SlideShare uma empresa Scribd logo
1 de 37
Baixar para ler offline
Discover why 50,000 professionals have
       already switched to easy2comply




Foreign Corrupt Practices Act of 1977
         UK Anti-Bribery Act
Introduction

• In spite of some broad and some minor differences
  between the FCPA and the UK Bribery Act, there is a
  wide overlap between the two sets of requirements
• Firms can ease the management and review of
  their obligations using the easy2comply Risk
  Management software
Software Focus

• The easy2comply software is focused on these
  areas:
  1. Corruption and Bribery Risk Assessment
  2. Internal Control Monitoring
  3. Policy Dissemination and Sign Off
  4. Incident Management
  5. Anonymous Whistleblowing
• The following slides will take you through each
  point
Corruption and Bribery Risk Assessment



                                         4
Corruption and Bribery Risk Assessment

• Create a “map” of your company
• Focus on troublesome areas such as:
  – Third parties
  – Known countries
  – Agents
• Identify potential risks
• Assess risks based on:
  – Severity / Likelihood
  – Customised Scorecards
Business Structure

      • No limitation to hierarchy
      • Create easy visual
        representation of business
        model
      • Simple user access model
        ensuring people can only
        see / edit what they are
        allowed to
Risk Profiling (Scorecards)




• Flexible scorecards – build your own question sets,
  answers and scoring methodology
• Ensures consistency and standardisation
Specific Risk Identification and Assessment




• Add your own risks
• See risks listed neatly and concisely
• Each risk can be explored for a much richer analysis
Clear Risk Documentation
Risk Assessment




• Impact and Likelihood assessment
• Residual Risk based on implemented controls
• Different methodologies available
Benefits of Risk Assessment

• Easily identify based on risk assessment where
  the most problematic areas are
• Share Risk Assessments with people from
  across the company, no matter where they are
• Generate charts and Excel reports
Internal Control Monitoring



                              12
Internal Control Monitoring

• Build dynamic library of controls
• Assign responsibilities for checking the
  controls
• Document evidence on frequent basis
• Attach files and documents as part of
  information gathering process
Control Libraries




• Add your own controls
• See who checked them and when
• See when they are next due for testing
Control Documentation
Create a Test Plan
Document Findings and Recommendations
Upload Attachments as Evidence
Easy Reporting
Benefits of Internal Control Monitoring

• All data is time-stamped and user-stamped,
  ensuring full traceability and auditability
• People can work in parallel
• Evidence uploaded directly into the software
• Makes it very easy to demonstrate that there
  is a proper and formal process to manage
  controls
• Automated notifications and alerts
• Simple reporting and charting
Policy Dissemination and Sign Off



                                    21
Policy Review
Track the Policy Team
Management Signatures




• Track who has signed off on the policy in real time
• Monitor those that haven’t signed
• Creates a digital signature
Policy Sign Off Benefits

• Proof that management have seen and
  reviewed the policy
• Track who has signed and who hasn’t
• Include questionnaires (if desired) to ensure
  the policy is understood
Incident Management



                      26
Incident Management

• Identify new and old incidents relating to
  fraud and corruption
• Track the investigation and remediation
  process
• Demonstrate to officials that there was clear
  ownership and accountability from the
  moment the issue was identified
Incident Database




• Build database of fraud and corruption related
  events and incidents
• Filter by location, business and date
Document the Incident
Draw Conclusions and Recommendations
Incident Management Benefits

• Anywhere in the world, incidents can be
  created and entered into the database
• Document proof that necessary steps and
  measures were taken
• Build a library of lessons that can be learnt
  and shared with other business groups
Anonymous Whistleblowing



                           32
Anonymous Whistleblowing

• Anyone can record a “potential event” relating
  to fraud, bribery and corruption
• Registrants do not need to log in to a software
  nor do they need to provide their details
• All whistleblowing events will be distributed to
  a pre-determined group within the company
  for further analysis
Where do I record the Event?

• Application homepage
• No need to log in to the
  software
• Page can be added to
  client corporate intranet
  page as well
What do they fill in?

• Fully configurable
  form
• Fields determined
  by company
• Default form can
  be seen here
Anonymous Whistleblowing Benefits

• Allows all individuals and employees peace of
  mind when recording incidents
• Company can track potential events as they
  are identified
• Prove to regulator that best efforts were made
  to provide a safe space for the reporting of
  events
For more information on the UK Bribery Act or Foreign
Corrupt Practices Act, please contact:

Jeremy Kaye jeremy.kaye@easy2comply.com
Sales       sales@easy2comply.com
                                                        37

Mais conteúdo relacionado

Mais procurados

ISStateGovtProposal
ISStateGovtProposalISStateGovtProposal
ISStateGovtProposalDale White
 
Security ibm fv3 for ss 012915
Security ibm fv3 for ss 012915Security ibm fv3 for ss 012915
Security ibm fv3 for ss 012915IBMITServicesUS
 
QA Fest 2017. Per Thorsheim.GDPR - An overview and its relevance for QA
QA Fest 2017. Per Thorsheim.GDPR - An overview and its relevance for QAQA Fest 2017. Per Thorsheim.GDPR - An overview and its relevance for QA
QA Fest 2017. Per Thorsheim.GDPR - An overview and its relevance for QAQAFest
 
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance FiresLiraz Goldstein
 
A business driven approach to security policy management a technical perspec...
A business driven approach to security policy management  a technical perspec...A business driven approach to security policy management  a technical perspec...
A business driven approach to security policy management a technical perspec...AlgoSec
 
Learn how an app-centric approach will improve security & operational efficiency
Learn how an app-centric approach will improve security & operational efficiencyLearn how an app-centric approach will improve security & operational efficiency
Learn how an app-centric approach will improve security & operational efficiencyAdi Gazit Blecher
 

Mais procurados (7)

ISStateGovtProposal
ISStateGovtProposalISStateGovtProposal
ISStateGovtProposal
 
Security ibm fv3 for ss 012915
Security ibm fv3 for ss 012915Security ibm fv3 for ss 012915
Security ibm fv3 for ss 012915
 
QA Fest 2017. Per Thorsheim.GDPR - An overview and its relevance for QA
QA Fest 2017. Per Thorsheim.GDPR - An overview and its relevance for QAQA Fest 2017. Per Thorsheim.GDPR - An overview and its relevance for QA
QA Fest 2017. Per Thorsheim.GDPR - An overview and its relevance for QA
 
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
 
Software Engineering Trends: Mainroad Service Management
Software Engineering Trends: Mainroad Service ManagementSoftware Engineering Trends: Mainroad Service Management
Software Engineering Trends: Mainroad Service Management
 
A business driven approach to security policy management a technical perspec...
A business driven approach to security policy management  a technical perspec...A business driven approach to security policy management  a technical perspec...
A business driven approach to security policy management a technical perspec...
 
Learn how an app-centric approach will improve security & operational efficiency
Learn how an app-centric approach will improve security & operational efficiencyLearn how an app-centric approach will improve security & operational efficiency
Learn how an app-centric approach will improve security & operational efficiency
 

Semelhante a Discover why 50K switch to easy2comply

Conducting an Information Systems Audit
Conducting an Information Systems Audit Conducting an Information Systems Audit
Conducting an Information Systems Audit Sreekanth Narendran
 
Customer Favorite Features: Popular Co3 Product Updates & A Special Promotion
Customer Favorite Features: Popular Co3 Product Updates & A Special PromotionCustomer Favorite Features: Popular Co3 Product Updates & A Special Promotion
Customer Favorite Features: Popular Co3 Product Updates & A Special PromotionResilient Systems
 
FixNix 17 products1.0
FixNix 17 products1.0FixNix 17 products1.0
FixNix 17 products1.0FixNix Inc.,
 
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxColorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxAkramAlqadasi1
 
Cyber security series administrative control breaches
Cyber security series   administrative control breaches Cyber security series   administrative control breaches
Cyber security series administrative control breaches Jim Kaplan CIA CFE
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchMcKonly & Asbury, LLP
 
Contego Fraud Solutions Ltd fin tech week 2014
Contego Fraud Solutions Ltd fin tech week 2014Contego Fraud Solutions Ltd fin tech week 2014
Contego Fraud Solutions Ltd fin tech week 2014Rebecca1243
 
Digital audit websites overview
Digital audit websites overviewDigital audit websites overview
Digital audit websites overviewseadeloitte
 
Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Scott Carlson
 
IBM i Security SIEM Integration
IBM i Security SIEM IntegrationIBM i Security SIEM Integration
IBM i Security SIEM IntegrationPrecisely
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredPrecisely
 
ITAM US 2017 Audit Defense Plugging the Leaks
ITAM US 2017 Audit Defense Plugging the Leaks ITAM US 2017 Audit Defense Plugging the Leaks
ITAM US 2017 Audit Defense Plugging the Leaks Martin Thompson
 
SLVA - Security monitoring and reporting itweb workshop
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshopSLVA Information Security
 
How to prepare for your first anti fraud review
How to prepare for your first anti fraud reviewHow to prepare for your first anti fraud review
How to prepare for your first anti fraud reviewJim Kaplan CIA CFE
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationMcKonly & Asbury, LLP
 
Decrease Cyber Risk at your Community Bank
Decrease Cyber Risk at your Community BankDecrease Cyber Risk at your Community Bank
Decrease Cyber Risk at your Community BankGreat Bay Software
 
Enterprise Risk Management Solutions
Enterprise Risk Management SolutionsEnterprise Risk Management Solutions
Enterprise Risk Management SolutionsLexComply
 

Semelhante a Discover why 50K switch to easy2comply (20)

chapter2-190516054412.pdf
chapter2-190516054412.pdfchapter2-190516054412.pdf
chapter2-190516054412.pdf
 
Conducting an Information Systems Audit
Conducting an Information Systems Audit Conducting an Information Systems Audit
Conducting an Information Systems Audit
 
Customer Favorite Features: Popular Co3 Product Updates & A Special Promotion
Customer Favorite Features: Popular Co3 Product Updates & A Special PromotionCustomer Favorite Features: Popular Co3 Product Updates & A Special Promotion
Customer Favorite Features: Popular Co3 Product Updates & A Special Promotion
 
FixNix 17 products1.0
FixNix 17 products1.0FixNix 17 products1.0
FixNix 17 products1.0
 
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxColorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
 
Cyber security series administrative control breaches
Cyber security series   administrative control breaches Cyber security series   administrative control breaches
Cyber security series administrative control breaches
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
 
Contego Fraud Solutions Ltd fin tech week 2014
Contego Fraud Solutions Ltd fin tech week 2014Contego Fraud Solutions Ltd fin tech week 2014
Contego Fraud Solutions Ltd fin tech week 2014
 
Digital audit websites overview
Digital audit websites overviewDigital audit websites overview
Digital audit websites overview
 
Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?
 
DigitalKYC_Modules.pdf
DigitalKYC_Modules.pdfDigitalKYC_Modules.pdf
DigitalKYC_Modules.pdf
 
IBM i Security SIEM Integration
IBM i Security SIEM IntegrationIBM i Security SIEM Integration
IBM i Security SIEM Integration
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
 
ITAM US 2017 Audit Defense Plugging the Leaks
ITAM US 2017 Audit Defense Plugging the Leaks ITAM US 2017 Audit Defense Plugging the Leaks
ITAM US 2017 Audit Defense Plugging the Leaks
 
SLVA - Security monitoring and reporting itweb workshop
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshop
 
How to prepare for your first anti fraud review
How to prepare for your first anti fraud reviewHow to prepare for your first anti fraud review
How to prepare for your first anti fraud review
 
GDPR Series Session 4
GDPR Series Session 4GDPR Series Session 4
GDPR Series Session 4
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
Decrease Cyber Risk at your Community Bank
Decrease Cyber Risk at your Community BankDecrease Cyber Risk at your Community Bank
Decrease Cyber Risk at your Community Bank
 
Enterprise Risk Management Solutions
Enterprise Risk Management SolutionsEnterprise Risk Management Solutions
Enterprise Risk Management Solutions
 

Mais de easy2comply

easy2comply Partner's Training Workbook
easy2comply Partner's Training Workbookeasy2comply Partner's Training Workbook
easy2comply Partner's Training Workbookeasy2comply
 
Webinar - Disaster in Japan: A Lesson in BCM
Webinar - Disaster in Japan: A Lesson in BCMWebinar - Disaster in Japan: A Lesson in BCM
Webinar - Disaster in Japan: A Lesson in BCMeasy2comply
 
Webinar - Risk Methodologies - Why are there so many?
Webinar - Risk Methodologies - Why are there so many?Webinar - Risk Methodologies - Why are there so many?
Webinar - Risk Methodologies - Why are there so many?easy2comply
 
Online Training Solvency II
Online Training Solvency IIOnline Training Solvency II
Online Training Solvency IIeasy2comply
 
Online Training Sarbanes-Oxley
Online Training Sarbanes-OxleyOnline Training Sarbanes-Oxley
Online Training Sarbanes-Oxleyeasy2comply
 
Online Training Internal Control Management
Online Training Internal Control ManagementOnline Training Internal Control Management
Online Training Internal Control Managementeasy2comply
 
Online Training Information Security Management
Online Training Information Security ManagementOnline Training Information Security Management
Online Training Information Security Managementeasy2comply
 
Online Training Basel II
Online Training Basel IIOnline Training Basel II
Online Training Basel IIeasy2comply
 
Compliance Management Software
Compliance Management SoftwareCompliance Management Software
Compliance Management Softwareeasy2comply
 
Risk Management Software
Risk Management SoftwareRisk Management Software
Risk Management Softwareeasy2comply
 

Mais de easy2comply (10)

easy2comply Partner's Training Workbook
easy2comply Partner's Training Workbookeasy2comply Partner's Training Workbook
easy2comply Partner's Training Workbook
 
Webinar - Disaster in Japan: A Lesson in BCM
Webinar - Disaster in Japan: A Lesson in BCMWebinar - Disaster in Japan: A Lesson in BCM
Webinar - Disaster in Japan: A Lesson in BCM
 
Webinar - Risk Methodologies - Why are there so many?
Webinar - Risk Methodologies - Why are there so many?Webinar - Risk Methodologies - Why are there so many?
Webinar - Risk Methodologies - Why are there so many?
 
Online Training Solvency II
Online Training Solvency IIOnline Training Solvency II
Online Training Solvency II
 
Online Training Sarbanes-Oxley
Online Training Sarbanes-OxleyOnline Training Sarbanes-Oxley
Online Training Sarbanes-Oxley
 
Online Training Internal Control Management
Online Training Internal Control ManagementOnline Training Internal Control Management
Online Training Internal Control Management
 
Online Training Information Security Management
Online Training Information Security ManagementOnline Training Information Security Management
Online Training Information Security Management
 
Online Training Basel II
Online Training Basel IIOnline Training Basel II
Online Training Basel II
 
Compliance Management Software
Compliance Management SoftwareCompliance Management Software
Compliance Management Software
 
Risk Management Software
Risk Management SoftwareRisk Management Software
Risk Management Software
 

Último

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Último (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

Discover why 50K switch to easy2comply

  • 1. Discover why 50,000 professionals have already switched to easy2comply Foreign Corrupt Practices Act of 1977 UK Anti-Bribery Act
  • 2. Introduction • In spite of some broad and some minor differences between the FCPA and the UK Bribery Act, there is a wide overlap between the two sets of requirements • Firms can ease the management and review of their obligations using the easy2comply Risk Management software
  • 3. Software Focus • The easy2comply software is focused on these areas: 1. Corruption and Bribery Risk Assessment 2. Internal Control Monitoring 3. Policy Dissemination and Sign Off 4. Incident Management 5. Anonymous Whistleblowing • The following slides will take you through each point
  • 4. Corruption and Bribery Risk Assessment 4
  • 5. Corruption and Bribery Risk Assessment • Create a “map” of your company • Focus on troublesome areas such as: – Third parties – Known countries – Agents • Identify potential risks • Assess risks based on: – Severity / Likelihood – Customised Scorecards
  • 6. Business Structure • No limitation to hierarchy • Create easy visual representation of business model • Simple user access model ensuring people can only see / edit what they are allowed to
  • 7. Risk Profiling (Scorecards) • Flexible scorecards – build your own question sets, answers and scoring methodology • Ensures consistency and standardisation
  • 8. Specific Risk Identification and Assessment • Add your own risks • See risks listed neatly and concisely • Each risk can be explored for a much richer analysis
  • 10. Risk Assessment • Impact and Likelihood assessment • Residual Risk based on implemented controls • Different methodologies available
  • 11. Benefits of Risk Assessment • Easily identify based on risk assessment where the most problematic areas are • Share Risk Assessments with people from across the company, no matter where they are • Generate charts and Excel reports
  • 13. Internal Control Monitoring • Build dynamic library of controls • Assign responsibilities for checking the controls • Document evidence on frequent basis • Attach files and documents as part of information gathering process
  • 14. Control Libraries • Add your own controls • See who checked them and when • See when they are next due for testing
  • 17. Document Findings and Recommendations
  • 20. Benefits of Internal Control Monitoring • All data is time-stamped and user-stamped, ensuring full traceability and auditability • People can work in parallel • Evidence uploaded directly into the software • Makes it very easy to demonstrate that there is a proper and formal process to manage controls • Automated notifications and alerts • Simple reporting and charting
  • 24. Management Signatures • Track who has signed off on the policy in real time • Monitor those that haven’t signed • Creates a digital signature
  • 25. Policy Sign Off Benefits • Proof that management have seen and reviewed the policy • Track who has signed and who hasn’t • Include questionnaires (if desired) to ensure the policy is understood
  • 27. Incident Management • Identify new and old incidents relating to fraud and corruption • Track the investigation and remediation process • Demonstrate to officials that there was clear ownership and accountability from the moment the issue was identified
  • 28. Incident Database • Build database of fraud and corruption related events and incidents • Filter by location, business and date
  • 30. Draw Conclusions and Recommendations
  • 31. Incident Management Benefits • Anywhere in the world, incidents can be created and entered into the database • Document proof that necessary steps and measures were taken • Build a library of lessons that can be learnt and shared with other business groups
  • 33. Anonymous Whistleblowing • Anyone can record a “potential event” relating to fraud, bribery and corruption • Registrants do not need to log in to a software nor do they need to provide their details • All whistleblowing events will be distributed to a pre-determined group within the company for further analysis
  • 34. Where do I record the Event? • Application homepage • No need to log in to the software • Page can be added to client corporate intranet page as well
  • 35. What do they fill in? • Fully configurable form • Fields determined by company • Default form can be seen here
  • 36. Anonymous Whistleblowing Benefits • Allows all individuals and employees peace of mind when recording incidents • Company can track potential events as they are identified • Prove to regulator that best efforts were made to provide a safe space for the reporting of events
  • 37. For more information on the UK Bribery Act or Foreign Corrupt Practices Act, please contact: Jeremy Kaye jeremy.kaye@easy2comply.com Sales sales@easy2comply.com 37