SlideShare uma empresa Scribd logo
1 de 18
On-Demand Compliance Audits Assessments Notifications Automated Workflow &  Reporting Whole-of- Business Engagement Self Service Portal In control every step of the way
Embrace the Enterprise Workflow Management Shared duty of care
Self Service Portal ,[object Object]
Secure, data-aware login
Decentralised User Administration
Configurable access to portal functions
Users only need to do and see what they need
Designed for inbound and outbound compliance,[object Object]
Control the Process Secure data management
Report the Results Hands-off automated compliance
Day 2 Welcome to theiComply User Forum 2010
Compliance Trends Tony Stephenson Director
Compliance Trends The role of risk management is still a mystery for most businesses. As executives and board members weave it into their corporate strategy and practices, they will look for ways it can improve their bottom line as well.  Forrester Research Risk management will increasingly consider third parties and industry issues. Recent failures in the financial sector as well as in retail, food and drug, and other industries have demonstrated clearly that an internal view of risk management is woefully incomplete. The growing connection of businesses through supply chain and sourcing relationships will not be ignored in 2010, which means compliance and risk professionals will be expected to have tighter oversight and control over external aspects of the organization.  Corporate Integrity
The Risky Nature of the  Extended Enterprise ,[object Object]
Fuzzy boundaries
The struggle to identify,	manage and control GRC ,[object Object],[object Object]
Value chain
Vendors

Mais conteúdo relacionado

Mais procurados

Private Exchanges: Employer Implementation and Trends
Private Exchanges: Employer Implementation and TrendsPrivate Exchanges: Employer Implementation and Trends
Private Exchanges: Employer Implementation and TrendsWEX Health
 
Module 3 establishing a trade compliance program
Module 3 establishing a trade compliance programModule 3 establishing a trade compliance program
Module 3 establishing a trade compliance programVivien Cheong
 
Compliance Rockstar Infographic
Compliance Rockstar InfographicCompliance Rockstar Infographic
Compliance Rockstar InfographicNetDimensions
 
TooManyRulesToTrack (AuthoredPublication) 2016.06
TooManyRulesToTrack (AuthoredPublication) 2016.06TooManyRulesToTrack (AuthoredPublication) 2016.06
TooManyRulesToTrack (AuthoredPublication) 2016.06Thomas (Tom) Bithell
 
iDepend Modelling Tool
iDepend Modelling TooliDepend Modelling Tool
iDepend Modelling ToolDuncan Giddens
 
Healthcare Compliance
Healthcare ComplianceHealthcare Compliance
Healthcare Compliancealok gupta
 
Avantis compliance management
Avantis compliance managementAvantis compliance management
Avantis compliance managementHarpreet Chauhan
 
Compliance Officer update: What you should know about your Business Partner -...
Compliance Officer update: What you should know about your Business Partner -...Compliance Officer update: What you should know about your Business Partner -...
Compliance Officer update: What you should know about your Business Partner -...vivacidade
 
Case for integrated_management_systems
Case for integrated_management_systemsCase for integrated_management_systems
Case for integrated_management_systemsOmnex Inc.
 
Software Advice UserView: Legal Management Software Report 2015
Software Advice UserView: Legal Management Software Report 2015Software Advice UserView: Legal Management Software Report 2015
Software Advice UserView: Legal Management Software Report 2015Software Advice
 
Hernan Huwyler Managing Third Pary Risks - Internal Audit Europe Conference
Hernan Huwyler Managing Third Pary Risks - Internal Audit Europe ConferenceHernan Huwyler Managing Third Pary Risks - Internal Audit Europe Conference
Hernan Huwyler Managing Third Pary Risks - Internal Audit Europe ConferenceHernan Huwyler, MBA CPA
 
Marketing environment - factors
Marketing environment - factorsMarketing environment - factors
Marketing environment - factorsDeepa Rana
 

Mais procurados (14)

Private Exchanges: Employer Implementation and Trends
Private Exchanges: Employer Implementation and TrendsPrivate Exchanges: Employer Implementation and Trends
Private Exchanges: Employer Implementation and Trends
 
Module 3 establishing a trade compliance program
Module 3 establishing a trade compliance programModule 3 establishing a trade compliance program
Module 3 establishing a trade compliance program
 
Compliance Rockstar Infographic
Compliance Rockstar InfographicCompliance Rockstar Infographic
Compliance Rockstar Infographic
 
TooManyRulesToTrack (AuthoredPublication) 2016.06
TooManyRulesToTrack (AuthoredPublication) 2016.06TooManyRulesToTrack (AuthoredPublication) 2016.06
TooManyRulesToTrack (AuthoredPublication) 2016.06
 
iDepend Modelling Tool
iDepend Modelling TooliDepend Modelling Tool
iDepend Modelling Tool
 
Healthcare Compliance
Healthcare ComplianceHealthcare Compliance
Healthcare Compliance
 
Avantis compliance management
Avantis compliance managementAvantis compliance management
Avantis compliance management
 
Compliance Officer update: What you should know about your Business Partner -...
Compliance Officer update: What you should know about your Business Partner -...Compliance Officer update: What you should know about your Business Partner -...
Compliance Officer update: What you should know about your Business Partner -...
 
Case for integrated_management_systems
Case for integrated_management_systemsCase for integrated_management_systems
Case for integrated_management_systems
 
Software Advice UserView: Legal Management Software Report 2015
Software Advice UserView: Legal Management Software Report 2015Software Advice UserView: Legal Management Software Report 2015
Software Advice UserView: Legal Management Software Report 2015
 
Hernan Huwyler Managing Third Pary Risks - Internal Audit Europe Conference
Hernan Huwyler Managing Third Pary Risks - Internal Audit Europe ConferenceHernan Huwyler Managing Third Pary Risks - Internal Audit Europe Conference
Hernan Huwyler Managing Third Pary Risks - Internal Audit Europe Conference
 
Marketing environment - factors
Marketing environment - factorsMarketing environment - factors
Marketing environment - factors
 
Intro Flyer
Intro FlyerIntro Flyer
Intro Flyer
 
Key elements of a work system
Key elements of a work systemKey elements of a work system
Key elements of a work system
 

Destaque

2011 ettekanne
2011 ettekanne2011 ettekanne
2011 ettekannevalmtiit
 
iComply iAppraise Use, Objective Evidence
iComply iAppraise Use, Objective EvidenceiComply iAppraise Use, Objective Evidence
iComply iAppraise Use, Objective Evidenceicomply
 
iAppraise administration
iAppraise administrationiAppraise administration
iAppraise administrationicomply
 
How Smart Grid overlaps with Energy Efficiency
How Smart Grid overlaps with Energy EfficiencyHow Smart Grid overlaps with Energy Efficiency
How Smart Grid overlaps with Energy EfficiencyJim Thayer
 
2011 Key Trends in Software Pricing & Licensing Survey Sponsored by Flexera S...
2011 Key Trends in Software Pricing & Licensing Survey Sponsored by Flexera S...2011 Key Trends in Software Pricing & Licensing Survey Sponsored by Flexera S...
2011 Key Trends in Software Pricing & Licensing Survey Sponsored by Flexera S...Flexera
 
Windows 10 One Year Later: What’s Holding You Back?
Windows 10 One Year Later: What’s Holding You Back? Windows 10 One Year Later: What’s Holding You Back?
Windows 10 One Year Later: What’s Holding You Back? Flexera
 
Webinar: The Power of Normalized Inventory
Webinar: The Power of Normalized InventoryWebinar: The Power of Normalized Inventory
Webinar: The Power of Normalized InventoryFlexera
 
Licensing (Enforcement & Compliance) Update
Licensing (Enforcement & Compliance) UpdateLicensing (Enforcement & Compliance) Update
Licensing (Enforcement & Compliance) UpdateFlexera
 
Avaya Contact Center in 2020
Avaya Contact Center in 2020Avaya Contact Center in 2020
Avaya Contact Center in 2020Iwasa Tomohiro
 
7steps software-licensing
7steps software-licensing7steps software-licensing
7steps software-licensingsuyashawasthi
 
Cybersecurity Strategy Must Include Software License Optimization
Cybersecurity Strategy Must Include Software License OptimizationCybersecurity Strategy Must Include Software License Optimization
Cybersecurity Strategy Must Include Software License OptimizationFlexera
 
Software Licensing & Compliance: Two Strategies, One Goal
Software Licensing & Compliance: Two Strategies, One GoalSoftware Licensing & Compliance: Two Strategies, One Goal
Software Licensing & Compliance: Two Strategies, One GoalJeff Gustafson
 

Destaque (13)

2011 ettekanne
2011 ettekanne2011 ettekanne
2011 ettekanne
 
Ss how 2_study
Ss how 2_studySs how 2_study
Ss how 2_study
 
iComply iAppraise Use, Objective Evidence
iComply iAppraise Use, Objective EvidenceiComply iAppraise Use, Objective Evidence
iComply iAppraise Use, Objective Evidence
 
iAppraise administration
iAppraise administrationiAppraise administration
iAppraise administration
 
How Smart Grid overlaps with Energy Efficiency
How Smart Grid overlaps with Energy EfficiencyHow Smart Grid overlaps with Energy Efficiency
How Smart Grid overlaps with Energy Efficiency
 
2011 Key Trends in Software Pricing & Licensing Survey Sponsored by Flexera S...
2011 Key Trends in Software Pricing & Licensing Survey Sponsored by Flexera S...2011 Key Trends in Software Pricing & Licensing Survey Sponsored by Flexera S...
2011 Key Trends in Software Pricing & Licensing Survey Sponsored by Flexera S...
 
Windows 10 One Year Later: What’s Holding You Back?
Windows 10 One Year Later: What’s Holding You Back? Windows 10 One Year Later: What’s Holding You Back?
Windows 10 One Year Later: What’s Holding You Back?
 
Webinar: The Power of Normalized Inventory
Webinar: The Power of Normalized InventoryWebinar: The Power of Normalized Inventory
Webinar: The Power of Normalized Inventory
 
Licensing (Enforcement & Compliance) Update
Licensing (Enforcement & Compliance) UpdateLicensing (Enforcement & Compliance) Update
Licensing (Enforcement & Compliance) Update
 
Avaya Contact Center in 2020
Avaya Contact Center in 2020Avaya Contact Center in 2020
Avaya Contact Center in 2020
 
7steps software-licensing
7steps software-licensing7steps software-licensing
7steps software-licensing
 
Cybersecurity Strategy Must Include Software License Optimization
Cybersecurity Strategy Must Include Software License OptimizationCybersecurity Strategy Must Include Software License Optimization
Cybersecurity Strategy Must Include Software License Optimization
 
Software Licensing & Compliance: Two Strategies, One Goal
Software Licensing & Compliance: Two Strategies, One GoalSoftware Licensing & Compliance: Two Strategies, One Goal
Software Licensing & Compliance: Two Strategies, One Goal
 

Semelhante a Compliance, Risk Management, Licensing

Vendor Management - Compliance Checklist Manifesto Series
Vendor Management - Compliance Checklist Manifesto SeriesVendor Management - Compliance Checklist Manifesto Series
Vendor Management - Compliance Checklist Manifesto SeriesContinuity Control
 
Vendor risk management 2013
Vendor risk management 2013Vendor risk management 2013
Vendor risk management 2013Nidhi Gupta
 
Vendor risk management 2013
Vendor risk management 2013Vendor risk management 2013
Vendor risk management 2013Nidhi Gupta
 
The Changing Role of Compliance | Accenture
The Changing Role of Compliance | AccentureThe Changing Role of Compliance | Accenture
The Changing Role of Compliance | AccentureAccenture Operations
 
The Changing Role of Compliance | Accenture
The Changing Role of Compliance | AccentureThe Changing Role of Compliance | Accenture
The Changing Role of Compliance | AccentureAccenture Operations
 
AI in supplier management - An Overview.pdf
AI in supplier management - An Overview.pdfAI in supplier management - An Overview.pdf
AI in supplier management - An Overview.pdfStephenAmell4
 
IE Corporate Risk Assessment 1-6 - Hernan huwyler
IE Corporate Risk Assessment 1-6 - Hernan huwyler   IE Corporate Risk Assessment 1-6 - Hernan huwyler
IE Corporate Risk Assessment 1-6 - Hernan huwyler Hernan Huwyler, MBA CPA
 
Risk assessment and internal controls - Internal Audit
Risk assessment and internal controls - Internal AuditRisk assessment and internal controls - Internal Audit
Risk assessment and internal controls - Internal AuditSmitesh Bhosale
 
AI IN SUPPLIER MANAGEMENT: THE NEW FRONTIER IN PROCUREMENT INNOVATION
AI IN SUPPLIER MANAGEMENT: THE NEW FRONTIER IN PROCUREMENT INNOVATIONAI IN SUPPLIER MANAGEMENT: THE NEW FRONTIER IN PROCUREMENT INNOVATION
AI IN SUPPLIER MANAGEMENT: THE NEW FRONTIER IN PROCUREMENT INNOVATIONChristopherTHyatt
 
Risk and Regulatory Change Management - 360factors EUEC 2015 Presentation
Risk and Regulatory Change Management - 360factors EUEC 2015 PresentationRisk and Regulatory Change Management - 360factors EUEC 2015 Presentation
Risk and Regulatory Change Management - 360factors EUEC 2015 Presentation360factors
 
Spire Brief - Risk Consulting
Spire Brief - Risk ConsultingSpire Brief - Risk Consulting
Spire Brief - Risk ConsultingPrashant Jain
 
Third-Party Oversight & Governance
Third-Party Oversight & GovernanceThird-Party Oversight & Governance
Third-Party Oversight & GovernanceEDR
 
3 Ways Covid-19 Changed Shared Services and how to Prepare for What's Next
3 Ways Covid-19 Changed Shared Services and how to Prepare for What's Next3 Ways Covid-19 Changed Shared Services and how to Prepare for What's Next
3 Ways Covid-19 Changed Shared Services and how to Prepare for What's NextSarah Fane
 
Effektiv riskhantering - teori vs praktik - IBM Smarter Business 2011
Effektiv riskhantering - teori vs praktik - IBM Smarter Business 2011Effektiv riskhantering - teori vs praktik - IBM Smarter Business 2011
Effektiv riskhantering - teori vs praktik - IBM Smarter Business 2011IBM Sverige
 

Semelhante a Compliance, Risk Management, Licensing (20)

Vendor Management - Compliance Checklist Manifesto Series
Vendor Management - Compliance Checklist Manifesto SeriesVendor Management - Compliance Checklist Manifesto Series
Vendor Management - Compliance Checklist Manifesto Series
 
Vendor risk management 2013
Vendor risk management 2013Vendor risk management 2013
Vendor risk management 2013
 
Vendor risk management 2013
Vendor risk management 2013Vendor risk management 2013
Vendor risk management 2013
 
Vendor risk management 2013
Vendor risk management 2013Vendor risk management 2013
Vendor risk management 2013
 
Vendor risk management 2013
Vendor risk management 2013Vendor risk management 2013
Vendor risk management 2013
 
My slides
My slidesMy slides
My slides
 
The Changing Role of Compliance | Accenture
The Changing Role of Compliance | AccentureThe Changing Role of Compliance | Accenture
The Changing Role of Compliance | Accenture
 
FSI_Third Party Risk Management_Deloitte PoV
FSI_Third Party Risk Management_Deloitte PoVFSI_Third Party Risk Management_Deloitte PoV
FSI_Third Party Risk Management_Deloitte PoV
 
The Changing Role of Compliance | Accenture
The Changing Role of Compliance | AccentureThe Changing Role of Compliance | Accenture
The Changing Role of Compliance | Accenture
 
AI in supplier management - An Overview.pdf
AI in supplier management - An Overview.pdfAI in supplier management - An Overview.pdf
AI in supplier management - An Overview.pdf
 
IE Corporate Risk Assessment 1-6 - Hernan huwyler
IE Corporate Risk Assessment 1-6 - Hernan huwyler   IE Corporate Risk Assessment 1-6 - Hernan huwyler
IE Corporate Risk Assessment 1-6 - Hernan huwyler
 
Risk assessment and internal controls - Internal Audit
Risk assessment and internal controls - Internal AuditRisk assessment and internal controls - Internal Audit
Risk assessment and internal controls - Internal Audit
 
AI IN SUPPLIER MANAGEMENT: THE NEW FRONTIER IN PROCUREMENT INNOVATION
AI IN SUPPLIER MANAGEMENT: THE NEW FRONTIER IN PROCUREMENT INNOVATIONAI IN SUPPLIER MANAGEMENT: THE NEW FRONTIER IN PROCUREMENT INNOVATION
AI IN SUPPLIER MANAGEMENT: THE NEW FRONTIER IN PROCUREMENT INNOVATION
 
Risk and Regulatory Change Management - 360factors EUEC 2015 Presentation
Risk and Regulatory Change Management - 360factors EUEC 2015 PresentationRisk and Regulatory Change Management - 360factors EUEC 2015 Presentation
Risk and Regulatory Change Management - 360factors EUEC 2015 Presentation
 
Spire Brief - Risk Consulting
Spire Brief - Risk ConsultingSpire Brief - Risk Consulting
Spire Brief - Risk Consulting
 
Third-Party Oversight & Governance
Third-Party Oversight & GovernanceThird-Party Oversight & Governance
Third-Party Oversight & Governance
 
Memo to CEOs
Memo to CEOsMemo to CEOs
Memo to CEOs
 
3 Ways Covid-19 Changed Shared Services and how to Prepare for What's Next
3 Ways Covid-19 Changed Shared Services and how to Prepare for What's Next3 Ways Covid-19 Changed Shared Services and how to Prepare for What's Next
3 Ways Covid-19 Changed Shared Services and how to Prepare for What's Next
 
Presentation_IA Focus
Presentation_IA FocusPresentation_IA Focus
Presentation_IA Focus
 
Effektiv riskhantering - teori vs praktik - IBM Smarter Business 2011
Effektiv riskhantering - teori vs praktik - IBM Smarter Business 2011Effektiv riskhantering - teori vs praktik - IBM Smarter Business 2011
Effektiv riskhantering - teori vs praktik - IBM Smarter Business 2011
 

Compliance, Risk Management, Licensing

Notas do Editor

  1. Welcome to the first Inaugral iComply User Forum, we are very glad you could make, and appreciate the effort you have made to be here.
  2. Businesses are engaged in a continuous struggle to grasp the intricacies of risk managementin an interconnected environment.Operational Risk Management: “. . . the risk of loss resulting from inadequateor failed internal processes, people and systems, or from external events.”Properly revised, it would read “the risk of lossresulting from inadequate or failed internal processes, people, systems, and businessrelationships, or from external events.”
  3. Businesses are engaged in a continuous struggle to grasp the intricacies of risk managementin an interconnected environment.Operational Risk Management: “. . . the risk of loss resulting from inadequateor failed internal processes, people and systems, or from external events.”Properly revised, it would read “the risk of lossresulting from inadequate or failed internal processes, people, systems, and businessrelationships, or from external events.”
  4. ■■ Operational risks: Identify, assess, manage, and monitor operational risks across business relationships and their impacton the organization.■■ Regulatory compliance: Regulated industries impose unique requirements that often extend to business partners.These can vary by geography, such as in the case of state-specific regulations in the insurance industry. Brand ownersmust account for these industry-specific compliance obligations throughout their extended enterprises.■■ Corporate social responsibility: Ensuring the partner communicates and reports similar values on social, environmental,and financial practices (e.g., global reporting initiatives).■■ Environmental: Continually monitor business partners’ commitment to environmental standards and compliancewith laws and regulations that impact environmental responsibility and emissions.■■ Geo-political: Continuously monitor political, economic, environmental disaster, social, and security developmentsaround the world, and forecasting their impact on business relationships and operations.■■ Health and safety: Ensure business partners are committed to safe working environments free from hazards.■■ Import and export: Ensure the organization is doing business with the right partners and are not connected to terrorism,organized crime, or unlawful countries (e.g., the Office of Foreign Assets Control (OFAC), and U.S. exportcontrols).■■ International labor standards: Manage adherence to a complex array of international laws and validate partners haveproper controls to ensure compliance to policies on working hours, forced labor, child labor, wage, discrimination andharassment, and benefits.■■ Quality: Provide ongoing monitoring to ensure quality and service-level agreements are met in adherence to the contractand expectations.■■ Security: Validate that business partners meet obligations to protect the physical and information technology environments.■■ Supply-chain risks: Manage and monitor specific risks, disruptions, sourcing, and dependencies within supply-chainsand their impact on the organization and its products.
  5. ■■ Operational risks: Identify, assess, manage, and monitor operational risks across business relationships and their impacton the organization.■■ Regulatory compliance: Regulated industries impose unique requirements that often extend to business partners.These can vary by geography, such as in the case of state-specific regulations in the insurance industry. Brand ownersmust account for these industry-specific compliance obligations throughout their extended enterprises.■■ Corporate social responsibility: Ensuring the partner communicates and reports similar values on social, environmental,and financial practices (e.g., global reporting initiatives).■■ Environmental: Continually monitor business partners’ commitment to environmental standards and compliancewith laws and regulations that impact environmental responsibility and emissions.■■ Geo-political: Continuously monitor political, economic, environmental disaster, social, and security developmentsaround the world, and forecasting their impact on business relationships and operations.■■ Health and safety: Ensure business partners are committed to safe working environments free from hazards.■■ Import and export: Ensure the organization is doing business with the right partners and are not connected to terrorism,organized crime, or unlawful countries (e.g., the Office of Foreign Assets Control (OFAC), and U.S. exportcontrols).■■ International labor standards: Manage adherence to a complex array of international laws and validate partners haveproper controls to ensure compliance to policies on working hours, forced labor, child labor, wage, discrimination andharassment, and benefits.■■ Quality: Provide ongoing monitoring to ensure quality and service-level agreements are met in adherence to the contractand expectations.■■ Security: Validate that business partners meet obligations to protect the physical and information technology environments.■■ Supply-chain risks: Manage and monitor specific risks, disruptions, sourcing, and dependencies within supply-chainsand their impact on the organization and its products.
  6. Roadmap to Extended-Enterprise Risk ManagementBuilding the Risk Management Team, incorporating people from:■■ Corporate compliance and ethics: Responsible for validating that the relationship adheres to corporate and suppliercodes of conduct, applicable laws and regulations, and defined policies and procedures.■■ Contracting: Responsible for establishment and execution of mutually beneficial contractual relationship and obligations.■■ Corporate social responsibility: Responsible for monitoring business relationships to see they conform to stated practicesof CSR and sustainability.■■ Environmental: Responsible for making sure business relationships adhere to environmental laws, policies, and procedures.■■ Health and safety: Responsible for ensuring business partners have safe and productive working environments.■■ Information technology: Responsible for ensuring proper security and technology controls are in place to protectsensitive information (e.g., personal information, privacy, and intellectual property).■■ Legal: Responsible for ongoing management and monitoring of legal risks and the legal protection of the organizationacross extended business relationships.■■ Business operations and line-of-business: Responsible for validating that extended business relationships meet businessneeds and the relationship is beneficial to business operations.■■ Quality: Responsible for ongoing management and monitoring of service level agreements and quality control in productionand services, as it pertains to the business relationship.■■ Security: Responsible for the protection of physical and logical assets as it moves beyond or are involved with extendedbusiness relationships.Corporate compliance and ethicsContractingCorporate social responsibilityEnvironmentalHealth and safetyInformation technologyLegalBusiness operations and line-of-businessQualitySecurity
  7. ■■ Ensure ownership and accountability are clearly established and understood■■ Manage the on-boarding and the ongoing risk and compliance scoring and assessment processes■■ Conduct initial and ongoing watch-list verifications■■ Actively monitor all business partners for:➢➢ Adherence to code-of-conduct standards and key regulatory policies➢➢ Changes in risk profile based on targeted risk assessments■■ Use built-in question sets to streamline surveys and questionnaires■■ Initiate and mange incident follow-ups and investigations■■ Use verifiable evidence to readily attest to “in compliance” and “in control” status