SlideShare una empresa de Scribd logo
1 de 37
Descargar para leer sin conexión
Discover why 50,000 professionals have
       already switched to easy2comply




Foreign Corrupt Practices Act of 1977
         UK Anti-Bribery Act
Introduction

• In spite of some broad and some minor differences
  between the FCPA and the UK Bribery Act, there is a
  wide overlap between the two sets of requirements
• Firms can ease the management and review of
  their obligations using the easy2comply Risk
  Management software
Software Focus

• The easy2comply software is focused on these
  areas:
  1. Corruption and Bribery Risk Assessment
  2. Internal Control Monitoring
  3. Policy Dissemination and Sign Off
  4. Incident Management
  5. Anonymous Whistleblowing
• The following slides will take you through each
  point
Corruption and Bribery Risk Assessment



                                         4
Corruption and Bribery Risk Assessment

• Create a “map” of your company
• Focus on troublesome areas such as:
  – Third parties
  – Known countries
  – Agents
• Identify potential risks
• Assess risks based on:
  – Severity / Likelihood
  – Customised Scorecards
Business Structure

      • No limitation to hierarchy
      • Create easy visual
        representation of business
        model
      • Simple user access model
        ensuring people can only
        see / edit what they are
        allowed to
Risk Profiling (Scorecards)




• Flexible scorecards – build your own question sets,
  answers and scoring methodology
• Ensures consistency and standardisation
Specific Risk Identification and Assessment




• Add your own risks
• See risks listed neatly and concisely
• Each risk can be explored for a much richer analysis
Clear Risk Documentation
Risk Assessment




• Impact and Likelihood assessment
• Residual Risk based on implemented controls
• Different methodologies available
Benefits of Risk Assessment

• Easily identify based on risk assessment where
  the most problematic areas are
• Share Risk Assessments with people from
  across the company, no matter where they are
• Generate charts and Excel reports
Internal Control Monitoring



                              12
Internal Control Monitoring

• Build dynamic library of controls
• Assign responsibilities for checking the
  controls
• Document evidence on frequent basis
• Attach files and documents as part of
  information gathering process
Control Libraries




• Add your own controls
• See who checked them and when
• See when they are next due for testing
Control Documentation
Create a Test Plan
Document Findings and Recommendations
Upload Attachments as Evidence
Easy Reporting
Benefits of Internal Control Monitoring

• All data is time-stamped and user-stamped,
  ensuring full traceability and auditability
• People can work in parallel
• Evidence uploaded directly into the software
• Makes it very easy to demonstrate that there
  is a proper and formal process to manage
  controls
• Automated notifications and alerts
• Simple reporting and charting
Policy Dissemination and Sign Off



                                    21
Policy Review
Track the Policy Team
Management Signatures




• Track who has signed off on the policy in real time
• Monitor those that haven’t signed
• Creates a digital signature
Policy Sign Off Benefits

• Proof that management have seen and
  reviewed the policy
• Track who has signed and who hasn’t
• Include questionnaires (if desired) to ensure
  the policy is understood
Incident Management



                      26
Incident Management

• Identify new and old incidents relating to
  fraud and corruption
• Track the investigation and remediation
  process
• Demonstrate to officials that there was clear
  ownership and accountability from the
  moment the issue was identified
Incident Database




• Build database of fraud and corruption related
  events and incidents
• Filter by location, business and date
Document the Incident
Draw Conclusions and Recommendations
Incident Management Benefits

• Anywhere in the world, incidents can be
  created and entered into the database
• Document proof that necessary steps and
  measures were taken
• Build a library of lessons that can be learnt
  and shared with other business groups
Anonymous Whistleblowing



                           32
Anonymous Whistleblowing

• Anyone can record a “potential event” relating
  to fraud, bribery and corruption
• Registrants do not need to log in to a software
  nor do they need to provide their details
• All whistleblowing events will be distributed to
  a pre-determined group within the company
  for further analysis
Where do I record the Event?

• Application homepage
• No need to log in to the
  software
• Page can be added to
  client corporate intranet
  page as well
What do they fill in?

• Fully configurable
  form
• Fields determined
  by company
• Default form can
  be seen here
Anonymous Whistleblowing Benefits

• Allows all individuals and employees peace of
  mind when recording incidents
• Company can track potential events as they
  are identified
• Prove to regulator that best efforts were made
  to provide a safe space for the reporting of
  events
For more information on the UK Bribery Act or Foreign
Corrupt Practices Act, please contact:

Jeremy Kaye jeremy.kaye@easy2comply.com
Sales       sales@easy2comply.com
                                                        37

Más contenido relacionado

La actualidad más candente

ISStateGovtProposal
ISStateGovtProposalISStateGovtProposal
ISStateGovtProposal
Dale White
 
Learn how an app-centric approach will improve security & operational efficiency
Learn how an app-centric approach will improve security & operational efficiencyLearn how an app-centric approach will improve security & operational efficiency
Learn how an app-centric approach will improve security & operational efficiency
Adi Gazit Blecher
 

La actualidad más candente (7)

ISStateGovtProposal
ISStateGovtProposalISStateGovtProposal
ISStateGovtProposal
 
Security ibm fv3 for ss 012915
Security ibm fv3 for ss 012915Security ibm fv3 for ss 012915
Security ibm fv3 for ss 012915
 
QA Fest 2017. Per Thorsheim.GDPR - An overview and its relevance for QA
QA Fest 2017. Per Thorsheim.GDPR - An overview and its relevance for QAQA Fest 2017. Per Thorsheim.GDPR - An overview and its relevance for QA
QA Fest 2017. Per Thorsheim.GDPR - An overview and its relevance for QA
 
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
 
Software Engineering Trends: Mainroad Service Management
Software Engineering Trends: Mainroad Service ManagementSoftware Engineering Trends: Mainroad Service Management
Software Engineering Trends: Mainroad Service Management
 
A business driven approach to security policy management a technical perspec...
A business driven approach to security policy management  a technical perspec...A business driven approach to security policy management  a technical perspec...
A business driven approach to security policy management a technical perspec...
 
Learn how an app-centric approach will improve security & operational efficiency
Learn how an app-centric approach will improve security & operational efficiencyLearn how an app-centric approach will improve security & operational efficiency
Learn how an app-centric approach will improve security & operational efficiency
 

Similar a Foreign Corrupt Practices Act of 1977 UK Anti-Bribery Act

Customer Favorite Features: Popular Co3 Product Updates & A Special Promotion
Customer Favorite Features: Popular Co3 Product Updates & A Special PromotionCustomer Favorite Features: Popular Co3 Product Updates & A Special Promotion
Customer Favorite Features: Popular Co3 Product Updates & A Special Promotion
Resilient Systems
 
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxColorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
AkramAlqadasi1
 

Similar a Foreign Corrupt Practices Act of 1977 UK Anti-Bribery Act (20)

chapter2-190516054412.pdf
chapter2-190516054412.pdfchapter2-190516054412.pdf
chapter2-190516054412.pdf
 
Conducting an Information Systems Audit
Conducting an Information Systems Audit Conducting an Information Systems Audit
Conducting an Information Systems Audit
 
Customer Favorite Features: Popular Co3 Product Updates & A Special Promotion
Customer Favorite Features: Popular Co3 Product Updates & A Special PromotionCustomer Favorite Features: Popular Co3 Product Updates & A Special Promotion
Customer Favorite Features: Popular Co3 Product Updates & A Special Promotion
 
FixNix 17 products1.0
FixNix 17 products1.0FixNix 17 products1.0
FixNix 17 products1.0
 
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxColorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
 
Cyber security series administrative control breaches
Cyber security series   administrative control breaches Cyber security series   administrative control breaches
Cyber security series administrative control breaches
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
 
Contego Fraud Solutions Ltd fin tech week 2014
Contego Fraud Solutions Ltd fin tech week 2014Contego Fraud Solutions Ltd fin tech week 2014
Contego Fraud Solutions Ltd fin tech week 2014
 
Digital audit websites overview
Digital audit websites overviewDigital audit websites overview
Digital audit websites overview
 
Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?
 
DigitalKYC_Modules.pdf
DigitalKYC_Modules.pdfDigitalKYC_Modules.pdf
DigitalKYC_Modules.pdf
 
IBM i Security SIEM Integration
IBM i Security SIEM IntegrationIBM i Security SIEM Integration
IBM i Security SIEM Integration
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
 
ITAM US 2017 Audit Defense Plugging the Leaks
ITAM US 2017 Audit Defense Plugging the Leaks ITAM US 2017 Audit Defense Plugging the Leaks
ITAM US 2017 Audit Defense Plugging the Leaks
 
SLVA - Security monitoring and reporting itweb workshop
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshop
 
How to prepare for your first anti fraud review
How to prepare for your first anti fraud reviewHow to prepare for your first anti fraud review
How to prepare for your first anti fraud review
 
GDPR Series Session 4
GDPR Series Session 4GDPR Series Session 4
GDPR Series Session 4
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
Decrease Cyber Risk at your Community Bank
Decrease Cyber Risk at your Community BankDecrease Cyber Risk at your Community Bank
Decrease Cyber Risk at your Community Bank
 
Enterprise Risk Management Solutions
Enterprise Risk Management SolutionsEnterprise Risk Management Solutions
Enterprise Risk Management Solutions
 

Más de easy2comply

easy2comply Partner's Training Workbook
easy2comply Partner's Training Workbookeasy2comply Partner's Training Workbook
easy2comply Partner's Training Workbook
easy2comply
 

Más de easy2comply (10)

easy2comply Partner's Training Workbook
easy2comply Partner's Training Workbookeasy2comply Partner's Training Workbook
easy2comply Partner's Training Workbook
 
Webinar - Disaster in Japan: A Lesson in BCM
Webinar - Disaster in Japan: A Lesson in BCMWebinar - Disaster in Japan: A Lesson in BCM
Webinar - Disaster in Japan: A Lesson in BCM
 
Webinar - Risk Methodologies - Why are there so many?
Webinar - Risk Methodologies - Why are there so many?Webinar - Risk Methodologies - Why are there so many?
Webinar - Risk Methodologies - Why are there so many?
 
Online Training Solvency II
Online Training Solvency IIOnline Training Solvency II
Online Training Solvency II
 
Online Training Sarbanes-Oxley
Online Training Sarbanes-OxleyOnline Training Sarbanes-Oxley
Online Training Sarbanes-Oxley
 
Online Training Internal Control Management
Online Training Internal Control ManagementOnline Training Internal Control Management
Online Training Internal Control Management
 
Online Training Information Security Management
Online Training Information Security ManagementOnline Training Information Security Management
Online Training Information Security Management
 
Online Training Basel II
Online Training Basel IIOnline Training Basel II
Online Training Basel II
 
Compliance Management Software
Compliance Management SoftwareCompliance Management Software
Compliance Management Software
 
Risk Management Software
Risk Management SoftwareRisk Management Software
Risk Management Software
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Foreign Corrupt Practices Act of 1977 UK Anti-Bribery Act

  • 1. Discover why 50,000 professionals have already switched to easy2comply Foreign Corrupt Practices Act of 1977 UK Anti-Bribery Act
  • 2. Introduction • In spite of some broad and some minor differences between the FCPA and the UK Bribery Act, there is a wide overlap between the two sets of requirements • Firms can ease the management and review of their obligations using the easy2comply Risk Management software
  • 3. Software Focus • The easy2comply software is focused on these areas: 1. Corruption and Bribery Risk Assessment 2. Internal Control Monitoring 3. Policy Dissemination and Sign Off 4. Incident Management 5. Anonymous Whistleblowing • The following slides will take you through each point
  • 4. Corruption and Bribery Risk Assessment 4
  • 5. Corruption and Bribery Risk Assessment • Create a “map” of your company • Focus on troublesome areas such as: – Third parties – Known countries – Agents • Identify potential risks • Assess risks based on: – Severity / Likelihood – Customised Scorecards
  • 6. Business Structure • No limitation to hierarchy • Create easy visual representation of business model • Simple user access model ensuring people can only see / edit what they are allowed to
  • 7. Risk Profiling (Scorecards) • Flexible scorecards – build your own question sets, answers and scoring methodology • Ensures consistency and standardisation
  • 8. Specific Risk Identification and Assessment • Add your own risks • See risks listed neatly and concisely • Each risk can be explored for a much richer analysis
  • 10. Risk Assessment • Impact and Likelihood assessment • Residual Risk based on implemented controls • Different methodologies available
  • 11. Benefits of Risk Assessment • Easily identify based on risk assessment where the most problematic areas are • Share Risk Assessments with people from across the company, no matter where they are • Generate charts and Excel reports
  • 13. Internal Control Monitoring • Build dynamic library of controls • Assign responsibilities for checking the controls • Document evidence on frequent basis • Attach files and documents as part of information gathering process
  • 14. Control Libraries • Add your own controls • See who checked them and when • See when they are next due for testing
  • 17. Document Findings and Recommendations
  • 20. Benefits of Internal Control Monitoring • All data is time-stamped and user-stamped, ensuring full traceability and auditability • People can work in parallel • Evidence uploaded directly into the software • Makes it very easy to demonstrate that there is a proper and formal process to manage controls • Automated notifications and alerts • Simple reporting and charting
  • 24. Management Signatures • Track who has signed off on the policy in real time • Monitor those that haven’t signed • Creates a digital signature
  • 25. Policy Sign Off Benefits • Proof that management have seen and reviewed the policy • Track who has signed and who hasn’t • Include questionnaires (if desired) to ensure the policy is understood
  • 27. Incident Management • Identify new and old incidents relating to fraud and corruption • Track the investigation and remediation process • Demonstrate to officials that there was clear ownership and accountability from the moment the issue was identified
  • 28. Incident Database • Build database of fraud and corruption related events and incidents • Filter by location, business and date
  • 30. Draw Conclusions and Recommendations
  • 31. Incident Management Benefits • Anywhere in the world, incidents can be created and entered into the database • Document proof that necessary steps and measures were taken • Build a library of lessons that can be learnt and shared with other business groups
  • 33. Anonymous Whistleblowing • Anyone can record a “potential event” relating to fraud, bribery and corruption • Registrants do not need to log in to a software nor do they need to provide their details • All whistleblowing events will be distributed to a pre-determined group within the company for further analysis
  • 34. Where do I record the Event? • Application homepage • No need to log in to the software • Page can be added to client corporate intranet page as well
  • 35. What do they fill in? • Fully configurable form • Fields determined by company • Default form can be seen here
  • 36. Anonymous Whistleblowing Benefits • Allows all individuals and employees peace of mind when recording incidents • Company can track potential events as they are identified • Prove to regulator that best efforts were made to provide a safe space for the reporting of events
  • 37. For more information on the UK Bribery Act or Foreign Corrupt Practices Act, please contact: Jeremy Kaye jeremy.kaye@easy2comply.com Sales sales@easy2comply.com 37