEFÓNICA UK LTD. Introduction to Security Policy TELEFÓNICA UK LTD Introduction to Security Policy Page 1 of 7 CHANGE HISTORY Version No Date Details Authors/Editor 7.0 1/11/14 Annual review including change control added. Julian Jeffery 8.0 1/11/15

More information

ITAR: Welcome to Public Cloud Collaboration

ITAR: Welcome to Public Cloud Collaboration Whitepaper ITAR: Welcome to Public Cloud Collaboration Updated Guidelines Create New Avenues for Aerospace and Defense Contractors to Share and Store Technical Data www.brainloop.com ITAR Rules Undergo

More information

BDO NORDIC. Investigation, fraud prevention and computer forensics. You can guess. You can assume. Or you can know. And knowing is always better.

BDO NORDIC. Investigation, fraud prevention and computer forensics. You can guess. You can assume. Or you can know. And knowing is always better. BDO NORDIC Investigation, fraud prevention and computer forensics You can guess. You can assume. Or you can know. And knowing is always better. CONTENT OUR SERVICES 3 Investigation - Identifying the facts

More information

University of Sunderland Business Assurance Information Security Policy

University of Sunderland Business Assurance Information Security Policy University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant

More information

Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR 29 2013

Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR 29 2013 Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR 29 2013 Sempra Energy s gas and electric utilities collaborate with industry leaders and a wide range of

More information

Framework for an Aviation Security Management System (SeMS)

Framework for an Aviation Security Management System (SeMS) Framework for an Aviation Security Management System (SeMS) CAP 1223 Civil Aviation Authority 2014 All rights reserved. Copies of this publication may be reproduced for personal use, or for use within

More information

RECORDS MANAGEMENT POLICY

RECORDS MANAGEMENT POLICY RECORDS MANAGEMENT POLICY POLICY STATEMENT The records of Legal Aid NSW are a major component of its corporate memory and risk management strategies. They are a vital asset that support ongoing operations

More information

APEC General Elements of Effective Voluntary Corporate Compliance Programs

APEC General Elements of Effective Voluntary Corporate Compliance Programs 2014/CSOM/041 Agenda Item: 3 APEC General Elements of Effective Voluntary Corporate Compliance Programs Purpose: Consideration Submitted by: United States Concluding Senior Officials Meeting Beijing, China

More information

EU Directive on Network and Information Security SWD(2013) 31 & SWD(2013) 32. A call for views and evidence

EU Directive on Network and Information Security SWD(2013) 31 & SWD(2013) 32. A call for views and evidence EU Directive on Network and Information Security SWD(2013) 31 & SWD(2013) 32 A call for views and evidence 22 nd May 2013 Contents Contents... 2 Overview: The EU Directive on Network and Information Security...

More information

Simplify the Complexity of Managing 3rd Party Anti-Bribery / FCPA Compliance

Simplify the Complexity of Managing 3rd Party Anti-Bribery / FCPA Compliance Simplify the Complexity of Managing 3rd Party Anti-Bribery / FCPA Compliance Arm Stakeholders with Critical Information to Assess 3rd Party Relationships and Comply with the Foreign Corrupt Practices Act

More information

COMPLIANCE CHARTER 1

COMPLIANCE CHARTER 1 COMPLIANCE CHARTER 1 Contents 1. Compliance Policy Statement... 2 2. Purpose... 2 3. Mission and objective of the Directorate: Compliance... 2 3.1 Mission... 2 3.2 Objective... 3 4. Compliance risk management...

More information

Enterprise Risk Management

Enterprise Risk Management Enterprise Risk Management Topic Gateway Series No. 49 1 Prepared by Jasmin Harvey and Technical Information Service July 2008 About Topic Gateways Topic Gateways are intended as a refresher or introduction

More information

Review of the Implementation of IOSCO's Principles for Financial Benchmarks

Review of the Implementation of IOSCO's Principles for Financial Benchmarks Review of the Implementation of IOSCO's Principles for Financial Benchmarks The Board OF THE INTERNATIONAL ORGANIZATION OF SECURITIES COMMISSIONS OR02/2015 FEBRUARY 2015 Copies of publications are available

More information

HIPAA PRIVACY FOR EMPLOYERS A Comprehensive Introduction. HIPAA Privacy Regulations-General

HIPAA PRIVACY FOR EMPLOYERS A Comprehensive Introduction. HIPAA Privacy Regulations-General HIPAA PRIVACY FOR EMPLOYERS A Comprehensive Introduction HIPAA Privacy Regulations-General The final HIPAA Privacy regulation was released on December 20, 2000 and was effective for compliance on April

More information

Information governance strategy 2014-16

Information governance strategy 2014-16 Information Commissioner s Office Information governance strategy 2014-16 Page 1 of 16 Contents 1.0 Executive summary 2.0 Introduction 3.0 ICO s corporate plan 2014-17 4.0 Regulatory environment 5.0 Scope

More information

Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement

Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement Understanding the Entity and Its Environment 1667 AU Section 314 Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement (Supersedes SAS No. 55.) Source: SAS No. 109.

More information

Internal Auditing: Assurance, Insight, and Objectivity

Internal Auditing: Assurance, Insight, and Objectivity Internal Auditing: Assurance, Insight, and Objectivity WHAT IS INTERNAL AUDITING? INTERNAL AUDITING business people all around the world are familiar with the term. But do they understand the value it

More information

PROTECTION OF PERSONAL INFORMATION

PROTECTION OF PERSONAL INFORMATION PROTECTION OF PERSONAL INFORMATION Definitions Privacy Officer - The person within the Goderich Community Credit Union Limited (GCCU) who is responsible for ensuring compliance with privacy obligations,

More information

Briefly summarised, SURFmarket has submitted the following questions to the Dutch DPA:

Briefly summarised, SURFmarket has submitted the following questions to the Dutch DPA: UNOFFICIAL TRANSLATION Written opinion on the application of the Wet bescherming persoonsgegevens [Dutch Data Protection Act] in the case of a contract for cloud computing services from an American provider

More information

Response of the Northern Ireland Human Rights Commission on the Health and Social Care (Control of Data Processing) NIA Bill 52/11-16

Response of the Northern Ireland Human Rights Commission on the Health and Social Care (Control of Data Processing) NIA Bill 52/11-16 Response of the Northern Ireland Human Rights Commission on the Health and Social Care (Control of Data Processing) NIA Bill 52/11-16 Summary The Northern Ireland Human Rights Commission (the Commission):

More information

Internal Audit Manual

Internal Audit Manual COMPTROLLER OF ACCOUNTS Ministry of Finance Government of the Republic of Trinidad Tobago Internal Audit Manual Prepared by the Financial Management Branch, Treasury Division, Ministry of Finance TABLE

More information

Enterprise Risk Management: COSO, New COSO, ISO 31000. Review of ERM

Enterprise Risk Management: COSO, New COSO, ISO 31000. Review of ERM Enterprise Risk Management: COSO, New COSO, Dr. Hugh Van Seaton, Ed. D., CSSGB, CGMA, CPA Review of ERM COSO a process, effected by an entity's board of directors, management and other personnel, applied

More information

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential

More information

Implementing and monitoring effective compliance policies & procedures. charlesrussellspeechlys.com

Implementing and monitoring effective compliance policies & procedures. charlesrussellspeechlys.com Implementing and monitoring effective compliance policies & procedures charlesrussellspeechlys.com Robert Bond Partner Robert Bond has over 36 years' experience in advising national and international clients

More information

The Role of the Board in Enterprise Risk Management

The Role of the Board in Enterprise Risk Management Enterprise Risk The Role of the Board in Enterprise Risk Management The board of directors plays an essential role in ensuring that an effective ERM program is in place. Governance, policy, and assurance

More information

Director of Logistics & Compliance James Hall

Director of Logistics & Compliance James Hall Minimizing Risk Exposure While Fully Utilizing Freight Forwarders Expertise To Effectively Apply Compliance In Challenging Locations Director of Logistics & Compliance James Hall What is Compliance Adherence

More information

Align Technology. Data Protection Binding Corporate Rules Processor Policy. 2014 Align Technology, Inc. All rights reserved.

Align Technology. Data Protection Binding Corporate Rules Processor Policy. 2014 Align Technology, Inc. All rights reserved. Align Technology Data Protection Binding Corporate Rules Processor Policy Confidential Contents INTRODUCTION TO THIS POLICY 3 PART I: BACKGROUND AND ACTIONS 4 PART II: PROCESSOR OBLIGATIONS 6 PART III:

More information

DRAFT. Anti-Bribery and Anti-Corruption Policy. Introduction. Scope. 1. Definitions

DRAFT. Anti-Bribery and Anti-Corruption Policy. Introduction. Scope. 1. Definitions DRAFT Change History: Anti-Bribery and Anti-Corruption Policy Control Risks Group Ltd Commercial in confidence Introduction This document defines Control Risks policy on the avoidance of bribery and corruption.

More information

Principal risks and uncertainties

Principal risks and uncertainties Principal risks and uncertainties Our risk management approach We have a well-established risk management methodology which we use throughout the business to allow us to identify and manage the principal

More information

INFORMATION SECURITY MANAGEMENT POLICY

INFORMATION SECURITY MANAGEMENT POLICY INFORMATION SECURITY MANAGEMENT POLICY Security Classification Level 4 - PUBLIC Version 1.3 Status APPROVED Approval SMT: 27 th April 2010 ISC: 28 th April 2010 Senate: 9 th June 2010 Council: 23 rd June

More information

Elements Of An Effective Export Compliance Program

Elements Of An Effective Export Compliance Program Elements Of An Effective Export Compliance Program Renee Osborne Export Management & Compliance Division Office of Exporter Services Bureau of Industry and Security U.S. Department of Commerce Effective

More information

SCREENING CHAPTER 24 JUSTICE, FREEDOM AND SECURITY AGENDA ITEM 7A: ORGANISED CRIME

SCREENING CHAPTER 24 JUSTICE, FREEDOM AND SECURITY AGENDA ITEM 7A: ORGANISED CRIME 1 SCREENING CHAPTER 24 JUSTICE, FREEDOM AND SECURITY Country Session: Republic of TURKEY 13-15 February 2006 CONTENT -LEGAL BASIS -ORGANISATION -COMBATTING INSTRUMENTS -EXPERTISE AND TRAINING -INTERNATIONAL

More information

MEMORANDUM. Comments on the Updating of the LSC Risk Management Program

MEMORANDUM. Comments on the Updating of the LSC Risk Management Program Office of Inspector General Legal Services Corporation 3333 K Street, NW. 3rd Floor Washington, DC 20007 3558 202.295. 1660 (p) 202.337.6616 (f) www.oig.lsc.gov MEMORANDUM TO: FROM: LSC Audit Committee

More information

Supplier Awareness. Export Control/ ITAR

Supplier Awareness. Export Control/ ITAR Export Control & ITAR Supplier Awareness Export Control/ ITAR THIS INFORMATION IS PROVIDED BY PAR SYSTEMS, INC. ("PAR"). PAR IS NOT A LAW FIRM, AND THE INFORMATION CONTAINED HEREIN IS NOT INTENDED TO BE

More information

Solvency Assessment and Management: Pillar II Sub Committee Governance Task Group Discussion Document 81 (v 3)

Solvency Assessment and Management: Pillar II Sub Committee Governance Task Group Discussion Document 81 (v 3) Solvency Assessment and Management: Pillar II Sub Committee Governance Task Group Discussion Document 81 (v 3) Governance, Risk Management, and Internal Controls INTERIM REQUIREMENTS CONTENTS 1. INTRODUCTION

More information

Fraud-Related Compliance

Fraud-Related Compliance Fraud-Related Compliance Areas of Compliance, Part 1: FCPA, SOX, PCAOB, Dodd-Frank 2015 Association of Certified Fraud Examiners, Inc. Foreign Corrupt Practices Act (FCPA) Enacted to prohibit corrupt payments

More information

REGULATIONS FOR COMPLIANCE OFFICERS

REGULATIONS FOR COMPLIANCE OFFICERS PenCom REGULATIONS FOR COMPLIANCE OFFICERS RR/P&R/09/03 www.pencom.gov.ng About this Guidelines The Regulations for Compliance Officers is divided into four (4) sections. Section one is the introduction

More information

Corporate Information Security Policy

Corporate Information Security Policy Corporate Information Security Policy. A guide to the Council s approach to safeguarding information resources. September 2015 Contents Page 1. Introduction 1 2. Information Security Framework 2 3. Objectives

More information

Bridging the HIPAA/HITECH Compliance Gap

Bridging the HIPAA/HITECH Compliance Gap CyberSheath Healthcare Compliance Paper www.cybersheath.com -65 Bridging the HIPAA/HITECH Compliance Gap Security insights that help covered entities and business associates achieve compliance According

More information