SlideShare une entreprise Scribd logo
1  sur  37
Télécharger pour lire hors ligne
Discover why 50,000 professionals have
       already switched to easy2comply




Foreign Corrupt Practices Act of 1977
         UK Anti-Bribery Act
Introduction

• In spite of some broad and some minor differences
  between the FCPA and the UK Bribery Act, there is a
  wide overlap between the two sets of requirements
• Firms can ease the management and review of
  their obligations using the easy2comply Risk
  Management software
Software Focus

• The easy2comply software is focused on these
  areas:
  1. Corruption and Bribery Risk Assessment
  2. Internal Control Monitoring
  3. Policy Dissemination and Sign Off
  4. Incident Management
  5. Anonymous Whistleblowing
• The following slides will take you through each
  point
Corruption and Bribery Risk Assessment



                                         4
Corruption and Bribery Risk Assessment

• Create a “map” of your company
• Focus on troublesome areas such as:
  – Third parties
  – Known countries
  – Agents
• Identify potential risks
• Assess risks based on:
  – Severity / Likelihood
  – Customised Scorecards
Business Structure

      • No limitation to hierarchy
      • Create easy visual
        representation of business
        model
      • Simple user access model
        ensuring people can only
        see / edit what they are
        allowed to
Risk Profiling (Scorecards)




• Flexible scorecards – build your own question sets,
  answers and scoring methodology
• Ensures consistency and standardisation
Specific Risk Identification and Assessment




• Add your own risks
• See risks listed neatly and concisely
• Each risk can be explored for a much richer analysis
Clear Risk Documentation
Risk Assessment




• Impact and Likelihood assessment
• Residual Risk based on implemented controls
• Different methodologies available
Benefits of Risk Assessment

• Easily identify based on risk assessment where
  the most problematic areas are
• Share Risk Assessments with people from
  across the company, no matter where they are
• Generate charts and Excel reports
Internal Control Monitoring



                              12
Internal Control Monitoring

• Build dynamic library of controls
• Assign responsibilities for checking the
  controls
• Document evidence on frequent basis
• Attach files and documents as part of
  information gathering process
Control Libraries




• Add your own controls
• See who checked them and when
• See when they are next due for testing
Control Documentation
Create a Test Plan
Document Findings and Recommendations
Upload Attachments as Evidence
Easy Reporting
Benefits of Internal Control Monitoring

• All data is time-stamped and user-stamped,
  ensuring full traceability and auditability
• People can work in parallel
• Evidence uploaded directly into the software
• Makes it very easy to demonstrate that there
  is a proper and formal process to manage
  controls
• Automated notifications and alerts
• Simple reporting and charting
Policy Dissemination and Sign Off



                                    21
Policy Review
Track the Policy Team
Management Signatures




• Track who has signed off on the policy in real time
• Monitor those that haven’t signed
• Creates a digital signature
Policy Sign Off Benefits

• Proof that management have seen and
  reviewed the policy
• Track who has signed and who hasn’t
• Include questionnaires (if desired) to ensure
  the policy is understood
Incident Management



                      26
Incident Management

• Identify new and old incidents relating to
  fraud and corruption
• Track the investigation and remediation
  process
• Demonstrate to officials that there was clear
  ownership and accountability from the
  moment the issue was identified
Incident Database




• Build database of fraud and corruption related
  events and incidents
• Filter by location, business and date
Document the Incident
Draw Conclusions and Recommendations
Incident Management Benefits

• Anywhere in the world, incidents can be
  created and entered into the database
• Document proof that necessary steps and
  measures were taken
• Build a library of lessons that can be learnt
  and shared with other business groups
Anonymous Whistleblowing



                           32
Anonymous Whistleblowing

• Anyone can record a “potential event” relating
  to fraud, bribery and corruption
• Registrants do not need to log in to a software
  nor do they need to provide their details
• All whistleblowing events will be distributed to
  a pre-determined group within the company
  for further analysis
Where do I record the Event?

• Application homepage
• No need to log in to the
  software
• Page can be added to
  client corporate intranet
  page as well
What do they fill in?

• Fully configurable
  form
• Fields determined
  by company
• Default form can
  be seen here
Anonymous Whistleblowing Benefits

• Allows all individuals and employees peace of
  mind when recording incidents
• Company can track potential events as they
  are identified
• Prove to regulator that best efforts were made
  to provide a safe space for the reporting of
  events
For more information on the UK Bribery Act or Foreign
Corrupt Practices Act, please contact:

Jeremy Kaye jeremy.kaye@easy2comply.com
Sales       sales@easy2comply.com
                                                        37

Contenu connexe

Tendances

ISStateGovtProposal
ISStateGovtProposalISStateGovtProposal
ISStateGovtProposalDale White
 
Security ibm fv3 for ss 012915
Security ibm fv3 for ss 012915Security ibm fv3 for ss 012915
Security ibm fv3 for ss 012915IBMITServicesUS
 
QA Fest 2017. Per Thorsheim.GDPR - An overview and its relevance for QA
QA Fest 2017. Per Thorsheim.GDPR - An overview and its relevance for QAQA Fest 2017. Per Thorsheim.GDPR - An overview and its relevance for QA
QA Fest 2017. Per Thorsheim.GDPR - An overview and its relevance for QAQAFest
 
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance FiresLiraz Goldstein
 
A business driven approach to security policy management a technical perspec...
A business driven approach to security policy management  a technical perspec...A business driven approach to security policy management  a technical perspec...
A business driven approach to security policy management a technical perspec...AlgoSec
 
Learn how an app-centric approach will improve security & operational efficiency
Learn how an app-centric approach will improve security & operational efficiencyLearn how an app-centric approach will improve security & operational efficiency
Learn how an app-centric approach will improve security & operational efficiencyAdi Gazit Blecher
 

Tendances (7)

ISStateGovtProposal
ISStateGovtProposalISStateGovtProposal
ISStateGovtProposal
 
Security ibm fv3 for ss 012915
Security ibm fv3 for ss 012915Security ibm fv3 for ss 012915
Security ibm fv3 for ss 012915
 
QA Fest 2017. Per Thorsheim.GDPR - An overview and its relevance for QA
QA Fest 2017. Per Thorsheim.GDPR - An overview and its relevance for QAQA Fest 2017. Per Thorsheim.GDPR - An overview and its relevance for QA
QA Fest 2017. Per Thorsheim.GDPR - An overview and its relevance for QA
 
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
 
Software Engineering Trends: Mainroad Service Management
Software Engineering Trends: Mainroad Service ManagementSoftware Engineering Trends: Mainroad Service Management
Software Engineering Trends: Mainroad Service Management
 
A business driven approach to security policy management a technical perspec...
A business driven approach to security policy management  a technical perspec...A business driven approach to security policy management  a technical perspec...
A business driven approach to security policy management a technical perspec...
 
Learn how an app-centric approach will improve security & operational efficiency
Learn how an app-centric approach will improve security & operational efficiencyLearn how an app-centric approach will improve security & operational efficiency
Learn how an app-centric approach will improve security & operational efficiency
 

Similaire à Discover why 50K switch to easy2comply

Conducting an Information Systems Audit
Conducting an Information Systems Audit Conducting an Information Systems Audit
Conducting an Information Systems Audit Sreekanth Narendran
 
Customer Favorite Features: Popular Co3 Product Updates & A Special Promotion
Customer Favorite Features: Popular Co3 Product Updates & A Special PromotionCustomer Favorite Features: Popular Co3 Product Updates & A Special Promotion
Customer Favorite Features: Popular Co3 Product Updates & A Special PromotionResilient Systems
 
FixNix 17 products1.0
FixNix 17 products1.0FixNix 17 products1.0
FixNix 17 products1.0FixNix Inc.,
 
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxColorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxAkramAlqadasi1
 
Cyber security series administrative control breaches
Cyber security series   administrative control breaches Cyber security series   administrative control breaches
Cyber security series administrative control breaches Jim Kaplan CIA CFE
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchMcKonly & Asbury, LLP
 
Contego Fraud Solutions Ltd fin tech week 2014
Contego Fraud Solutions Ltd fin tech week 2014Contego Fraud Solutions Ltd fin tech week 2014
Contego Fraud Solutions Ltd fin tech week 2014Rebecca1243
 
Digital audit websites overview
Digital audit websites overviewDigital audit websites overview
Digital audit websites overviewseadeloitte
 
Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Scott Carlson
 
IBM i Security SIEM Integration
IBM i Security SIEM IntegrationIBM i Security SIEM Integration
IBM i Security SIEM IntegrationPrecisely
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredPrecisely
 
ITAM US 2017 Audit Defense Plugging the Leaks
ITAM US 2017 Audit Defense Plugging the Leaks ITAM US 2017 Audit Defense Plugging the Leaks
ITAM US 2017 Audit Defense Plugging the Leaks Martin Thompson
 
SLVA - Security monitoring and reporting itweb workshop
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshopSLVA Information Security
 
How to prepare for your first anti fraud review
How to prepare for your first anti fraud reviewHow to prepare for your first anti fraud review
How to prepare for your first anti fraud reviewJim Kaplan CIA CFE
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationMcKonly & Asbury, LLP
 
Decrease Cyber Risk at your Community Bank
Decrease Cyber Risk at your Community BankDecrease Cyber Risk at your Community Bank
Decrease Cyber Risk at your Community BankGreat Bay Software
 
Enterprise Risk Management Solutions
Enterprise Risk Management SolutionsEnterprise Risk Management Solutions
Enterprise Risk Management SolutionsLexComply
 

Similaire à Discover why 50K switch to easy2comply (20)

chapter2-190516054412.pdf
chapter2-190516054412.pdfchapter2-190516054412.pdf
chapter2-190516054412.pdf
 
Conducting an Information Systems Audit
Conducting an Information Systems Audit Conducting an Information Systems Audit
Conducting an Information Systems Audit
 
Customer Favorite Features: Popular Co3 Product Updates & A Special Promotion
Customer Favorite Features: Popular Co3 Product Updates & A Special PromotionCustomer Favorite Features: Popular Co3 Product Updates & A Special Promotion
Customer Favorite Features: Popular Co3 Product Updates & A Special Promotion
 
FixNix 17 products1.0
FixNix 17 products1.0FixNix 17 products1.0
FixNix 17 products1.0
 
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxColorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
 
Cyber security series administrative control breaches
Cyber security series   administrative control breaches Cyber security series   administrative control breaches
Cyber security series administrative control breaches
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
 
Contego Fraud Solutions Ltd fin tech week 2014
Contego Fraud Solutions Ltd fin tech week 2014Contego Fraud Solutions Ltd fin tech week 2014
Contego Fraud Solutions Ltd fin tech week 2014
 
Digital audit websites overview
Digital audit websites overviewDigital audit websites overview
Digital audit websites overview
 
Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?
 
DigitalKYC_Modules.pdf
DigitalKYC_Modules.pdfDigitalKYC_Modules.pdf
DigitalKYC_Modules.pdf
 
IBM i Security SIEM Integration
IBM i Security SIEM IntegrationIBM i Security SIEM Integration
IBM i Security SIEM Integration
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
 
ITAM US 2017 Audit Defense Plugging the Leaks
ITAM US 2017 Audit Defense Plugging the Leaks ITAM US 2017 Audit Defense Plugging the Leaks
ITAM US 2017 Audit Defense Plugging the Leaks
 
SLVA - Security monitoring and reporting itweb workshop
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshop
 
How to prepare for your first anti fraud review
How to prepare for your first anti fraud reviewHow to prepare for your first anti fraud review
How to prepare for your first anti fraud review
 
GDPR Series Session 4
GDPR Series Session 4GDPR Series Session 4
GDPR Series Session 4
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
Decrease Cyber Risk at your Community Bank
Decrease Cyber Risk at your Community BankDecrease Cyber Risk at your Community Bank
Decrease Cyber Risk at your Community Bank
 
Enterprise Risk Management Solutions
Enterprise Risk Management SolutionsEnterprise Risk Management Solutions
Enterprise Risk Management Solutions
 

Plus de easy2comply

easy2comply Partner's Training Workbook
easy2comply Partner's Training Workbookeasy2comply Partner's Training Workbook
easy2comply Partner's Training Workbookeasy2comply
 
Webinar - Disaster in Japan: A Lesson in BCM
Webinar - Disaster in Japan: A Lesson in BCMWebinar - Disaster in Japan: A Lesson in BCM
Webinar - Disaster in Japan: A Lesson in BCMeasy2comply
 
Webinar - Risk Methodologies - Why are there so many?
Webinar - Risk Methodologies - Why are there so many?Webinar - Risk Methodologies - Why are there so many?
Webinar - Risk Methodologies - Why are there so many?easy2comply
 
Online Training Solvency II
Online Training Solvency IIOnline Training Solvency II
Online Training Solvency IIeasy2comply
 
Online Training Sarbanes-Oxley
Online Training Sarbanes-OxleyOnline Training Sarbanes-Oxley
Online Training Sarbanes-Oxleyeasy2comply
 
Online Training Internal Control Management
Online Training Internal Control ManagementOnline Training Internal Control Management
Online Training Internal Control Managementeasy2comply
 
Online Training Information Security Management
Online Training Information Security ManagementOnline Training Information Security Management
Online Training Information Security Managementeasy2comply
 
Online Training Basel II
Online Training Basel IIOnline Training Basel II
Online Training Basel IIeasy2comply
 
Compliance Management Software
Compliance Management SoftwareCompliance Management Software
Compliance Management Softwareeasy2comply
 
Risk Management Software
Risk Management SoftwareRisk Management Software
Risk Management Softwareeasy2comply
 

Plus de easy2comply (10)

easy2comply Partner's Training Workbook
easy2comply Partner's Training Workbookeasy2comply Partner's Training Workbook
easy2comply Partner's Training Workbook
 
Webinar - Disaster in Japan: A Lesson in BCM
Webinar - Disaster in Japan: A Lesson in BCMWebinar - Disaster in Japan: A Lesson in BCM
Webinar - Disaster in Japan: A Lesson in BCM
 
Webinar - Risk Methodologies - Why are there so many?
Webinar - Risk Methodologies - Why are there so many?Webinar - Risk Methodologies - Why are there so many?
Webinar - Risk Methodologies - Why are there so many?
 
Online Training Solvency II
Online Training Solvency IIOnline Training Solvency II
Online Training Solvency II
 
Online Training Sarbanes-Oxley
Online Training Sarbanes-OxleyOnline Training Sarbanes-Oxley
Online Training Sarbanes-Oxley
 
Online Training Internal Control Management
Online Training Internal Control ManagementOnline Training Internal Control Management
Online Training Internal Control Management
 
Online Training Information Security Management
Online Training Information Security ManagementOnline Training Information Security Management
Online Training Information Security Management
 
Online Training Basel II
Online Training Basel IIOnline Training Basel II
Online Training Basel II
 
Compliance Management Software
Compliance Management SoftwareCompliance Management Software
Compliance Management Software
 
Risk Management Software
Risk Management SoftwareRisk Management Software
Risk Management Software
 

Dernier

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Dernier (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Discover why 50K switch to easy2comply

  • 1. Discover why 50,000 professionals have already switched to easy2comply Foreign Corrupt Practices Act of 1977 UK Anti-Bribery Act
  • 2. Introduction • In spite of some broad and some minor differences between the FCPA and the UK Bribery Act, there is a wide overlap between the two sets of requirements • Firms can ease the management and review of their obligations using the easy2comply Risk Management software
  • 3. Software Focus • The easy2comply software is focused on these areas: 1. Corruption and Bribery Risk Assessment 2. Internal Control Monitoring 3. Policy Dissemination and Sign Off 4. Incident Management 5. Anonymous Whistleblowing • The following slides will take you through each point
  • 4. Corruption and Bribery Risk Assessment 4
  • 5. Corruption and Bribery Risk Assessment • Create a “map” of your company • Focus on troublesome areas such as: – Third parties – Known countries – Agents • Identify potential risks • Assess risks based on: – Severity / Likelihood – Customised Scorecards
  • 6. Business Structure • No limitation to hierarchy • Create easy visual representation of business model • Simple user access model ensuring people can only see / edit what they are allowed to
  • 7. Risk Profiling (Scorecards) • Flexible scorecards – build your own question sets, answers and scoring methodology • Ensures consistency and standardisation
  • 8. Specific Risk Identification and Assessment • Add your own risks • See risks listed neatly and concisely • Each risk can be explored for a much richer analysis
  • 10. Risk Assessment • Impact and Likelihood assessment • Residual Risk based on implemented controls • Different methodologies available
  • 11. Benefits of Risk Assessment • Easily identify based on risk assessment where the most problematic areas are • Share Risk Assessments with people from across the company, no matter where they are • Generate charts and Excel reports
  • 13. Internal Control Monitoring • Build dynamic library of controls • Assign responsibilities for checking the controls • Document evidence on frequent basis • Attach files and documents as part of information gathering process
  • 14. Control Libraries • Add your own controls • See who checked them and when • See when they are next due for testing
  • 17. Document Findings and Recommendations
  • 20. Benefits of Internal Control Monitoring • All data is time-stamped and user-stamped, ensuring full traceability and auditability • People can work in parallel • Evidence uploaded directly into the software • Makes it very easy to demonstrate that there is a proper and formal process to manage controls • Automated notifications and alerts • Simple reporting and charting
  • 24. Management Signatures • Track who has signed off on the policy in real time • Monitor those that haven’t signed • Creates a digital signature
  • 25. Policy Sign Off Benefits • Proof that management have seen and reviewed the policy • Track who has signed and who hasn’t • Include questionnaires (if desired) to ensure the policy is understood
  • 27. Incident Management • Identify new and old incidents relating to fraud and corruption • Track the investigation and remediation process • Demonstrate to officials that there was clear ownership and accountability from the moment the issue was identified
  • 28. Incident Database • Build database of fraud and corruption related events and incidents • Filter by location, business and date
  • 30. Draw Conclusions and Recommendations
  • 31. Incident Management Benefits • Anywhere in the world, incidents can be created and entered into the database • Document proof that necessary steps and measures were taken • Build a library of lessons that can be learnt and shared with other business groups
  • 33. Anonymous Whistleblowing • Anyone can record a “potential event” relating to fraud, bribery and corruption • Registrants do not need to log in to a software nor do they need to provide their details • All whistleblowing events will be distributed to a pre-determined group within the company for further analysis
  • 34. Where do I record the Event? • Application homepage • No need to log in to the software • Page can be added to client corporate intranet page as well
  • 35. What do they fill in? • Fully configurable form • Fields determined by company • Default form can be seen here
  • 36. Anonymous Whistleblowing Benefits • Allows all individuals and employees peace of mind when recording incidents • Company can track potential events as they are identified • Prove to regulator that best efforts were made to provide a safe space for the reporting of events
  • 37. For more information on the UK Bribery Act or Foreign Corrupt Practices Act, please contact: Jeremy Kaye jeremy.kaye@easy2comply.com Sales sales@easy2comply.com 37