CFPB Readiness Series: Compliant Vendor Management Overview



Similar documents
CFPB Readiness Series: Chief Compliance Officer Responsibilities

Vendor Compliance Management Series: Performing an Effective Risk Assessment

Vendor Management Compliance Top 10 Things Regulators Expect

Vendor Management Best Practices

Vendor Management Compliance Top 10 Things Regulators Expect

9/13/ /20 Vision for Vendor Management & Oversight. Disclaimer. Bank Service Company Act - FIL-49-99

Any business relationship between a bank and another entity, by contract or otherwise

9/14/2015. Before we begin. Learning Objectives. Kevin Secrest IT Audit Manager, University of Pennsylvania

Vendor Management: An Enterprise-wide Focus. Susan Orr, CISA CISM CRISC CRP Susan Orr Consulting, Ltd.

HIPAA Privacy Rule Policies

VENDOR MANAGEMENT. General Overview

PCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1

HOW SECURE IS YOUR PAYMENT CARD DATA?

Information for Management of a Service Organization

IT Insights. Managing Third Party Technology Risk

White Paper on Financial Institution Vendor Management

Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations. kpmg.com

Identifying and Managing Third Party Data Security Risk

3 rd -party Security Risk Assessment

SAS No. 70, Service Organizations

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014

Data Management: Considerations for Integrating Compliance Requirements At Home and Abroad. Toronto, Ontario June 14, 2005

The Other Side of CFPB Compliance

Third Party Relationships

OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT

Outsourced Third Party Relationship Management/ Vendor Management. TTS Webinar July 15, 2015 Susan Orr CISA, CISM, CRISC, CRP

A Best Practice Guide

SSAE 16 Everything You Wanted To Know But Are Afraid To Ask. Kurt Hagerman CISA, CISSP, QSA Managing Director, Coalfire December 8, 2011

Morgan Stanley. Policy for the Management of Third Party Residential Mortgage Servicing Providers

SERVICE ORGANIZATION CONTROL REPORTS SM. Formerly SAS 70 Reports

Align Technology. Data Protection Binding Corporate Rules Processor Policy Align Technology, Inc. All rights reserved.

Acquia Comments on EU Recommendations for Data Processing in the Cloud

3 rd Party Vendor Risk Management

Cloud Security and Managing Use Risks

VISP Vendor Information Security Plan: A tool for IT and Institutions to evaluate third party vendor capacity and technology to protect research data

Top 10 Tips and Tools for Meeting Regulatory Requirements and Managing Cloud Computing Providers in the United States and Around the World

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium

Third Party Supplier Security

Mohawk DI-r: Privacy Breach Management Procedure Version 2.0. April 2011

Appendix 1 Payment Card Industry Data Security Standards Program

The Hidden Risks: Managing Risks in Outsourcing Relationships. Bruce Jones Global IT Security, Compliance & Risk Manager Eastman Kodak Company

Vendor Risk Management in the New Regulatory Environment. kpmg.com

SSAE 16 for Transportation & Logistics Companies. Chris Kradjan Kim Koch

Who s Your Vendor? Secondary Market Compliance and Title Agent Vendor Management

Compliance Management Systems

3. Consent for the Collection, Use or Disclosure of Personal Information

Vendor Management: Your Questions Answered

Corporate Information Security Policy

Risk Management of Outsourced Technology Services. November 28, 2000

OUTSOURCING POLICY

Outsourcing & Regulatory Compliance Risks

Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard

Kingsway Financial Services Inc. Privacy Policy

Privacy Governance and Compliance Framework Accountability

Financial Services Guidance Note Outsourcing

Question: 1 Which of the following should be the FIRST step in developing an information security plan?

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Statement of Guidance: Outsourcing All Regulated Entities

Attachment A. Identification of Risks/Cybersecurity Governance

Due Diligence Request List: IP and IT

HOW SECURE IS YOUR PAYMENT CARD DATA? COMPLYING WITH PCI DSS

IT Vendor Due Diligence. Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014

OCIE CYBERSECURITY INITIATIVE

Data Protection for the Guidance Counsellor. Issues To Plan For

Data Privacy, Security, and Risk Management in the Cloud

HIPAA Omnibus & HITECH Rules: Key Provisions and a Simple Checklist.

PRIVATE HEALTH INSURANCE INTERMEDIARIES PRACTICE CODES JUNE 2015 VERSION 2

Document Management in the FIPPA Era

Subject: Safety and Soundness Standards for Information

Understanding SOC Reports for Effective Vendor Management. Jason T. Clinton January 26, 2016

UNFAIR, DECEPTIVE, OR ABUSIVE ACTS OR PRACTICES (UDAAP)

COMPLIANCE PROGRAM GUIDANCE FOR MEDICARE FEE-FOR-SERVICE CONTRACTORS

VENDORINSIGHTU P D A T E

Outsourcing Technology Services A Management Decision

Transcription:

CFPB Readiness Series: Compliant Vendor Management Overview

Legal Disclaimer This information is not intended to be legal advice and may not be used as legal advice. Legal advice must be tailored to the specific circumstances of each case. Every effort has been made to assure that this information is up-to-date as of the date of publication. It is not intended to be a full and exhaustive explanation of the law in any area, nor should it be used to replace the advice of your own legal counsel.

Who is KirkpatrickPrice? KirkpatrickPrice is a licensed CPA firm, providing assurance services to over 200 clients in more than 40 states, Canada, Asia and Europe. The firm has over 10 years of experience in information assurance by performing assessments, audits, and tests that strengthen information security, and compliance controls.

Welcome Todd Stephenson is an Information Security Specialist helping collection agencies and law firms prepare for a CFPB examination. Certified Information Systems Auditor (CISA) Information Security Specialist Over four years working with the ARM industry

What s Changed? In the past: Vendor compliance managed contractually Compliance risk/responsibility was transferred Compliance activity kept at arms length

What s Changed? Now: Full chain of custody The CFPB expects you to oversee their business relationships with service providers in a manner that ensures compliance with Federal consumer financial law... Effective Process CFPB Bulletin 2012-03 dated April 13, 2012

Who s Responsible for What? If you have "any person (i.e. service provider) that provides a material service to a covered person (i.e. you) in connection with the offering or provision by such covered person of a consumer financial product or service" then you are responsible for their compliance to all relevant CFPB requirements. The service provider is also responsible to the CFPB. No one gets a free pass Its both! The CFPB s exercise of its supervisory and enforcement authority will closely reflect this orientation and emphasis.

Welcome Jessie Skibbe is a Certified Credit and Collections Compliance Officer & former Chief Compliance Officer with 10 years of ARM industry experience. A recent addition to the KirkpatrickPrice team, she is focused on assisting the ARM Industry in meeting regulatory compliance & information security objectives. Certified Credit & Collections Compliance Officer (CCCO) Certified Information Systems Security Professional (CISSP) Certified Information Security Manager (CISM)

Vendor Compliance Managment 5 Core Components Risk Assessment Due Diligence in Onboarding Written Contractual Requirements Ongoing Monitoring and Audit Termination

Before you Begin Risk Assessment Evaluate the risk associated with the outsourced function. Determine vendor types & areas of risk to consider Vendors performing consumer facing activities Vendor receiving & storing confidential information Vendors requiring unattended access

Program Components Risk Assessment Policy & Procedure Requires the review of the dependency of the function Review of applicable federal and state law(s) associated with the function Defined frequency

Program Components Risk Assessment Template or Worksheet Evaluation of estimated account volume Evaluation of the data elements required to perform the services Information Security Assessment Business Continuity Plan Insurance Coverage Is the use of subcontractors required to perform the services

Program Components Due Diligence in Onboarding Policy listing the requirement Procedure detailing: Responsibility for performing a checklist of functions Formal evaluation of risk and management sign off Templates

Program Components Due Diligence in Onboarding Policy and Procedure RFP or Questionnaire is used to gather information for utilization in the risk assessment process. Requirement for formal risk assessment and acceptance of risk by executive management Corresponds with the contract review stage Corresponds to the monitoring and audit phase

Program Components Written Contractual Requirements Policy, Procedure & Checklists Clear expectations about compliance with applicable federal and state consumer financial protection laws. Clear definition of each party s responsibilities for information security and privacy of consumer data including maintaining fully documented information security policies and procedures.

Program Components Written Contractual Requirements Policy, Procedure & Checklists The third party s responsibility to conduct employee background checks for all employees The third party s responsibility to conduct adequate employee training. Training on policies, procedures, applicable state and federal consumer financial laws and information security awareness training is required. The third party s responsibility to notify you upon any suspected data breach.

Program Components Written Contractual Requirements Policy, Procedure and Checklists The third party s responsibility to obtain permission from you prior to sharing confidential consumer data with any other entity. The right for you to terminate the contract upon reasonable notice and without penalty. Instructions for data destruction if applicable.

Program Components Ongoing Monitoring and Audit Policy and Procedure Define the requirement for monitoring and audit Define the responsibility for the function Define the audit report requirements What to Monitor Telephone Calls Employee Training Consumer Complaints

Prepare for Audit Retain copies of formal risk assessments Perform a review of your vendor contracts now to ensure the required components are met. Have them readily available. Retain copies of contract review checklists Retain copies of monitoring efforts and audits performed Ensure retention period match with documented policy and procedure.

Termination Program Components Policy and Procedure Define the process of terminating a relationship to tie up loose ends. Destruction of the data Cancellation of the contract Extension of Non Disclosure Agreements if applicable.

Thank you for attending our Webinar Q & A For further information contact: Todd Stephenson t.stephenson@kirkpatrickprice.com 800.977.3154 Ext. 202

KirkpatrickPrice Services Compliance Management System Program development and consulting Policy & procedure drafting Risk assessment guidance Internal audit plan development CFPB Readiness Audit Information Security Audit Guidance and audit services: PCI DSS 3.0 SSAE 16 SOC 2 FISMA ISO 27001 / 27002

Coming up Next CFPB Readiness Series: Complaint Resolution and Tracking When: September 24th The CFPB Examination Procedures for Debt Collection indicates a review of the comprehensiveness of systems, procedures and/or flowcharts for capturing, logging, tracking, handling, and reporting disputes and/or complaints and their resolutions will be performed. Will you be ready?