ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES
|
|
|
- Lily Cummings
- 10 years ago
- Views:
Transcription
1 ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES THIS POLICY SETS OUT THE REQUIREMENTS FOR SAFEGUARDING COMPANY ASSETS AND RESOURCES TO PROTECT PATIENTS, STAFF, PRODUCTS, PROPERTY AND INFORMATION. Who is this Policy for? All staff have a responsibility for respecting Company assets and resources and acting appropriately; Managers are accountable for ensuring appropriate internal controls and training are in place to manage assets and resources in accordance with the requirements set out in this Global Policy. KEY PRINCIPLES FOR MANAGING COMPANY ASSETS AND RESOURCES The Company is committed to managing its assets and resources in a responsible manner. It does this on behalf of its shareholders and to protect patients, staff, products, property and information. This is achieved through line accountability that clarifies to every individual their role in minimising losses and disruption, and safeguarding Company integrity and reputation. This Global Policy, associated standards and procedures specify the requirements for: the management of assets and resources; the maintenance of internal financial, regulatory and operational controls; the management of significant risks; and the protection of the business in the face of significant events. We must manage assets efficiently and effectively so that the Company realises their full value and complies with its obligations; We must identify and manage our information assets using good information practice; We must operate and maintain a robust internal financial, regulatory and operational control system that is designed to promote efficiency, prevent fraud and help ensure the reliability of financial statements and compliance with applicable laws and standards; We must identify, prioritise, manage and report risks to Company assets, employees or patients so that we achieve our business objectives, comply with legal requirements and safeguard shareholder value;
2 We must be prepared to the fullest extent practicable to respond to significant events so that our critical business processes are maintained. MANAGING ASSETS AND RESOURCES 1. The Company is committed to the effective and compliant management of its assets and resources to meet the following objectives: Realise the full value of assets and resources to deliver business objectives, making a meaningful difference to patient health; Ensure compliance with legal requirements and safeguard shareholder value by protecting assets and resources; Manage assets and resources in an efficient manner that ensures effective use and facilitates sound decision making; Work to ensure that our external partners manage our assets and resources in a manner compliant with this policy. Related expectations can also be found in the following Global Polices: Data Protection & Privacy; Legal & Intellectual Property; and Safety, Health and Environment; Providing Information about our Products; Business Travel. MANAGING INFORMATION AS AN ASSET 2. Good information practice. For the purposes of this policy information is defined as information that the Company or contracted partner creates or handles, in all formats including physical, electronic or verbal, or the use of other knowledge in the course of Company business. To that end, this policy specifies the six key principles to be employed when managing information. The Company s six principles of Good Information Practice and their expected business outcomes are: Accountability: Accountable people recognising information as an asset. By agreeing and maintaining clear ownership and accountability for information we ensure appropriate levels of personal responsibility and management oversight throughout the information lifecycle. Integrity: Accurate information with trustworthy sources. By making sure that information is accurate, relevant and trustworthy we ensure it supports the integrity of decision making and end-to-end business processes. Retention: Keep what is needed, dispose of the rest. By keeping only information that supports well understood compliance and business objectives and disposing of what we no longer need in a timely way, we retain the information assets we need without incurring
3 unnecessary business risk and cost. Compliance: Standards are understood and met. By assuring that information is compliant with the Company s legal, regulatory, fiscal, ethical and operational obligations we help to maintain our licence to operate and achieve our reputational goals. Availability: Accessible information enabling people. By making the right information available to the right people, at the right time, we improve our effectiveness and the quality of decision-making and enhance our ability to innovate for business value. Protection: Information is safeguarded through processes that are secure and understood. By agreeing and maintaining the appropriate access and other controls for information we ensure that the varied interests of relevant stakeholders including patients, shareholders and employees are protected. 3. Company records. Line managers are accountable for the management of Company records created during the course of our business activities throughout their entire lifecycle, including creation, use, management, storage and retrieval, archiving and disposal. It is the Company s policy to: value records as corporate assets; retain records required by law or regulation or having business or historical value; manage records efficiently; protect and hold records according to company standards; and dispose of records at the appropriate time as stipulated in the Global Retention and Disposal (GRAD) Schedule Standard. Recorded information represents official business records regardless of media form or other format characteristics, when created or received by the Company and considered as evidence of its functions, decisions, policies, operations and other activities. Records are important corporate assets to be safeguarded. Company records must have the appropriate level of protection from unauthorized use, disclosure, damage or loss. Legal Holds supersede any legal, regulatory and business retention requirements identified in the GRAD Schedule Standard and we must ensure that all versions and copies of records on Hold are preserved until the associated Hold is removed. Adherence to efficient records management practices will help assure Company information is protected, accurate, useful and readily accessible whenever it is needed.
4 4. Information security principles. All Company and third party information for which the Company is responsible must be protected to preserve its confidentiality, integrity and availability, including the proper handling of information by third parties. All staff must also comply with the Global Policy: Communications and supporting standards. Staff are responsible for handling information in ways appropriate to its sensitivity and any specific requirements for its protection. Specific requirements for data protection and privacy are stated in the Global Policy: Data Protection and Privacy. When sharing information internally and with third parties, applicable global standards or procedures must be followed, and steps taken proportionate to the sensitivity of the information, to ensure that it will be properly protected in storage, in transit and by the recipient. All staff must comply with the Group Standard Disclosure. It covers all disclosures of inside information by the Company. Inside information is any precise, non-public information relating to the Company s business or financial position that, if it were made public, could have a significant effect on the price of AstraZeneca PLC shares. 5. Computer Usage. All information services must be provided and operated in a manner consistent with the IS Policy. All computer usage, including the use of computers, networks and all other types of equipment and technology to handle information, must comply with the Computer Usage Policy. 6. Copyright. To ensure that all third party information is used in a legal manner: All staff have a responsibility to use information only in a way that is in compliance with copyright laws and with any licences and agreements into which the Company has entered for the use of copyright-protected materials; All staff must comply with the Global Standard on Use of Third Party Information when using third party copyright-protected works. 7. Competitive intelligence. All activities to obtain information on competitor companies and products must be legal and ethical. All staff and others working on behalf of the Company must not seek information that constitutes trade secrets of a third party without the authorisation of such party. If trade secrets are offered to a member of staff, they must be refused and the Legal Department should be consulted with respect to possible follow-up actions.
5 If unsolicited trade secrets are received, the Legal Department should be consulted and, when appropriate, the owner of the information should be notified and any documents received returned to the owner. If a conversation containing trade secrets is inadvertently overheard, staff should inform their manager and the information should not contribute to significant business decisions. Staff should not be asked to provide, nor should they offer, any information that would reasonably be considered as trade secrets by their previous employers. MANAGING INTERNAL FINANCIAL, REGULATORY AND OPERATIONAL CONTROLS 8. Line Managers are accountable for the development, implementation and ongoing operation and monitoring of appropriate financial controls for each relevant function to ensure the following objectives: Effective and efficient operation of the applicable SET/functional area; Financial reporting that operates with integrity, reliability, accuracy, transparency and timeliness; Compliance with applicable laws, regulations and standards. The Company will operate internal control processes consisting of interrelated components: A control environment that encompasses values, processes and skills to ensure that financial transactions are recorded and reported accurately and that includes: o A commitment to integrity, ethical values and competence; o Management s philosophy and operating style; o Delegation of authority and responsibility; o Participation and direction by the Board of Directors of AstraZeneca PLC (the Board). Control activities that: o Include the establishment of policies and procedures to ensure management s directives are carried out; o Encompass a range of activities, including approvals, authorisations, verifications, reconciliations, reviews of operating performance, security of assets and segregation of duties.
6 Information and communication processes that ensure pertinent information is identified, captured and communicated in a form and timeframe that enables staff to carry out their responsibilities; Information systems that are designed and established to produce reports containing operational, financial and compliance-related information to operate and control the business; Monitoring that assesses the effectiveness of the internal control system over time through ongoing monitoring activities, separate evaluations or a combination of the two; Reporting of deficiencies in the internal control system to line management, the Audit Committee and the Board, and corrective actions to ensure continuous improvement of the system. 9. Anti-fraud principles. The Company does not tolerate fraud. We will take all reasonable steps to prevent the Company from becoming a victim of fraud, and we will not tolerate any fraud perpetrated in our name. Where fraud is detected, the Company will take necessary steps to stop it immediately, mitigate any resulting loss or damage and evaluate whether corrective actions or additional controls are necessary to prevent future fraud (and if so, to implement them expeditiously). When the Company has been a victim of fraud, the Company shall seek to recover whatever has been lost as a consequence of the fraud. The Company shall consider taking legal action against the perpetrators of fraud, whether they are staff or external to the Company. Any potentially improper action against Company resources must be reported promptly through recognised channels and investigated. Staff who commit fraud are subject to disciplinary action up to and including dismissal. 10. Procurement principles. For each SET/functional area, line managers are accountable for ensuring that: The SET/functional area meets its business objective of delivering best value spend management across the Company in line with the needs and priorities of the business by leveraging and linking appropriate Company resources and effectively utilising our suppliers capabilities; We protect the Company s commercial and legal rights; All purchasing activities:
7 o Are approved within the authority limits delegated by the Board and the SET; o Have suitable segregation of duties to ensure that procurement requisition, procurement commitment, and invoice approval have appropriate decision-making controls in place; Value delivered is measured in terms of the quality of goods and services purchased and the total ownership costs; The optimum balance between local or functional business needs and overall corporate benefit is achieved; Processes and procedures designed to ensure compliance with this policy are implemented and followed by SET areas (e.g. the Procurement Policy and Internal Governance Framework); High standards of professional ethics and personal integrity are maintained in line with the AstraZeneca Code of Conduct, including the sections on Preventing Bribery and Corruption and Avoiding Conflicts of Interest. We must operate within an ethical procurement framework that is compliant with Company SHE policies, the financial control framework and the Responsible Procurement Standard; Suppliers are treated with appropriate respect. MANAGING RISK 11. The Company is committed to effective risk management to meet the following objectives: Safeguard shareholder value and protect the company s assets and resources; Help achieve business objectives by guiding specific management decisions both strategic and operational; Ensure both compliance with applicable legal requirements and effective corporate governance. This policy and associated procedures specify the requirements for the identification, prioritisation, management and reporting on the risks faced by the Company. All types of risk are covered within the scope of this policy, including long term value/strategic, financial control, compliance and reputational risks and shorter term performance/operational risks impacting the long term business plan and annual budgeting cycle. The purpose of effective risk management is to ensure that:
8 Accountabilities and responsibilities for risk management and oversight are clearly understood; Significant risks to corporate and business strategies are understood and effectively managed; The risks of non-compliance with policies and applicable laws and regulations are understood and adequately controlled; The impact of risks is assessed by measuring how a particular risk might adversely affect the value of the business in the event the risk is realised; Mitigation and business resilience plans for significant risks are adequately specified, executed and monitored; Reporting on risks and how they are controlled is accurate, relevant and timely; Appropriate escalation of potential risks is achieved using clear criteria, integrated into business processes. The Company provides guidelines that describe the risk management process, the roles and responsibilities that enable its successful operation and the annual and quarterly risk process. PREPARING FOR, AND RESPONDING TO, SIGNIFICANT EVENTS 12. Business resilience. The Company is committed to being prepared to the fullest extent practicable to continue critical business processes in the event of a business disruption, and to managing the company s response to any event that may negatively impact the reputation of AstraZeneca or its products. Business Resilience relies on having the specific plans in place to minimise the impact and potential disruption to the business from key business threats identified during business risk assessment processes. Line managers are accountable for readiness and response planning, for having the appropriate capabilities, and for providing assurance for the adequacy of the plans within SET and Functional areas. The relevant SET member is accountable for providing assurance for the adequacy of the plans. Collectively, Business Resilience is comprised of some or all of the following, depending on the nature of the business activities and the threats to them: Business continuity: Business Continuity Management Planning addresses the continuity of critical business processes in the event of
9 significant business disruptions affecting people, workspace and/or technology. SET members are responsible for identifying critical processes through risk assessment and for assigning owners to these processes. Critical process owners are responsible for developing, testing and maintaining business continuity plans appropriate to their part of the business. Crisis management: Crisis Management is a series of senior management-led activities designed to address, manage and resolve or terminate, quickly and effectively, any significant event that has the potential to negatively affect the business or its reputation. Crisis Management is geographically aligned and escalated to Group based on severity. Specific requirements and responsibilities relating to the preparation for, and management of, a crisis are established in the Crisis Management Standard. Disaster recovery: Disaster Recovery Planning addresses the recovery of critical computerised systems that support the Business. The AZ IS function has the primary accountability for disaster recovery. Emergency response: Emergency Response is the collective action taken at a site to stabilise incidents that have the potential to injure people, damage or contaminate property or interrupt business operations. 13. Counterfeit medicines. The Company will seek to protect patients from the dangers of counterfeit or illegally traded medicines by: Building strong, collaborative partnerships to strengthen enforcement and raise awareness. We work with other pharmaceutical companies, our supply chain partners, governments, and law enforcement agencies to raise awareness of the issue and implement effective solutions; Securing our products through pack security features to aid verification and deter copying, and improving the security of the end-to-end supply chain; Working in enforcement to combat illegal activity through professional investigation of reported suspicions. Staff who are aware of suspicions relating to possible counterfeiting or illegal trade of AstraZeneca products must report this to Global Security. The Company supports supply chain partners in identifying and establishing the controls needed to ensure authenticity of product through the end to end supply chain. The Company does not tolerate unlawful activity and will take appropriate action if a partner is found to be involved in any type of illegal trade as documented in the Counterfeiting Zero Tolerance Standard for Supply Chain Partners.
10 14. Security principles. The Company is committed to creating a secure business environment: protecting patients, staff, products, property and information; minimising losses and disruption; and safeguarding the Company s reputation. Security must be managed as any other critical activity in the proposal, planning, conduct and discontinuation phases of business operations. Line managers are accountable for implementing security controls and processes that meet local needs and the requirements of this Policy and supporting Security Standards. In particular, they must ensure that: Security risks are identified and documented and appropriate measures implemented to manage them; Security risks and mitigation measures are reviewed at least annually, and in the event of any major change in the business or local security conditions; The security implications of all aspects of work carried out by others on behalf of the Company are considered; Security incidents are reported, investigated, recorded and communicated appropriately; Armed security is not used unless it is a legal requirement or there is no acceptable alternative to manage the risk. Any proposals to use armed security must be referred to Global Security for approval. Version 4.0, 2012
ASTRAZENECA GLOBAL POLICY QUALITY AND REGULATORY COMPLIANCE
ASTRAZENECA GLOBAL POLICY QUALITY AND REGULATORY COMPLIANCE THIS POLICY OUTLINES THE TOP LEVEL REQUIREMENTS TO SUPPORT PRODUCT QUALITY IN THE DEVELOPMENT, MANUFACTURE AND DISTRIBUTION OF ACTIVE PHARMACEUTICAL
INSURANCE ACT 2008 CORPORATE GOVERNANCE CODE OF PRACTICE FOR REGULATED INSURANCE ENTITIES
SD 0880/10 INSURANCE ACT 2008 CORPORATE GOVERNANCE CODE OF PRACTICE FOR REGULATED INSURANCE ENTITIES Laid before Tynwald 16 November 2010 Coming into operation 1 October 2010 The Supervisor, after consulting
Fraud Risk Management Procedures
Fraud Risk Management Procedures 1. Introduction KCE Electronics Public Company Limited ( KCE or the Company ) is committed to achieving the highest levels of business integrity, morals and transparency
GUIDANCE NOTE FOR DEPOSIT-TAKERS. Operational Risk Management. March 2012
GUIDANCE NOTE FOR DEPOSIT-TAKERS Operational Risk Management March 2012 Version 1.0 Contents Page No 1 Introduction 2 2 Overview 3 Operational risk - fundamental principles and governance 3 Fundamental
I S O I E C 2 7 0 0 2 2 0 1 3 I N F O R M A T I O N S E C U R I T Y A U D I T T O O L
15.1 ESTABLISH SECURITY AGREEMENTS WITH SUPPLIERS 15.1.1 EXPECT SUPPLIERS TO COMPLY WITH RISK MITIGATION AGREEMENTS Do you clarify the information security risks that exist whenever your suppliers have
Information Integrity & Data Management
Group Standard Information Integrity & Data Management Serco recognises its responsibility to ensure that any information and data produced meets customer, legislative and regulatory requirements and is
Compliance. Group Standard
Group Standard Compliance Serco is committed to good governance practices and the management of risks supported by a robust business compliance process SMS-GS-G2 Compliance July 2014 v1.0 Serco Public
Operational Risk Publication Date: May 2015. 1. Operational Risk... 3
OPERATIONAL RISK Contents 1. Operational Risk... 3 1.1 Legislation... 3 1.2 Guidance... 3 1.3 Risk management process... 4 1.4 Risk register... 7 1.5 EBA Guidelines on the Security of Internet Payments...
GUIDANCE FOR MANAGING THIRD-PARTY RISK
GUIDANCE FOR MANAGING THIRD-PARTY RISK Introduction An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships,
Operations. Group Standard. Business Operations process forms the core of all our business activities
Standard Operations Business Operations process forms the core of all our business activities SMS-GS-O1 Operations December 2014 v1.1 Serco Public Document Details Document Details erence SMS GS-O1: Operations
CODE OF ETHICS AND BUSINESS CONDUCT
CODE OF ETHICS AND BUSINESS CONDUCT Date of Issue: 22 January 2015 Version number: 2 LUXFER HOLDINGS PLC Code of Ethics and Business Conduct Luxfer Holdings PLC is committed to conducting its business
Internal Control Systems and Maintenance of Accounting and Other Records for Interactive Gaming & Interactive Wagering Corporations (IGIWC)
Internal Control Systems and Maintenance of Accounting and Other Records for Interactive Gaming & Interactive Wagering Corporations (IGIWC) 1 Introduction 1.1 Section 316 (4) of the International Business
EURIBOR - CODE OF OBLIGATIONS OF PANEL BANKS
D2725D-2013 EURIBOR - CODE OF OBLIGATIONS OF PANEL BANKS Version: 1 October 2013 1. Objectives The European Money Markets Institute EMMI previously known as Euribor-EBF, as Administrator for the Euribor
The PNC Financial Services Group, Inc. Business Continuity Program
The PNC Financial Services Group, Inc. Business Continuity Program subsidiaries) 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis
Policy-Standard heading. Fraud and Corruption Policy
Policy-Standard heading Fraud and Corruption Policy September 2013 Table of contents Introduction 3 Purpose 3 Scope 3 Related Policies and Processes 3 Definition of Fraud and Corruption 4 Policy 4 Code
NOTICE 158 OF 2014 FINANCIAL SERVICES BOARD REGISTRAR OF LONG-TERM INSURANCE AND SHORT-TERM INSURANCE
STAATSKOERANT, 19 DESEMBER 2014 No. 38357 3 BOARD NOTICE NOTICE 158 OF 2014 FINANCIAL SERVICES BOARD REGISTRAR OF LONG-TERM INSURANCE AND SHORT-TERM INSURANCE LONG-TERM INSURANCE ACT, 1998 (ACT NO. 52
SABPP IT GOVERNANCE COMMITTEE TERMS OF REFERENCE
SABPP IT GOVERNANCE COMMITTEE TERMS OF REFERENCE PREAMBLE The purpose of the IT Governance Committee is to ensure that IT is effectively governed at SABPP in accordance with the King III Code of Governance
Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager
Document Reference Number Date Title Author Owning Department Version Approval Date Review Date Approving Body UoG/ILS/IS 001 January 2016 Information Security and Assurance Policy Information Security
Risk Management of Outsourced Technology Services. November 28, 2000
Risk Management of Outsourced Technology Services November 28, 2000 Purpose and Background This statement focuses on the risk management process of identifying, measuring, monitoring, and controlling the
LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction
LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed
AS Merko Ehitus CODE OF BUSINESS ETHICS
AS Merko Ehitus CODE OF BUSINESS ETHICS AS Merko Ehitus 1 Introduction The purpose of the Code of Business Ethics, which is described in this document, is to provide guidance to employees, directors and
BUSINESS CODE OF CONDUCT
BUSINESS CODE OF CONDUCT PREPARED FOR: ode March 2011 Page 1 Contents 1 BUSINESS CODE OF CONDUCT... 3 2 MISSION STATEMENT... 3 3 PRINCIPLES AND VALUES... 3 4 RELATIONSHIPS... 4 5 BRIBERY AND CORRUPTION...
GUIDELINES FOR THE MANAGEMENT OF OPERATIONAL RISK
SUPERVISORY AND REGULATORY GUIDELINES: PU-0412 Operational Risk 25 th November, 2013 GUIDELINES FOR THE MANAGEMENT OF OPERATIONAL RISK 1. INTRODUCTION 1.1. The Central Bank of The Bahamas ( the Central
Preparation of a Rail Safety Management System Guideline
Preparation of a Rail Safety Management System Guideline Page 1 of 99 Version History Version No. Approved by Date approved Review date 1 By 20 January 2014 Guideline for Preparation of a Safety Management
CONTRACT MANAGEMENT POLICY
CONTRACT MANAGEMENT POLICY Section Finance Approval Date 25/08/2014 Approved by Directorate Next Review Aug 2016 Responsibility Chief Operating Officer Key Evaluation Question 6 PURPOSE The purpose of
HEALTH SAFETY & ENVIRONMENT MANAGEMENT SYSTEM
HEALTH SAFETY & ENVIRONMENT MANAGEMENT SYSTEM September 2011 OUR HEALTH, SAFETY AND ENVIRONMENT POLICY OUR PRINCIPLE OF DUE CARE We care about the wellbeing of our people and our impact on the environment.
Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2
Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications
UTech Services Compliance, Auditing, Risk, and Security (CARS) Team Charter
Pennsylvania State System of Higher Education California University of Pennsylvania UTech Services Compliance, Auditing, Risk, and Security (CARS) Team Charter Version [1.0] 1/29/2013 Revision History
Document Type Doc ID Status Version Page/Pages. Policy LDMS_001_00161706 Effective 2.0 1 of 7 Title: Corporate Information Technology Usage Policy
Policy LDMS_001_00161706 Effective 2.0 1 of 7 AstraZeneca Owner Smoley, David Authors Buckwalter, Peter (MedImmune) Approvals Approval Reason Approver Date Reviewer Approval Buckwalter, Peter (MedImmune)
Advisory Guidelines of the Financial Supervisory Authority. Requirements regarding the arrangement of operational risk management
Advisory Guidelines of the Financial Supervisory Authority Requirements regarding the arrangement of operational risk management These Advisory Guidelines have established by resolution no. 63 of the Management
Risk Management. Group Standard
Group Standard Risk Management Effective risk management allows Serco to improve customer service, maximize opportunities and reduce business loss from overruns and cost from risks that materialise SMS
Evergreen Solar, Inc. Code of Business Conduct and Ethics
Evergreen Solar, Inc. Code of Business Conduct and Ethics A MESSAGE FROM THE BOARD At Evergreen Solar, Inc. (the Company or Evergreen Solar ), we believe that conducting business ethically is critical
Corporate Code of Ethics
FERROVIAL CORPORATE CODE OF ETHICS Corporate Code of Ethics Our complete commitment to the ethics and integrity of our workforce highlights us as a serious company committed to its stakeholders interests.
Commercial Online Banking
These terms form the agreement between us, Metro Bank PLC and you, a business customer and apply to the Commercial Online Banking Service (Commercial Online Banking) provided by us. Commercial Online Banking
SPG 223 Fraud Risk Management. June 2015
SPG 223 Fraud Risk Management June 2015 Disclaimer and copyright This prudential practice guide is not legal advice and users are encouraged to obtain professional advice about the application of any legislation
Information Governance Policy
Information Governance Policy Document Number 01 Version Number 2.0 Approved by / Date approved Effective Authority Customer Services & ICT Authorised by Assistant Director Customer Services & ICT Contact
GUIDELINES ON COMPLIANCE FUNCTION FOR FUND MANAGEMENT COMPANIES
GUIDELINES ON COMPLIANCE FUNCTION FOR FUND MANAGEMENT COMPANIES Issued: 15 March 2005 Revised: 25 April 2014 1 P a g e List of Revision Revision Effective Date 1 st Revision 23 May 2011 2 nd Revision 16
Business Continuity Management
Business Continuity Management Standard Operating Procedure Notice: This document has been made available through the Police Service of Scotland Freedom of Information Publication Scheme. It should not
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
Scotland s Commissioner for Children and Young People Records Management Policy
Scotland s Commissioner for Children and Young People Records Management Policy 1 RECORDS MANAGEMENT POLICY OVERVIEW 2 Policy Statement 2 Scope 2 Relevant Legislation and Regulations 2 Policy Objectives
Aegon Global Compliance
Aegon Global Compliance GLOBAL Charter COMPLIANCE CHARTER aegon.com The Hague, June 1, 2013 Information sheet Target audience: All employees and management of Aegon companies Issued by: Aegon N.V. Group
Financial Services Guidance Note Outsourcing
Financial Services Guidance Note Issued: April 2005 Revised: August 2007 Table of Contents 1. Introduction... 3 1.1 Background... 3 1.2 Definitions... 3 2. Guiding Principles... 5 3. Key Risks of... 14
Information governance strategy 2014-16
Information Commissioner s Office Information governance strategy 2014-16 Page 1 of 16 Contents 1.0 Executive summary 2.0 Introduction 3.0 ICO s corporate plan 2014-17 4.0 Regulatory environment 5.0 Scope
Compliance Policy ALCO recommended standard
1. PURPOSE In accordance with CSSF Circular 2004/155, the board of directors of [NAME OF COMPANY] (hereafter the Company ) has adopted the following Compliance Policy. The Company s Compliance function
The anglo american Safety way. Safety Management System Standards
The anglo american Safety way Safety Management System Standards 2 The Anglo American Safety Way CONTENTS Introduction 04 Anglo American Safety Framework 05 Safety in anglo american 06 Monitoring and review
Business Ethics Policy
Business Ethics Policy Page 1 of 12 Preface and document control This document is intended to provide information in respect of G4S Group Head Office policy, procedure, standards or guidance and will be
Fraud and the Government Internal Auditor
Fraud and the Government Internal Auditor January 2012 Fraud and the Government Internal Auditor January 2012 Official versions of this document are printed on 100% recycled paper. When you have finished
THE SOUTH AFRICAN HERITAGE RESOURCES AGENCY ENTERPRISE RISK MANAGEMENT FRAMEWORK
THE SOUTH AFRICAN HERITAGE RESOURCES AGENCY ENTERPRISE RISK MANAGEMENT FRAMEWORK ACCOUNTABLE SIGNATURE AUTHORISED for implementation SIGNATURE On behalf of Chief Executive Officer SAHRA Council Date Date
TO: Chief Executive Officers of National Banks, Federal Branches and Data-Processing Centers, Department and Division Heads, and Examining Personnel
AL 2000 12 O OCC ADVISORY LETTER Comptroller of the Currency Administrator of National Banks Subject: Risk Management of Outsourcing Technology Services TO: Chief Executive Officers of National Banks,
Prudential Practice Guide
Prudential Practice Guide SPG 220 Risk Management July 2013 www.apra.gov.au Australian Prudential Regulation Authority Disclaimer and copyright This prudential practice guide is not legal advice and users
RISK MANAGEMENT AND COMPLIANCE
RISK MANAGEMENT AND COMPLIANCE Contents 1. Risk management system... 2 1.1 Legislation... 2 1.2 Guidance... 3 1.3 Risk management policy... 4 1.4 Risk management process... 4 1.5 Risk register... 8 1.6
COMPLIANCE CHARTER 1
COMPLIANCE CHARTER 1 Contents 1. Compliance Policy Statement... 2 2. Purpose... 2 3. Mission and objective of the Directorate: Compliance... 2 3.1 Mission... 2 3.2 Objective... 3 4. Compliance risk management...
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
RISK MANAGEMENT FRAMEWORK. 2 RESPONSIBLE PERSON: Sarah Price, Chief Officer
RISK MANAGEMENT FRAMEWORK 1 SUMMARY The Risk Management Framework consists of the following: Risk Management policy Risk Management strategy Risk Management accountability Risk Management framework structure.
Fraud Prevention and Deterrence
Fraud Prevention and Deterrence Fraud Risk Assessment 2016 Association of Certified Fraud Examiners, Inc. What Is Fraud Risk? The vulnerability that an organization faces from individuals capable of combining
PROTECTION OF PERSONAL INFORMATION
PROTECTION OF PERSONAL INFORMATION Definitions Privacy Officer - The person within the Goderich Community Credit Union Limited (GCCU) who is responsible for ensuring compliance with privacy obligations,
Business Continuity & Crisis Management
Group Standard Business Continuity & Crisis Management The need to plan and respond effectively is critical to the successful management of any crisis situation. Business Continuity Management is the holistic
Risk Management Policy and Framework
Risk Management Policy and Framework December 2014 phone 1300 360 605 08 89589500 email [email protected] location 1Bagot Street Alice Springs NT 0870 post PO Box 2257 Alice Springs NT 0871
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5
Risk Management Framework
Risk Management Framework Mandate and commitment Design of framework for managing risks Continual improvement of the framework Implementing risk management Monitoring and review of the framework Source:
OMNI TECHNICAL SOLUTIONS. Business Ethics, Compliance, Anti-Corruption and Anti-Money Laundering Policy
OMNI TECHNICAL SOLUTIONS Business Ethics, Compliance, Anti-Corruption and Anti-Money Laundering Policy Updated: September 2015 Table of Contents 1. Introduction... 2 2. Business Ethics... 3 2.1 Compliance...
INFORMATION GOVERNANCE POLICY
INFORMATION GOVERNANCE POLICY Issued by: Senior Information Risk Owner Policy Classification: Policy No: POLIG001 Information Governance Issue No: 1 Date Issued: 18/11/2013 Page No: 1 of 16 Review Date:
ICT SERVICE LEVEL AGREEMENT MANAGEMENT POLICY (EXTERNAL SERVICE PROVIDERS/VENDORS)
ICT SERVICE LEVEL AGREEMENT MANAGEMENT POLICY (EXTERNAL SERVICE PROVIDERS/VENDORS) TABLE OF CONTENTS 1. INTRODUCTION... 3 2. LEGISLATIVE FRAMEWORK... 3 3. OBJECTIVE OF THE POLICY... 4 4. AIMS OF THE POLICY...
Managing General Agents (MGAs) Guideline
Managing General Agents (MGAs) Guideline JUNE 2013 DRAFT FOR COMMENT BC AUTHORIZED LIFE INSURERS www.fic.gov.bc.ca PURPOSE This draft guideline outlines best practices that the Financial Institutions Commission
BBC. Anti-Bribery Policy. June 2011
BBC Anti-Bribery Policy June 2011 CONTENTS CLAUSE 1. Anti-Bribery Policy statement... 1 2. Who is covered by the policy?... 2 3. What is bribery?... 2 4. Gifts and hospitality... 3 5. Gifts and hospitality
The PNC Financial Services Group, Inc. Business Continuity Program
The PNC Financial Services Group, Inc. Business Continuity Program 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis (BIA) Page
Accountable Care Organization. Medicare Shared Savings Program. Compliance Plan
Accountable Care Organization Participating In The Medicare Shared Savings Program Compliance Plan 2014 Corporate Location: 3190 Fairview Park Drive Falls Church, VA 22042 ARTICLE I INTRODUCTION This Compliance
GOVERNANCE AND SECURITY BEST PRACTICES FOR PAYMENT PROCESSORS
GOVERNANCE AND SECURITY BEST PRACTICES FOR PAYMENT PROCESSORS A White Paper by i2c, Inc. 1300 Island Drive Suite 105 Redwood City, CA 94065 USA +1 650-593-5400 [email protected] www.i2cinc.com Table of
Internal Control - Integrated Framework
Internal Control - Integrated Framework Executive Summary Senior executives have long sought ways to better control the enterprises they run. Internal controls are put in place to keep the company on course
BUSINESS CONTINUITY POLICY
BUSINESS CONTINUITY POLICY Last Review Date Approving Body n/a Audit Committee Date of Approval 9 th January 2014 Date of Implementation 1 st February 2014 Next Review Date February 2017 Review Responsibility
How To Be A Supply Management Professional
PRINCIPLES AND STANDARDS OF ETHICAL SUPPLY MANAGEMENT CONDUCT WITH GUIDELINES Published by: Institute for Supply Management, Inc. Thomas Derry, Chief Executive Officer 2014 Institute for Supply Management
Cloud Computing Security Considerations
Cloud Computing Security Considerations Roger Halbheer, Chief Security Advisor, Public Sector, EMEA Doug Cavit, Principal Security Strategist Lead, Trustworthy Computing, USA January 2010 1 Introduction
ASTRAZENECA GLOBAL POLICY SAFETY, HEALTH AND ENVIRONMENT (SHE)
ASTRAZENECA GLOBAL POLICY SAFETY, HEALTH AND ENVIRONMENT (SHE) THIS POLICY SETS OUT HOW WE WILL MEET OUR COMMITMENT TO OPERATING OUR BUSINESS IN A WAY THAT PROTECTS PERSONAL HEALTH, WELLBEING AND SAFETY
PostNL Group Policy. on Fraud Prevention. PostNL Group Policy. on Fraud Prevention Page 1 of 15
on Fraud Prevention on Fraud Prevention Page 1 of 15 Contents 1 Objective of this group policy 3 2 Scope 4 3 Definitions 5 4 Policy provisions and responsibilities 7 4.1 Fraud Prevention controls 7 4.2
How To Protect School Data From Harm
43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:
A Best Practice Guide
A Best Practice Guide Contents Introduction [2] The Benefits of Implementing a Privacy Management Programme [3] Developing a Comprehensive Privacy Management Programme [3] Part A Baseline Fundamentals
CODE OF ETHICS AND BUSINESS CONDUCT
CODE OF ETHICS AND BUSINESS CONDUCT This Code of Ethics and Business Conduct ( Code ) has been approved by the Amalgamated Holdings Limited ( AHL ) Board of Directors for use within the AHL controlled
For personal use only
CONTENTS Introduction Objective Scope Standards of Behaviour Work Environment Community Engagement Financial Information and Integrity Company Property and Information Bribery and Corruption Breaches Approval
Board of Directors and Management Oversight
Board of Directors and Management Oversight Examination Procedures Examiners should request/ review records, discuss issues and questions with senior management. With respect to board and senior management
Standards for the Professional Practice of Internal Auditing
Standards for the Professional Practice of Internal Auditing THE INSTITUTE OF INTERNAL AUDITORS 247 Maitland Avenue Altamonte Springs, Florida 32701-4201 Copyright c 2001 by The Institute of Internal Auditors,
APEC General Elements of Effective Voluntary Corporate Compliance Programs
2014/CSOM/041 Agenda Item: 3 APEC General Elements of Effective Voluntary Corporate Compliance Programs Purpose: Consideration Submitted by: United States Concluding Senior Officials Meeting Beijing, China
University of New England Compliance Management Framework and Procedures
University of New England Compliance Management Framework and Procedures Document data: Document type: Administering entity: Framework and Procedures Audit and Risk Directorate Records management system
PROPOSED REVISION TO ANNEX I OF THE DECLARATION ON INTERNATIONAL INVESTMENT AND MULTINATIONAL ENTERPRISES
Preface PROPOSED REVISION TO ANNEX I OF THE DECLARATION ON INTERNATIONAL INVESTMENT AND MULTINATIONAL ENTERPRISES OECD GUIDELINES FOR MULTINATIONAL ENTERPRISES 1. The OECD Guidelines for Multinational
Who Should Know This Policy 2 Definitions 2 Contacts 3 Procedures 3 Forms 5 Related Documents 5 Revision History 5 FAQs 5
Information Security Policy Type: Administrative Responsible Office: Office of Technology Services Initial Policy Approved: 09/30/2009 Current Revision Approved: 08/10/2015 Policy Statement and Purpose
Global Anti Bribery and Corruption Policy
GRC 004 Global Anti Bribery and Corruption Policy Page 1 of 7 Contents 1. Purpose... 3 2. Scope... 3 3. Policy... 3 4. Bribery... 3 5. Gifts and Hospitality... 4 6. What is not acceptable?... 4 7. Facilitation
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
SUPPLIERS / BUSINESS PARTNERS CODE OF CONDUCT
SUPPLIERS / BUSINESS PARTNERS CODE OF CONDUCT CONTENTS INTRODUCTION... 3 OUR APPROACH... 4 THE CODE IN RELATION TO OTHER CONTRACTUAL OBLIGATIONS... 4 THE COMMITMENTS UNDERTAKEN BY MYTILINEOS GROUP... 4
INFORMATION SECURITY POLICY
Information Security Policy INFORMATION SECURITY POLICY Introduction Norwood UK recognises that information and information systems are valuable assets which play a major role in supporting the companies
Lancashire County Council Information Governance Framework
Appendix 'A' Lancashire County Council Information Governance Framework Introduction Information Governance provides a framework for bringing together all of the requirements, standards and best practice
HMG Security Policy Framework
HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of
Crime Statistics Data Security Standards. Office of the Commissioner for Privacy and Data Protection
Crime Statistics Data Security Standards Office of the Commissioner for Privacy and Data Protection 2015 Document details Security Classification Dissemination Limiting Marker Dissemination Instructions
Annual Governance Statement 2013/14
31 Annual Governance Statement 2013/14 1. SCOPE OF RESPONSIBILITY ESPO is responsible for ensuring that its business is conducted in accordance with the law and proper standards, and that public money
SAFETY and HEALTH MANAGEMENT STANDARDS
SAFETY and HEALTH STANDARDS The Verve Energy Occupational Safety and Health Management Standards have been designed to: Meet the Recognised Industry Practices & Standards and AS/NZS 4801 Table of Contents
Information Security: Business Assurance Guidelines
Information Security: Business Assurance Guidelines The DTI drives our ambition of prosperity for all by working to create the best environment for business success in the UK. We help people and companies
