SlideShare una empresa de Scribd logo
1 de 24
Email Compliance 201

 Managing Captured Data



                    Presented by
        Core Compliance & Legal Services, Inc.
                  February 19, 2009
Introduction

•   Why This Is Important
•   Recap: “Electronic Communications 101:
    Fundamentals of Regulatory Requirements”
•   Where to Begin
•   Risk Area Categories Requiring Email
    Supervision
•   Rules of Thumb on Managing Captured Email


                                                3
                       3
Why This Is Important

•   SEC and FINRA require investment advisers
    and broker-dealers to supervise business
    activities
•   Fiduciary duty/best interest of the client
•   Current regulatory climate/recent events
•   Trend toward more disclosure, transparency
    and due diligence


                                                 4
                       4
Recap: Regulatory Requirements
For Broker-Dealers
•   Overview of FINRA rules
    –     FINRA Rule 3010 Supervision
    –     Securities Exchange Act 1934 17a-3 & 17a-4
    –     Notice to Members 07-59
•       FINRA Expectations
    –     Flexible risk-based approach
    –     Content and target audience of the e-mail or IM
    –     “Legible, true, complete, and current” records

                                                        5
                             5
Recap: Regulatory Requirements
For Investment Advisers
• Overview of SEC Rules
    – Investment Advisers Act Rule 204-2
•   SEC Expectations
    – Risk-based approach
    – Have effective policies and procedures for
      electronic communication
    – Safeguard records from unauthorized access
      or destruction

                                                   6
                         6
Where to Begin

•       Review your firm’s customizable list of words
        and phrases
•       Recognize any areas of high risk which may
        require special attention
    –     New hires
    –     Heightened supervision of personnel
    –     Communications between various departments
          within the business unit

                                                        7
                             7
Risk Area Categories
          Requiring Email Supervision
•   Performance Advertising and Marketing
•   Safeguarding Confidential Client Information
•   Anti-Money Laundering
•   Conflicts of Interest/Insider Trading




                                                   8
                        8
Performance Advertising and Marketing
•       Investment Advisers Act of 1940 Rule 206(4)-1
        Advertisements by Investment Advisers
    –     Prohibits fraudulent, deceptive, or manipulative
          advertising practices
•       FINRA Rule 2210 Communications with the
        Public
    –     Prohibits false, exaggerated, unwarranted or
          misleading statements or claims


                                                             9
                              9
Performance Advertising and Marketing

•        Examples of what to look for:
     –     Emails from sales discussing performance
           returns without disclosures or compliance
           approval
     –     Inclusions of projections/predictions,
           testimonials and charts/graphs
     –     References to any past specific
           recommendations
     –     Balanced discussions of risk/reward
                                                       10
                              10
Safeguarding Confidential
                 Client Information
•       Privacy of Consumer Financial Information
        (Regulation S-P)
    –     Safeguarding confidential client information
    –     Mandates privacy measures of all financial
          services firms
•       State laws govern
    –     California SB1 Financial Information Privacy Act



                                                         11
                             11
Safeguarding Confidential
                 Client Information
•       Examples of what to look for:
    –     Social Security/Driver’s License
          Numbers/Birthdays
    –     Emailed completed New Account Forms
    –     Authorized recipients of sensitive and
          confidential client information
    –     Client account information such as current
          income, assets, and investments


                                                       12
                             12
Anti-Money Laundering
•   Federal law requires financial institutions to
    develop and implement an Anti-Money
    Laundering (AML) Program which includes:
    –   Policies and procedures and internal controls
    –   Designation of an AML Officer
    –   Annual independent testing of AML compliance
    –   Ongoing employee training



                                                        13
                           13
Anti-Money Laundering
•       Examples of What to Look For:
    –     Wire transfers information
    –     Emails to and/or from client services or new
          accounts containing identifying information
    –     Discussions of transactions involving off-shore
          or international accounts




                                                            14
                              14
Conflicts of Interest/Insider Trading
•    Insider Trading and Securities Fraud Act of
     1988
•    Remember: Investment Advisers and Broker-
     Dealers are required to act in best interest of
     the client




                                                   15
                         15
Conflicts of Interest/Insider Trading
•       Examples of what to look for:
    –     Emails between the research analysts and the
          trading desk
    –     Emails making recommendations and
          compensation arrangements for the benefit of
          the adviser/representative
    –     Emails containing sensitive confidential
          information sent from the firm to a third party
          outside the firm

                                                        16
                            16
Rules of Thumb on
             Managing Captured Email
•   Spot and troubleshoot any loopholes
    –   Too little data captured? Too much?
•   Ensure that your list of words and phrases fits
    the nature of the business (e.g., firm size,
    business activities) and keep the list
    confidential!
•   Verify that escalation procedures are being
    followed
•   Test the adequacy and effectiveness of back-
    up tapes/hard drives
                                                  17
                          17
Rules of Thumb on
        Managing Captured Email
•   Document the review—merely
    capturing/opening email is not enough!
•   Keep your email supervision system up-to-
    date and in compliance with the latest
    regulatory requirements
•   Devise a system to delegate and supervise
    email review if needed—keep in mind the
    supervisor maintains ultimate responsibility!
•   Take advantage of your third-party service
    provider for guidance
                                                    18
                          18
Questions?
• Please contact us if you have any
  additional questions
   – Core Compliance & Legal Services, Inc.
     Tel: (619) 278-0020
     Email: christina.rovira@corecls.com
     Website: www.corecls.com




                                              19
                            19
Email Compliance 201
                           R. Anthony Seyboth
                                 2.19.09

                     No Hardware    No Software   No Waiting


www.liveoffice.com                                             Slide 20
Overview: Experience

          The leading provider of email compliance solutions


      Who We Are                    What We Do              Who We Serve

    $22M in revenue                Archiving               20K successful audits
    Founded in 1998                Compliance              99% client retention
    Experienced team               Discovery               Fortune 100 clients
    100+ employees                 Continuity              Financial svcs focused
    Profitable                     Hosting                 10,000 clients




                     No Hardware              No Software         No Waiting


www.liveoffice.com                                                               Slide 21
LiveOffice AdvisorMail Difference

                                   • Automatically captures all sent and received messages
            Archive                • Offers unlimited storage & retention
                                   • Protects messages in redundant data centers



                                   • Scans all messages for keywords & phrases
                                   • Provides random sampling of messages for rapid review
            Review                 • Comprehensive reporting features to satisfy
                                   requirements

                                   • Complies with state & federal requirements
                                   (SEC/FINRA/SRO)
            Comply                 • Offers end-to-end audit support
                                   • Provides peace of mind having passed 20K audits


                     No Hardware                     No Software             No Waiting


www.liveoffice.com                                                                           Slide 22
LiveOffice Difference

           Meet
        Requirements                 Archive           Review        Comply


             Trust a                                            10,000+ Clients
             Proven
             Leader


          Worry Less                    Unlimited Storage, Guaranteed
           with Our                     Deployed in 5 Days, Guaranteed
          Guarantees                     99.99% Uptime, Guaranteed

                       No Hardware             No Software        No Waiting


www.liveoffice.com                                                             Slide 23
Thank You!

           Meet
                                            Trust                      Guaranteed
        Requirements




                                   R. Anthony Seyboth
                          Director, Compliance & Litigation Services
                                     800.374.2032 X 117
                              anthony.seyboth@liveoffice.com




                     No Hardware               No Software             No Waiting


www.liveoffice.com                                                                  Slide 24

Más contenido relacionado

La actualidad más candente

Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For AmlKartik Mehta
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingKartik Mehta
 
Public Sector's Playbook for Payment Fraud Protection
Public Sector's Playbook for Payment Fraud ProtectionPublic Sector's Playbook for Payment Fraud Protection
Public Sector's Playbook for Payment Fraud ProtectionKyriba Corporation
 
Reducing Fraud Through Agreements and Compliance
Reducing Fraud Through Agreements and ComplianceReducing Fraud Through Agreements and Compliance
Reducing Fraud Through Agreements and ComplianceVivastream
 
Tax evasion, fci, fraud, compliance 2 28-14
Tax evasion, fci, fraud, compliance 2 28-14Tax evasion, fci, fraud, compliance 2 28-14
Tax evasion, fci, fraud, compliance 2 28-14ACFCS
 
Gac, money flow, ds, ar, 2 26-14
Gac, money flow, ds, ar, 2 26-14Gac, money flow, ds, ar, 2 26-14
Gac, money flow, ds, ar, 2 26-14ACFCS
 
Commonalities, money laundering, ethics, international standards, gac 2 24-14
Commonalities, money laundering, ethics, international standards, gac 2 24-14Commonalities, money laundering, ethics, international standards, gac 2 24-14
Commonalities, money laundering, ethics, international standards, gac 2 24-14ACFCS
 
TRUST. IP and Technology Update - IT Audit Toolkit for CIOs and General Couns...
TRUST. IP and Technology Update - IT Audit Toolkit for CIOs and General Couns...TRUST. IP and Technology Update - IT Audit Toolkit for CIOs and General Couns...
TRUST. IP and Technology Update - IT Audit Toolkit for CIOs and General Couns...Jan Lindberg
 
AZCI Commercial Reality Start Up Session Protecting And Managing Your Intel...
AZCI Commercial Reality Start Up Session   Protecting And Managing Your Intel...AZCI Commercial Reality Start Up Session   Protecting And Managing Your Intel...
AZCI Commercial Reality Start Up Session Protecting And Managing Your Intel...sdgarrison
 

La actualidad más candente (10)

Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For Aml
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money Laundering
 
Public Sector's Playbook for Payment Fraud Protection
Public Sector's Playbook for Payment Fraud ProtectionPublic Sector's Playbook for Payment Fraud Protection
Public Sector's Playbook for Payment Fraud Protection
 
Reducing Fraud Through Agreements and Compliance
Reducing Fraud Through Agreements and ComplianceReducing Fraud Through Agreements and Compliance
Reducing Fraud Through Agreements and Compliance
 
Tax evasion, fci, fraud, compliance 2 28-14
Tax evasion, fci, fraud, compliance 2 28-14Tax evasion, fci, fraud, compliance 2 28-14
Tax evasion, fci, fraud, compliance 2 28-14
 
Gac, money flow, ds, ar, 2 26-14
Gac, money flow, ds, ar, 2 26-14Gac, money flow, ds, ar, 2 26-14
Gac, money flow, ds, ar, 2 26-14
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Commonalities, money laundering, ethics, international standards, gac 2 24-14
Commonalities, money laundering, ethics, international standards, gac 2 24-14Commonalities, money laundering, ethics, international standards, gac 2 24-14
Commonalities, money laundering, ethics, international standards, gac 2 24-14
 
TRUST. IP and Technology Update - IT Audit Toolkit for CIOs and General Couns...
TRUST. IP and Technology Update - IT Audit Toolkit for CIOs and General Couns...TRUST. IP and Technology Update - IT Audit Toolkit for CIOs and General Couns...
TRUST. IP and Technology Update - IT Audit Toolkit for CIOs and General Couns...
 
AZCI Commercial Reality Start Up Session Protecting And Managing Your Intel...
AZCI Commercial Reality Start Up Session   Protecting And Managing Your Intel...AZCI Commercial Reality Start Up Session   Protecting And Managing Your Intel...
AZCI Commercial Reality Start Up Session Protecting And Managing Your Intel...
 

Destacado (20)

201006 its tutorial
201006 its tutorial201006 its tutorial
201006 its tutorial
 
201101 affective learning
201101 affective learning201101 affective learning
201101 affective learning
 
Valvuloplastie
ValvuloplastieValvuloplastie
Valvuloplastie
 
Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009
 
New Venture Presentatie
New Venture PresentatieNew Venture Presentatie
New Venture Presentatie
 
201003 Alice (part 1/15)
201003 Alice (part 1/15)201003 Alice (part 1/15)
201003 Alice (part 1/15)
 
Itf ipp ch04_2012_final
Itf ipp ch04_2012_finalItf ipp ch04_2012_final
Itf ipp ch04_2012_final
 
Farma
FarmaFarma
Farma
 
007 014 belcaro corrige
007 014 belcaro corrige007 014 belcaro corrige
007 014 belcaro corrige
 
Week5-Group-J
Week5-Group-JWeek5-Group-J
Week5-Group-J
 
Week11 Presentation Group-C
Week11 Presentation Group-CWeek11 Presentation Group-C
Week11 Presentation Group-C
 
201107 ICALT
201107 ICALT201107 ICALT
201107 ICALT
 
Резервісти
РезервістиРезервісти
Резервісти
 
Monaco 020909
Monaco 020909Monaco 020909
Monaco 020909
 
201506 CSE340 Lecture 19
201506 CSE340 Lecture 19201506 CSE340 Lecture 19
201506 CSE340 Lecture 19
 
Presentation
PresentationPresentation
Presentation
 
CQRS introduction
CQRS introductionCQRS introduction
CQRS introduction
 
Eddie Slide Show
Eddie Slide ShowEddie Slide Show
Eddie Slide Show
 
Syst reninangiot pp cv aomi 02fev 2
Syst reninangiot pp cv   aomi 02fev 2Syst reninangiot pp cv   aomi 02fev 2
Syst reninangiot pp cv aomi 02fev 2
 
Itf ipp ch10_2012_final
Itf ipp ch10_2012_finalItf ipp ch10_2012_final
Itf ipp ch10_2012_final
 

Similar a LiveOffice Email Archiving & Compliance 201

MiFID II Update August 2017
MiFID II Update August 2017MiFID II Update August 2017
MiFID II Update August 2017IRESS
 
Remote Deposit Capture Risk Management & FFIEC Complaince
Remote Deposit Capture Risk Management & FFIEC ComplainceRemote Deposit Capture Risk Management & FFIEC Complaince
Remote Deposit Capture Risk Management & FFIEC ComplainceJTLeekley
 
Dodd-Frank Compliance and Technology Summer Meeting 2013
Dodd-Frank Compliance and Technology Summer Meeting 2013Dodd-Frank Compliance and Technology Summer Meeting 2013
Dodd-Frank Compliance and Technology Summer Meeting 2013Jeffrey C.Y. Li
 
David Chung, ING Presentation - BDI 2/23/12 Social Media in Wealth Management...
David Chung, ING Presentation - BDI 2/23/12 Social Media in Wealth Management...David Chung, ING Presentation - BDI 2/23/12 Social Media in Wealth Management...
David Chung, ING Presentation - BDI 2/23/12 Social Media in Wealth Management...Business Development Institute
 
D&B onboard.pdf
D&B onboard.pdfD&B onboard.pdf
D&B onboard.pdfWilson Kao
 
LiveOffice Email Archiving & Compliance 301
LiveOffice Email Archiving & Compliance 301LiveOffice Email Archiving & Compliance 301
LiveOffice Email Archiving & Compliance 301Veritas Technologies LLC
 
Evaluating Vendor Risks - slides
Evaluating Vendor Risks - slidesEvaluating Vendor Risks - slides
Evaluating Vendor Risks - slidesISACA New England
 
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...Business Development Institute
 
Evolving stringent regulatory requirements (reworked)
Evolving stringent regulatory requirements (reworked)Evolving stringent regulatory requirements (reworked)
Evolving stringent regulatory requirements (reworked)ChunJia Sio
 
Digital banking an regulatry compliance
Digital banking an regulatry compliance   Digital banking an regulatry compliance
Digital banking an regulatry compliance sathyananda prabhu
 
04/28/2010 Meeting - Contract Compliance
04/28/2010 Meeting - Contract Compliance04/28/2010 Meeting - Contract Compliance
04/28/2010 Meeting - Contract Complianceacfesj
 
Update Your CCPA Plan with Practical Insights into the Proposed Regulations, ...
Update Your CCPA Plan with Practical Insights into the Proposed Regulations, ...Update Your CCPA Plan with Practical Insights into the Proposed Regulations, ...
Update Your CCPA Plan with Practical Insights into the Proposed Regulations, ...TrustArc
 
Evaluating Vendor Risks - Presentation
Evaluating Vendor Risks - PresentationEvaluating Vendor Risks - Presentation
Evaluating Vendor Risks - PresentationISACA New England
 
Bournemouth- Essential 6-monthly Finance Directors' Update - June 2017
Bournemouth- Essential 6-monthly Finance Directors' Update - June 2017 Bournemouth- Essential 6-monthly Finance Directors' Update - June 2017
Bournemouth- Essential 6-monthly Finance Directors' Update - June 2017 PKF Francis Clark
 
Steelbridge Compliance Brochure
Steelbridge Compliance BrochureSteelbridge Compliance Brochure
Steelbridge Compliance Brochuredniknejad
 
File Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesFile Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesBlackBerry
 
Reducing the Risk of Fraud​ through Treasury Technology
Reducing the Risk of Fraud​ through Treasury TechnologyReducing the Risk of Fraud​ through Treasury Technology
Reducing the Risk of Fraud​ through Treasury TechnologyElena Oliveira
 
Building & Running A Successful Identity Program
Building & Running A Successful Identity ProgramBuilding & Running A Successful Identity Program
Building & Running A Successful Identity ProgramDan Houser
 
Finance in the South West 2018 - Start Up Session
Finance in the South West 2018 - Start Up SessionFinance in the South West 2018 - Start Up Session
Finance in the South West 2018 - Start Up SessionPKF Francis Clark
 
Navigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management ProgramNavigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management ProgramPerficient, Inc.
 

Similar a LiveOffice Email Archiving & Compliance 201 (20)

MiFID II Update August 2017
MiFID II Update August 2017MiFID II Update August 2017
MiFID II Update August 2017
 
Remote Deposit Capture Risk Management & FFIEC Complaince
Remote Deposit Capture Risk Management & FFIEC ComplainceRemote Deposit Capture Risk Management & FFIEC Complaince
Remote Deposit Capture Risk Management & FFIEC Complaince
 
Dodd-Frank Compliance and Technology Summer Meeting 2013
Dodd-Frank Compliance and Technology Summer Meeting 2013Dodd-Frank Compliance and Technology Summer Meeting 2013
Dodd-Frank Compliance and Technology Summer Meeting 2013
 
David Chung, ING Presentation - BDI 2/23/12 Social Media in Wealth Management...
David Chung, ING Presentation - BDI 2/23/12 Social Media in Wealth Management...David Chung, ING Presentation - BDI 2/23/12 Social Media in Wealth Management...
David Chung, ING Presentation - BDI 2/23/12 Social Media in Wealth Management...
 
D&B onboard.pdf
D&B onboard.pdfD&B onboard.pdf
D&B onboard.pdf
 
LiveOffice Email Archiving & Compliance 301
LiveOffice Email Archiving & Compliance 301LiveOffice Email Archiving & Compliance 301
LiveOffice Email Archiving & Compliance 301
 
Evaluating Vendor Risks - slides
Evaluating Vendor Risks - slidesEvaluating Vendor Risks - slides
Evaluating Vendor Risks - slides
 
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
 
Evolving stringent regulatory requirements (reworked)
Evolving stringent regulatory requirements (reworked)Evolving stringent regulatory requirements (reworked)
Evolving stringent regulatory requirements (reworked)
 
Digital banking an regulatry compliance
Digital banking an regulatry compliance   Digital banking an regulatry compliance
Digital banking an regulatry compliance
 
04/28/2010 Meeting - Contract Compliance
04/28/2010 Meeting - Contract Compliance04/28/2010 Meeting - Contract Compliance
04/28/2010 Meeting - Contract Compliance
 
Update Your CCPA Plan with Practical Insights into the Proposed Regulations, ...
Update Your CCPA Plan with Practical Insights into the Proposed Regulations, ...Update Your CCPA Plan with Practical Insights into the Proposed Regulations, ...
Update Your CCPA Plan with Practical Insights into the Proposed Regulations, ...
 
Evaluating Vendor Risks - Presentation
Evaluating Vendor Risks - PresentationEvaluating Vendor Risks - Presentation
Evaluating Vendor Risks - Presentation
 
Bournemouth- Essential 6-monthly Finance Directors' Update - June 2017
Bournemouth- Essential 6-monthly Finance Directors' Update - June 2017 Bournemouth- Essential 6-monthly Finance Directors' Update - June 2017
Bournemouth- Essential 6-monthly Finance Directors' Update - June 2017
 
Steelbridge Compliance Brochure
Steelbridge Compliance BrochureSteelbridge Compliance Brochure
Steelbridge Compliance Brochure
 
File Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesFile Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial Services
 
Reducing the Risk of Fraud​ through Treasury Technology
Reducing the Risk of Fraud​ through Treasury TechnologyReducing the Risk of Fraud​ through Treasury Technology
Reducing the Risk of Fraud​ through Treasury Technology
 
Building & Running A Successful Identity Program
Building & Running A Successful Identity ProgramBuilding & Running A Successful Identity Program
Building & Running A Successful Identity Program
 
Finance in the South West 2018 - Start Up Session
Finance in the South West 2018 - Start Up SessionFinance in the South West 2018 - Start Up Session
Finance in the South West 2018 - Start Up Session
 
Navigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management ProgramNavigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management Program
 

Último

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 

Último (20)

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 

LiveOffice Email Archiving & Compliance 201

  • 1.
  • 2. Email Compliance 201 Managing Captured Data Presented by Core Compliance & Legal Services, Inc. February 19, 2009
  • 3. Introduction • Why This Is Important • Recap: “Electronic Communications 101: Fundamentals of Regulatory Requirements” • Where to Begin • Risk Area Categories Requiring Email Supervision • Rules of Thumb on Managing Captured Email 3 3
  • 4. Why This Is Important • SEC and FINRA require investment advisers and broker-dealers to supervise business activities • Fiduciary duty/best interest of the client • Current regulatory climate/recent events • Trend toward more disclosure, transparency and due diligence 4 4
  • 5. Recap: Regulatory Requirements For Broker-Dealers • Overview of FINRA rules – FINRA Rule 3010 Supervision – Securities Exchange Act 1934 17a-3 & 17a-4 – Notice to Members 07-59 • FINRA Expectations – Flexible risk-based approach – Content and target audience of the e-mail or IM – “Legible, true, complete, and current” records 5 5
  • 6. Recap: Regulatory Requirements For Investment Advisers • Overview of SEC Rules – Investment Advisers Act Rule 204-2 • SEC Expectations – Risk-based approach – Have effective policies and procedures for electronic communication – Safeguard records from unauthorized access or destruction 6 6
  • 7. Where to Begin • Review your firm’s customizable list of words and phrases • Recognize any areas of high risk which may require special attention – New hires – Heightened supervision of personnel – Communications between various departments within the business unit 7 7
  • 8. Risk Area Categories Requiring Email Supervision • Performance Advertising and Marketing • Safeguarding Confidential Client Information • Anti-Money Laundering • Conflicts of Interest/Insider Trading 8 8
  • 9. Performance Advertising and Marketing • Investment Advisers Act of 1940 Rule 206(4)-1 Advertisements by Investment Advisers – Prohibits fraudulent, deceptive, or manipulative advertising practices • FINRA Rule 2210 Communications with the Public – Prohibits false, exaggerated, unwarranted or misleading statements or claims 9 9
  • 10. Performance Advertising and Marketing • Examples of what to look for: – Emails from sales discussing performance returns without disclosures or compliance approval – Inclusions of projections/predictions, testimonials and charts/graphs – References to any past specific recommendations – Balanced discussions of risk/reward 10 10
  • 11. Safeguarding Confidential Client Information • Privacy of Consumer Financial Information (Regulation S-P) – Safeguarding confidential client information – Mandates privacy measures of all financial services firms • State laws govern – California SB1 Financial Information Privacy Act 11 11
  • 12. Safeguarding Confidential Client Information • Examples of what to look for: – Social Security/Driver’s License Numbers/Birthdays – Emailed completed New Account Forms – Authorized recipients of sensitive and confidential client information – Client account information such as current income, assets, and investments 12 12
  • 13. Anti-Money Laundering • Federal law requires financial institutions to develop and implement an Anti-Money Laundering (AML) Program which includes: – Policies and procedures and internal controls – Designation of an AML Officer – Annual independent testing of AML compliance – Ongoing employee training 13 13
  • 14. Anti-Money Laundering • Examples of What to Look For: – Wire transfers information – Emails to and/or from client services or new accounts containing identifying information – Discussions of transactions involving off-shore or international accounts 14 14
  • 15. Conflicts of Interest/Insider Trading • Insider Trading and Securities Fraud Act of 1988 • Remember: Investment Advisers and Broker- Dealers are required to act in best interest of the client 15 15
  • 16. Conflicts of Interest/Insider Trading • Examples of what to look for: – Emails between the research analysts and the trading desk – Emails making recommendations and compensation arrangements for the benefit of the adviser/representative – Emails containing sensitive confidential information sent from the firm to a third party outside the firm 16 16
  • 17. Rules of Thumb on Managing Captured Email • Spot and troubleshoot any loopholes – Too little data captured? Too much? • Ensure that your list of words and phrases fits the nature of the business (e.g., firm size, business activities) and keep the list confidential! • Verify that escalation procedures are being followed • Test the adequacy and effectiveness of back- up tapes/hard drives 17 17
  • 18. Rules of Thumb on Managing Captured Email • Document the review—merely capturing/opening email is not enough! • Keep your email supervision system up-to- date and in compliance with the latest regulatory requirements • Devise a system to delegate and supervise email review if needed—keep in mind the supervisor maintains ultimate responsibility! • Take advantage of your third-party service provider for guidance 18 18
  • 19. Questions? • Please contact us if you have any additional questions – Core Compliance & Legal Services, Inc. Tel: (619) 278-0020 Email: christina.rovira@corecls.com Website: www.corecls.com 19 19
  • 20. Email Compliance 201 R. Anthony Seyboth 2.19.09 No Hardware No Software No Waiting www.liveoffice.com Slide 20
  • 21. Overview: Experience The leading provider of email compliance solutions Who We Are What We Do Who We Serve  $22M in revenue  Archiving  20K successful audits  Founded in 1998  Compliance  99% client retention  Experienced team  Discovery  Fortune 100 clients  100+ employees  Continuity  Financial svcs focused  Profitable  Hosting  10,000 clients No Hardware No Software No Waiting www.liveoffice.com Slide 21
  • 22. LiveOffice AdvisorMail Difference • Automatically captures all sent and received messages Archive • Offers unlimited storage & retention • Protects messages in redundant data centers • Scans all messages for keywords & phrases • Provides random sampling of messages for rapid review Review • Comprehensive reporting features to satisfy requirements • Complies with state & federal requirements (SEC/FINRA/SRO) Comply • Offers end-to-end audit support • Provides peace of mind having passed 20K audits No Hardware No Software No Waiting www.liveoffice.com Slide 22
  • 23. LiveOffice Difference Meet Requirements Archive Review Comply Trust a 10,000+ Clients Proven Leader Worry Less Unlimited Storage, Guaranteed with Our Deployed in 5 Days, Guaranteed Guarantees 99.99% Uptime, Guaranteed No Hardware No Software No Waiting www.liveoffice.com Slide 23
  • 24. Thank You! Meet Trust Guaranteed Requirements R. Anthony Seyboth Director, Compliance & Litigation Services 800.374.2032 X 117 anthony.seyboth@liveoffice.com No Hardware No Software No Waiting www.liveoffice.com Slide 24