SlideShare une entreprise Scribd logo
1  sur  16
Electronic Communications
Compliance for Investment
Advisors
Sometimes the internet shares wisdom…
Sometimes it doesn’t…
Actual Status Updates
 All I want is a little more than I’ll ever get.
 If the US defaults, will China repossess our
elected officials? Just thinking out loud
here.
 You’re only young once. If you act like a
fool after that, you’re gonna need a new
excuse.
 I won’t rest until I find a cure for Insomnia.
 Dick Clark has died. We can no longer ring
in the new year… Well played, Mayans.
Well played.
 Easy to post content from
anywhere using mobile
devices
 33% of Facebook posts
according to HubSpot
 350 million active users
access Facebook through
mobile devices according to
LeadBolt
Computers & Personal Devices
Regulatory Compliance, E-Discovery &
Records Retention
 Capture, Retain & Produce
 SEC 17a-3, 17a-4, 204-2
 FINRA 3010, 3012, 3110, 3130B, 8210
 FINRA Reg. Notices 07-59, 10-06, 10-59, 11-39
 Suitability, Advertising & Surveillance
 Supervise/govern
 FINRA 3010, 3110, 3130B
 Data Protection
 Email Encryption/Data-Leak Prevention
 46 state data protection/data-breach notification (MA,
NV, CA)
 Gramm Leach Bliley Act/Regulation S-P
“Increasingly there’s going to be a look at
technology… and how technology supports
everything from policy governance to risk assessment
to training. If the business is spending a lot on
technology to make money and drive the business
and not spending money on technology to facilitate
risk and compliance and control, there’s a
disequilibrium there.”
~ Carlo do Florio,
SEC Director of Compliance
Electronic Communications
Need to be Archived.
 Compliance & Risk
 Legal
 Human
Resources/Administration
 Marketing/Advertising
 Distribution
 IT
The Bottom Line…
Findings from the Smarsh 2013 Electronic Communications Compliance Survey indicates that respondents who
allow and govern social media use are nearly twice as confident in their ability to provide specifically
requested messages, within a reasonable time frame, for compliance purposes.
SMS Text Enterprise
Social
networks
File sharing and
synch platforms
(i.e. Dropbox)
Facebook LinkedIN Twitter IM
33%
23%
44%
28%
48%
21%
48%
32%
58%
44%
66%
29%
76%
30%
Allow Usage Prohibit Usage
ALLOW OR PROHIBIT:
WHO IS MORE CONFIDENT?
Sophisticated tools for companies in regulated and litigious industries.
Comprehensive capture
Chatter posts, comments, shares, files, direct
messages and profile updates are all captured in
their original format which maintains all
communication details, including who, when and
where a message posted.
Real-time processing
Capture all Chatter conversations the instant they
happen, so information can’t be deleted.
Large file support
Archive files of any size uploaded to
Salesforce.com.
Scale
Designed and tested to scale to hundreds of
thousands of users, the platform will allow you to
grow your Chatter install base and increase
adoption quickly.
Intelligent search
Enable faster and granular searching across your
data by any number of variables, including
user, group, post type, object or date and time.
Policy engine
Create policies based on nearly any criteria to
automate reviews and message classification.
Apply precise risk-scoring criteria and assign follow
up actions.
Compliance tools
Perform powerful compliance and e-discovery
reviews and easily mark, flag, tag and assign
messages to other reviewers.
Audit trail
Provide proof of supervision and message review
with a full audit trail of every action taken within
the archive.
Reports
Drill down on message stats and analytics and be
more informed about your archived data and
review activity.
Notifications
Create and manage daily, weekly or monthly email
reports that are triggered by your criteria, such as
keyword or policy matches.
Flexible exports
Easily download, print, forward or export Chatter
communication from your Smarsh archive in
multiple formats, including AES 256-encrypted files.
ARCHIVE SEARCH & REVIEW PRODUCE & ANALYZE
Secure, compliant
and redundant data
centers
 Managed and
operated by
Smarsh
 SAS70, SSAE16
SOC 2 & 3
 Systrust certified
Authentication via
256-bit SSL
encryption
Safe Harbor
Certified
Audited annually by
KPMG
Ranked #1 in Overall
Customer Service
among hosted
archiving vendors
according to
Osterman Research
Implementation
team and live
trainings
24 x 7 x 365
technical support
staff available
Audit and
e-discovery support
and custom
reporting
Portland, OR
Atlanta, GA
Boston, MA
New York, NY
Los Angeles, CA
5 Offices, Portland HQ
150+ Employees
Sales/Marketing
Operations/Development
Support
20,000+ Customers
Heavily Regulated Industries
Financial, Healthcare,
Government, SMB/Enterprise
Over the last decade, Smarsh has established
itself as a force in the message-archive and
security space within the US financial sector.
2012 Magic Quadrant for
Enterprise Information Archiving
Jackie Augusta
Jackie.augusta@smarsh.com
www.smarsh.com
facebook.com/SmarshInc
Q&A

Contenu connexe

Tendances

Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Entersoft Security
 
Industry Trendsin Information Security
Industry Trendsin Information SecurityIndustry Trendsin Information Security
Industry Trendsin Information SecurityGary Bahadur
 
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017SurfWatch Labs
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation AniketPandit18
 
Strong Authentication in Cyberspace 8 key principles for policymakers
Strong Authentication in Cyberspace 8 key principles for policymakersStrong Authentication in Cyberspace 8 key principles for policymakers
Strong Authentication in Cyberspace 8 key principles for policymakersMark Gibson
 
What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?Samvel Gevorgyan
 
CERT STRATEGY TO DEAL WITH PHISHING ATTACKS
CERT STRATEGY TO DEAL WITH PHISHING ATTACKSCERT STRATEGY TO DEAL WITH PHISHING ATTACKS
CERT STRATEGY TO DEAL WITH PHISHING ATTACKScsandit
 
Cyber security
Cyber securityCyber security
Cyber securityJoseMerda1
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security ProtectionShawn Crimson
 
Can you predict who will win the US election?
Can you predict who will win the US election?Can you predict who will win the US election?
Can you predict who will win the US election?Samvel Gevorgyan
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016Nathan CAVRIL
 
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceColombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceDulanja Liyanage
 
Phishing detection & protection scheme
Phishing detection & protection schemePhishing detection & protection scheme
Phishing detection & protection schemeMussavir Shaikh
 
3rd Part Cyber Risk Report - 2018
3rd Part Cyber Risk Report - 20183rd Part Cyber Risk Report - 2018
3rd Part Cyber Risk Report - 2018NormShield
 
PhishingBox Presents 'What is Phishing' 2017
PhishingBox Presents 'What is Phishing' 2017PhishingBox Presents 'What is Phishing' 2017
PhishingBox Presents 'What is Phishing' 2017Ryan Hardesty
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing AttacksJagan Mohan
 
Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh WebinarArrow ECS UK
 

Tendances (20)

Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018
 
Industry Trendsin Information Security
Industry Trendsin Information SecurityIndustry Trendsin Information Security
Industry Trendsin Information Security
 
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
 
Strong Authentication in Cyberspace 8 key principles for policymakers
Strong Authentication in Cyberspace 8 key principles for policymakersStrong Authentication in Cyberspace 8 key principles for policymakers
Strong Authentication in Cyberspace 8 key principles for policymakers
 
What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?
 
CERT STRATEGY TO DEAL WITH PHISHING ATTACKS
CERT STRATEGY TO DEAL WITH PHISHING ATTACKSCERT STRATEGY TO DEAL WITH PHISHING ATTACKS
CERT STRATEGY TO DEAL WITH PHISHING ATTACKS
 
Cyber security
Cyber securityCyber security
Cyber security
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
 
Can you predict who will win the US election?
Can you predict who will win the US election?Can you predict who will win the US election?
Can you predict who will win the US election?
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceColombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
 
Phishing detection & protection scheme
Phishing detection & protection schemePhishing detection & protection scheme
Phishing detection & protection scheme
 
3rd Part Cyber Risk Report - 2018
3rd Part Cyber Risk Report - 20183rd Part Cyber Risk Report - 2018
3rd Part Cyber Risk Report - 2018
 
PhishingBox Presents 'What is Phishing' 2017
PhishingBox Presents 'What is Phishing' 2017PhishingBox Presents 'What is Phishing' 2017
PhishingBox Presents 'What is Phishing' 2017
 
Phishing
PhishingPhishing
Phishing
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 
Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh Webinar
 

Similaire à RIA Roadshow - Electronic Communications Compliance for Investment Advisors

Communication Compliance in Microsoft 365
Communication Compliance in Microsoft 365Communication Compliance in Microsoft 365
Communication Compliance in Microsoft 365Joanne Klein
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsCSantosConleyha
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsCAbbyWhyte974
 
Replies Required for below Posting 1 user security awarene.docx
Replies Required for below  Posting 1  user security awarene.docxReplies Required for below  Posting 1  user security awarene.docx
Replies Required for below Posting 1 user security awarene.docxsodhi3
 
Microsoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security OverviewMicrosoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security OverviewDavid J Rosenthal
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachJon Gatrell
 
Solving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial ServicesSolving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial ServicesEchoworx
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForcePatrick Bouillaud
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141sraina2
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesCompTIA
 
Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy Ioannis Aligizakis, M.Sc.
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessGreg Wartes, MCP
 
The Data Privacy Imperative
The Data Privacy ImperativeThe Data Privacy Imperative
The Data Privacy Imperativebutest
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4stevemeltzer
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4stevemeltzer
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4stevemeltzer
 

Similaire à RIA Roadshow - Electronic Communications Compliance for Investment Advisors (20)

Communication Compliance in Microsoft 365
Communication Compliance in Microsoft 365Communication Compliance in Microsoft 365
Communication Compliance in Microsoft 365
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC
 
Replies Required for below Posting 1 user security awarene.docx
Replies Required for below  Posting 1  user security awarene.docxReplies Required for below  Posting 1  user security awarene.docx
Replies Required for below Posting 1 user security awarene.docx
 
Microsoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security OverviewMicrosoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security Overview
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data Breach
 
Solving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial ServicesSolving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial Services
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for Businesses
 
Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
 
Search Inform DLP
Search Inform DLPSearch Inform DLP
Search Inform DLP
 
The Data Privacy Imperative
The Data Privacy ImperativeThe Data Privacy Imperative
The Data Privacy Imperative
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 

Plus de Smarsh

3 ways to respond to a records request
3 ways to respond to a records request3 ways to respond to a records request
3 ways to respond to a records requestSmarsh
 
Social Media Policy Essentials for Lenders and Brokers
Social Media Policy Essentials for Lenders and BrokersSocial Media Policy Essentials for Lenders and Brokers
Social Media Policy Essentials for Lenders and BrokersSmarsh
 
FINRA's Record-Breaking Sanctions of 2015
FINRA's Record-Breaking Sanctions of 2015FINRA's Record-Breaking Sanctions of 2015
FINRA's Record-Breaking Sanctions of 2015Smarsh
 
Navigating the expanding compliance perimeter smarsh 2016_notes_20 04 16_video
Navigating the expanding compliance perimeter smarsh 2016_notes_20 04 16_videoNavigating the expanding compliance perimeter smarsh 2016_notes_20 04 16_video
Navigating the expanding compliance perimeter smarsh 2016_notes_20 04 16_videoSmarsh
 
Social Media and Mortgage Regulation: What's Next?
Social Media and Mortgage Regulation: What's Next?Social Media and Mortgage Regulation: What's Next?
Social Media and Mortgage Regulation: What's Next?Smarsh
 
Smarsh social media in investment banking
Smarsh social media in investment bankingSmarsh social media in investment banking
Smarsh social media in investment bankingSmarsh
 
Solving Compliance Issues for Office365/Exchange Online Environments
Solving Compliance Issues for Office365/Exchange Online EnvironmentsSolving Compliance Issues for Office365/Exchange Online Environments
Solving Compliance Issues for Office365/Exchange Online EnvironmentsSmarsh
 
Social Media for Lenders Webinar featuring Lee Negroni
Social Media for Lenders Webinar featuring Lee NegroniSocial Media for Lenders Webinar featuring Lee Negroni
Social Media for Lenders Webinar featuring Lee NegroniSmarsh
 
Smarsh social media trends, insights, and best practices from 2015 compliance...
Smarsh social media trends, insights, and best practices from 2015 compliance...Smarsh social media trends, insights, and best practices from 2015 compliance...
Smarsh social media trends, insights, and best practices from 2015 compliance...Smarsh
 
The Regulatory Landscape: Recordkeeping, Advertising, and Social Media
The Regulatory Landscape: Recordkeeping, Advertising, and Social MediaThe Regulatory Landscape: Recordkeeping, Advertising, and Social Media
The Regulatory Landscape: Recordkeeping, Advertising, and Social MediaSmarsh
 
ValMark Chooses Smarsh to Archive for Compliance and E-Discovery
ValMark Chooses Smarsh to Archive for Compliance and E-DiscoveryValMark Chooses Smarsh to Archive for Compliance and E-Discovery
ValMark Chooses Smarsh to Archive for Compliance and E-DiscoverySmarsh
 
The Legal Perspective: Retaining and Supervising Electronic Communications fo...
The Legal Perspective: Retaining and Supervising Electronic Communications fo...The Legal Perspective: Retaining and Supervising Electronic Communications fo...
The Legal Perspective: Retaining and Supervising Electronic Communications fo...Smarsh
 
Financial Advisor's Guide To Social Media Policy and Strategy
Financial Advisor's Guide To Social Media Policy and StrategyFinancial Advisor's Guide To Social Media Policy and Strategy
Financial Advisor's Guide To Social Media Policy and StrategySmarsh
 
The Social Advisor : Social Media Secrets for Savvy Advisors
The Social Advisor : Social Media Secrets for Savvy AdvisorsThe Social Advisor : Social Media Secrets for Savvy Advisors
The Social Advisor : Social Media Secrets for Savvy AdvisorsSmarsh
 
Successful Social Media for Mortgage Lenders: Engage With Your Audience While...
Successful Social Media for Mortgage Lenders: Engage With Your Audience While...Successful Social Media for Mortgage Lenders: Engage With Your Audience While...
Successful Social Media for Mortgage Lenders: Engage With Your Audience While...Smarsh
 
Social Media for Advisors: Use Storytelling to Create Content
Social Media for Advisors: Use Storytelling to Create ContentSocial Media for Advisors: Use Storytelling to Create Content
Social Media for Advisors: Use Storytelling to Create ContentSmarsh
 
Social Media for Advisors: Is Anyone Listening?
Social Media for Advisors: Is Anyone Listening?Social Media for Advisors: Is Anyone Listening?
Social Media for Advisors: Is Anyone Listening?Smarsh
 
Heron Financial Grows Business with Social Media
Heron Financial Grows Business with Social Media Heron Financial Grows Business with Social Media
Heron Financial Grows Business with Social Media Smarsh
 
Social Media for Advisors: Understand your Audience Understand your Platform
Social Media for Advisors: Understand your Audience Understand your PlatformSocial Media for Advisors: Understand your Audience Understand your Platform
Social Media for Advisors: Understand your Audience Understand your PlatformSmarsh
 
3 Ways to Accelerate Social Selling for Regulated Organizations
3 Ways to Accelerate Social Selling for Regulated Organizations3 Ways to Accelerate Social Selling for Regulated Organizations
3 Ways to Accelerate Social Selling for Regulated OrganizationsSmarsh
 

Plus de Smarsh (20)

3 ways to respond to a records request
3 ways to respond to a records request3 ways to respond to a records request
3 ways to respond to a records request
 
Social Media Policy Essentials for Lenders and Brokers
Social Media Policy Essentials for Lenders and BrokersSocial Media Policy Essentials for Lenders and Brokers
Social Media Policy Essentials for Lenders and Brokers
 
FINRA's Record-Breaking Sanctions of 2015
FINRA's Record-Breaking Sanctions of 2015FINRA's Record-Breaking Sanctions of 2015
FINRA's Record-Breaking Sanctions of 2015
 
Navigating the expanding compliance perimeter smarsh 2016_notes_20 04 16_video
Navigating the expanding compliance perimeter smarsh 2016_notes_20 04 16_videoNavigating the expanding compliance perimeter smarsh 2016_notes_20 04 16_video
Navigating the expanding compliance perimeter smarsh 2016_notes_20 04 16_video
 
Social Media and Mortgage Regulation: What's Next?
Social Media and Mortgage Regulation: What's Next?Social Media and Mortgage Regulation: What's Next?
Social Media and Mortgage Regulation: What's Next?
 
Smarsh social media in investment banking
Smarsh social media in investment bankingSmarsh social media in investment banking
Smarsh social media in investment banking
 
Solving Compliance Issues for Office365/Exchange Online Environments
Solving Compliance Issues for Office365/Exchange Online EnvironmentsSolving Compliance Issues for Office365/Exchange Online Environments
Solving Compliance Issues for Office365/Exchange Online Environments
 
Social Media for Lenders Webinar featuring Lee Negroni
Social Media for Lenders Webinar featuring Lee NegroniSocial Media for Lenders Webinar featuring Lee Negroni
Social Media for Lenders Webinar featuring Lee Negroni
 
Smarsh social media trends, insights, and best practices from 2015 compliance...
Smarsh social media trends, insights, and best practices from 2015 compliance...Smarsh social media trends, insights, and best practices from 2015 compliance...
Smarsh social media trends, insights, and best practices from 2015 compliance...
 
The Regulatory Landscape: Recordkeeping, Advertising, and Social Media
The Regulatory Landscape: Recordkeeping, Advertising, and Social MediaThe Regulatory Landscape: Recordkeeping, Advertising, and Social Media
The Regulatory Landscape: Recordkeeping, Advertising, and Social Media
 
ValMark Chooses Smarsh to Archive for Compliance and E-Discovery
ValMark Chooses Smarsh to Archive for Compliance and E-DiscoveryValMark Chooses Smarsh to Archive for Compliance and E-Discovery
ValMark Chooses Smarsh to Archive for Compliance and E-Discovery
 
The Legal Perspective: Retaining and Supervising Electronic Communications fo...
The Legal Perspective: Retaining and Supervising Electronic Communications fo...The Legal Perspective: Retaining and Supervising Electronic Communications fo...
The Legal Perspective: Retaining and Supervising Electronic Communications fo...
 
Financial Advisor's Guide To Social Media Policy and Strategy
Financial Advisor's Guide To Social Media Policy and StrategyFinancial Advisor's Guide To Social Media Policy and Strategy
Financial Advisor's Guide To Social Media Policy and Strategy
 
The Social Advisor : Social Media Secrets for Savvy Advisors
The Social Advisor : Social Media Secrets for Savvy AdvisorsThe Social Advisor : Social Media Secrets for Savvy Advisors
The Social Advisor : Social Media Secrets for Savvy Advisors
 
Successful Social Media for Mortgage Lenders: Engage With Your Audience While...
Successful Social Media for Mortgage Lenders: Engage With Your Audience While...Successful Social Media for Mortgage Lenders: Engage With Your Audience While...
Successful Social Media for Mortgage Lenders: Engage With Your Audience While...
 
Social Media for Advisors: Use Storytelling to Create Content
Social Media for Advisors: Use Storytelling to Create ContentSocial Media for Advisors: Use Storytelling to Create Content
Social Media for Advisors: Use Storytelling to Create Content
 
Social Media for Advisors: Is Anyone Listening?
Social Media for Advisors: Is Anyone Listening?Social Media for Advisors: Is Anyone Listening?
Social Media for Advisors: Is Anyone Listening?
 
Heron Financial Grows Business with Social Media
Heron Financial Grows Business with Social Media Heron Financial Grows Business with Social Media
Heron Financial Grows Business with Social Media
 
Social Media for Advisors: Understand your Audience Understand your Platform
Social Media for Advisors: Understand your Audience Understand your PlatformSocial Media for Advisors: Understand your Audience Understand your Platform
Social Media for Advisors: Understand your Audience Understand your Platform
 
3 Ways to Accelerate Social Selling for Regulated Organizations
3 Ways to Accelerate Social Selling for Regulated Organizations3 Ways to Accelerate Social Selling for Regulated Organizations
3 Ways to Accelerate Social Selling for Regulated Organizations
 

Dernier

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 

Dernier (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 

RIA Roadshow - Electronic Communications Compliance for Investment Advisors

  • 2. Sometimes the internet shares wisdom…
  • 4. Actual Status Updates  All I want is a little more than I’ll ever get.  If the US defaults, will China repossess our elected officials? Just thinking out loud here.  You’re only young once. If you act like a fool after that, you’re gonna need a new excuse.  I won’t rest until I find a cure for Insomnia.  Dick Clark has died. We can no longer ring in the new year… Well played, Mayans. Well played.
  • 5.  Easy to post content from anywhere using mobile devices  33% of Facebook posts according to HubSpot  350 million active users access Facebook through mobile devices according to LeadBolt Computers & Personal Devices
  • 6.
  • 7. Regulatory Compliance, E-Discovery & Records Retention  Capture, Retain & Produce  SEC 17a-3, 17a-4, 204-2  FINRA 3010, 3012, 3110, 3130B, 8210  FINRA Reg. Notices 07-59, 10-06, 10-59, 11-39  Suitability, Advertising & Surveillance  Supervise/govern  FINRA 3010, 3110, 3130B  Data Protection  Email Encryption/Data-Leak Prevention  46 state data protection/data-breach notification (MA, NV, CA)  Gramm Leach Bliley Act/Regulation S-P “Increasingly there’s going to be a look at technology… and how technology supports everything from policy governance to risk assessment to training. If the business is spending a lot on technology to make money and drive the business and not spending money on technology to facilitate risk and compliance and control, there’s a disequilibrium there.” ~ Carlo do Florio, SEC Director of Compliance
  • 8. Electronic Communications Need to be Archived.  Compliance & Risk  Legal  Human Resources/Administration  Marketing/Advertising  Distribution  IT The Bottom Line…
  • 9.
  • 10. Findings from the Smarsh 2013 Electronic Communications Compliance Survey indicates that respondents who allow and govern social media use are nearly twice as confident in their ability to provide specifically requested messages, within a reasonable time frame, for compliance purposes. SMS Text Enterprise Social networks File sharing and synch platforms (i.e. Dropbox) Facebook LinkedIN Twitter IM 33% 23% 44% 28% 48% 21% 48% 32% 58% 44% 66% 29% 76% 30% Allow Usage Prohibit Usage ALLOW OR PROHIBIT: WHO IS MORE CONFIDENT?
  • 11. Sophisticated tools for companies in regulated and litigious industries. Comprehensive capture Chatter posts, comments, shares, files, direct messages and profile updates are all captured in their original format which maintains all communication details, including who, when and where a message posted. Real-time processing Capture all Chatter conversations the instant they happen, so information can’t be deleted. Large file support Archive files of any size uploaded to Salesforce.com. Scale Designed and tested to scale to hundreds of thousands of users, the platform will allow you to grow your Chatter install base and increase adoption quickly. Intelligent search Enable faster and granular searching across your data by any number of variables, including user, group, post type, object or date and time. Policy engine Create policies based on nearly any criteria to automate reviews and message classification. Apply precise risk-scoring criteria and assign follow up actions. Compliance tools Perform powerful compliance and e-discovery reviews and easily mark, flag, tag and assign messages to other reviewers. Audit trail Provide proof of supervision and message review with a full audit trail of every action taken within the archive. Reports Drill down on message stats and analytics and be more informed about your archived data and review activity. Notifications Create and manage daily, weekly or monthly email reports that are triggered by your criteria, such as keyword or policy matches. Flexible exports Easily download, print, forward or export Chatter communication from your Smarsh archive in multiple formats, including AES 256-encrypted files. ARCHIVE SEARCH & REVIEW PRODUCE & ANALYZE
  • 12. Secure, compliant and redundant data centers  Managed and operated by Smarsh  SAS70, SSAE16 SOC 2 & 3  Systrust certified Authentication via 256-bit SSL encryption Safe Harbor Certified Audited annually by KPMG
  • 13. Ranked #1 in Overall Customer Service among hosted archiving vendors according to Osterman Research Implementation team and live trainings 24 x 7 x 365 technical support staff available Audit and e-discovery support and custom reporting
  • 14.
  • 15. Portland, OR Atlanta, GA Boston, MA New York, NY Los Angeles, CA 5 Offices, Portland HQ 150+ Employees Sales/Marketing Operations/Development Support 20,000+ Customers Heavily Regulated Industries Financial, Healthcare, Government, SMB/Enterprise Over the last decade, Smarsh has established itself as a force in the message-archive and security space within the US financial sector. 2012 Magic Quadrant for Enterprise Information Archiving

Notes de l'éditeur

  1. Good afternoon.My name is Jackie Augusta and I am with Smarsh. It's an honor to be on stage at the first RIA in a Box Roadshow
  2. Sometimes the internet provides wisdom. You can find many sources of information including white papers, rules and regulations, and get research into evolving areas of innovation. Sometimes it seems like good information is limitless.
  3. But then again, sometimes you find things that are inaccurate, misleading, completely false, and sometimes a scam.
  4. These days, anyone with a personal computer, a smart phone, or even a public library card can put things on the internet and share their wisdom. From what I read, wisdom is like art. The beauty is in the eye of the beholder.
  5. And folks aren’t just using social networks in the office or at home in front of the computer. They use it everywhere. At the Starbucks, on the beach, in the car…even when their driving, and yes….it’s true, even in the restroom. Seriously folks, it can wait.Over 1/3 of Facebook posts are from mobile devices.
  6. But as with everything else in the wealth management and trading industry, there are rules that govern how we behave in these outlets. Innovation usually outpaces regulation, but regulation eventually catches up and holds firms accountable for activities even before the guidance was completely clear. So you must ask yourself, what policies does your firm have in place and what regulations do apply to social media? As a registered representative you need to know what the regulators are saying about electronic communications, including social media, and they are saying a lot.
  7. This slide lists references to regulations and guidance that are related to the use of electronic communications. Even though you are investment advisors and may not be FINRA members, I think it is important to understand what FINRA and other regulatory bodies are saying. The standards are shifting and the SEC until recently really hadn’t given many clues about how advisors should implement a compliance program. Their guidance is evolving and I think its closer to FINRAs than not.
  8. Our solutions are useful and critical across multiple disciplines within an organization, such as:Compliance/RiskLegalHuman ResourcesMarketing/AdvertisingDistributionIT
  9. There is no shortage of archiving solutions out there.  What sets Smarsh apart and what really matters to our clients is what happens after the data is archived.  Our platform can archive virtually any communication type, and we work hard to ensure that we are doing it in every given solution's native format.  This is particularly important when it comes to e-discovery across multiple content types.  We don't convert social media data into email. Once the data is in our archive, we give our clients the ability to search data intelligently and quickly.  We also have put considerable work into the ability to automate categorization and actions that can be taken on messages.  Finally, our data production services helps clients when they need it the most. Be it litigation or a regulatory exam, we make it as fast and easy as possible for clients to get the right data, when they need it.