SlideShare a Scribd company logo
1 of 24
Email Compliance 201

 Managing Captured Data



                    Presented by
        Core Compliance & Legal Services, Inc.
                  February 19, 2009
Introduction

•   Why This Is Important
•   Recap: “Electronic Communications 101:
    Fundamentals of Regulatory Requirements”
•   Where to Begin
•   Risk Area Categories Requiring Email
    Supervision
•   Rules of Thumb on Managing Captured Email


                                                3
                       3
Why This Is Important

•   SEC and FINRA require investment advisers
    and broker-dealers to supervise business
    activities
•   Fiduciary duty/best interest of the client
•   Current regulatory climate/recent events
•   Trend toward more disclosure, transparency
    and due diligence


                                                 4
                       4
Recap: Regulatory Requirements
For Broker-Dealers
•   Overview of FINRA rules
    –     FINRA Rule 3010 Supervision
    –     Securities Exchange Act 1934 17a-3 & 17a-4
    –     Notice to Members 07-59
•       FINRA Expectations
    –     Flexible risk-based approach
    –     Content and target audience of the e-mail or IM
    –     “Legible, true, complete, and current” records

                                                        5
                             5
Recap: Regulatory Requirements
For Investment Advisers
• Overview of SEC Rules
    – Investment Advisers Act Rule 204-2
•   SEC Expectations
    – Risk-based approach
    – Have effective policies and procedures for
      electronic communication
    – Safeguard records from unauthorized access
      or destruction

                                                   6
                         6
Where to Begin

•       Review your firm’s customizable list of words
        and phrases
•       Recognize any areas of high risk which may
        require special attention
    –     New hires
    –     Heightened supervision of personnel
    –     Communications between various departments
          within the business unit

                                                        7
                             7
Risk Area Categories
          Requiring Email Supervision
•   Performance Advertising and Marketing
•   Safeguarding Confidential Client Information
•   Anti-Money Laundering
•   Conflicts of Interest/Insider Trading




                                                   8
                        8
Performance Advertising and Marketing
•       Investment Advisers Act of 1940 Rule 206(4)-1
        Advertisements by Investment Advisers
    –     Prohibits fraudulent, deceptive, or manipulative
          advertising practices
•       FINRA Rule 2210 Communications with the
        Public
    –     Prohibits false, exaggerated, unwarranted or
          misleading statements or claims


                                                             9
                              9
Performance Advertising and Marketing

•        Examples of what to look for:
     –     Emails from sales discussing performance
           returns without disclosures or compliance
           approval
     –     Inclusions of projections/predictions,
           testimonials and charts/graphs
     –     References to any past specific
           recommendations
     –     Balanced discussions of risk/reward
                                                       10
                              10
Safeguarding Confidential
                 Client Information
•       Privacy of Consumer Financial Information
        (Regulation S-P)
    –     Safeguarding confidential client information
    –     Mandates privacy measures of all financial
          services firms
•       State laws govern
    –     California SB1 Financial Information Privacy Act



                                                         11
                             11
Safeguarding Confidential
                 Client Information
•       Examples of what to look for:
    –     Social Security/Driver’s License
          Numbers/Birthdays
    –     Emailed completed New Account Forms
    –     Authorized recipients of sensitive and
          confidential client information
    –     Client account information such as current
          income, assets, and investments


                                                       12
                             12
Anti-Money Laundering
•   Federal law requires financial institutions to
    develop and implement an Anti-Money
    Laundering (AML) Program which includes:
    –   Policies and procedures and internal controls
    –   Designation of an AML Officer
    –   Annual independent testing of AML compliance
    –   Ongoing employee training



                                                        13
                           13
Anti-Money Laundering
•       Examples of What to Look For:
    –     Wire transfers information
    –     Emails to and/or from client services or new
          accounts containing identifying information
    –     Discussions of transactions involving off-shore
          or international accounts




                                                            14
                              14
Conflicts of Interest/Insider Trading
•    Insider Trading and Securities Fraud Act of
     1988
•    Remember: Investment Advisers and Broker-
     Dealers are required to act in best interest of
     the client




                                                   15
                         15
Conflicts of Interest/Insider Trading
•       Examples of what to look for:
    –     Emails between the research analysts and the
          trading desk
    –     Emails making recommendations and
          compensation arrangements for the benefit of
          the adviser/representative
    –     Emails containing sensitive confidential
          information sent from the firm to a third party
          outside the firm

                                                        16
                            16
Rules of Thumb on
             Managing Captured Email
•   Spot and troubleshoot any loopholes
    –   Too little data captured? Too much?
•   Ensure that your list of words and phrases fits
    the nature of the business (e.g., firm size,
    business activities) and keep the list
    confidential!
•   Verify that escalation procedures are being
    followed
•   Test the adequacy and effectiveness of back-
    up tapes/hard drives
                                                  17
                          17
Rules of Thumb on
        Managing Captured Email
•   Document the review—merely
    capturing/opening email is not enough!
•   Keep your email supervision system up-to-
    date and in compliance with the latest
    regulatory requirements
•   Devise a system to delegate and supervise
    email review if needed—keep in mind the
    supervisor maintains ultimate responsibility!
•   Take advantage of your third-party service
    provider for guidance
                                                    18
                          18
Questions?
• Please contact us if you have any
  additional questions
   – Core Compliance & Legal Services, Inc.
     Tel: (619) 278-0020
     Email: christina.rovira@corecls.com
     Website: www.corecls.com




                                              19
                            19
Email Compliance 201
                           R. Anthony Seyboth
                                 2.19.09

                     No Hardware    No Software   No Waiting


www.liveoffice.com                                             Slide 20
Overview: Experience

          The leading provider of email compliance solutions


      Who We Are                    What We Do              Who We Serve

    $22M in revenue                Archiving               20K successful audits
    Founded in 1998                Compliance              99% client retention
    Experienced team               Discovery               Fortune 100 clients
    100+ employees                 Continuity              Financial svcs focused
    Profitable                     Hosting                 10,000 clients




                     No Hardware              No Software         No Waiting


www.liveoffice.com                                                               Slide 21
LiveOffice AdvisorMail Difference

                                   • Automatically captures all sent and received messages
            Archive                • Offers unlimited storage & retention
                                   • Protects messages in redundant data centers



                                   • Scans all messages for keywords & phrases
                                   • Provides random sampling of messages for rapid review
            Review                 • Comprehensive reporting features to satisfy
                                   requirements

                                   • Complies with state & federal requirements
                                   (SEC/FINRA/SRO)
            Comply                 • Offers end-to-end audit support
                                   • Provides peace of mind having passed 20K audits


                     No Hardware                     No Software             No Waiting


www.liveoffice.com                                                                           Slide 22
LiveOffice Difference

           Meet
        Requirements                 Archive           Review        Comply


             Trust a                                            10,000+ Clients
             Proven
             Leader


          Worry Less                    Unlimited Storage, Guaranteed
           with Our                     Deployed in 5 Days, Guaranteed
          Guarantees                     99.99% Uptime, Guaranteed

                       No Hardware             No Software        No Waiting


www.liveoffice.com                                                             Slide 23
Thank You!

           Meet
                                            Trust                      Guaranteed
        Requirements




                                   R. Anthony Seyboth
                          Director, Compliance & Litigation Services
                                     800.374.2032 X 117
                              anthony.seyboth@liveoffice.com




                     No Hardware               No Software             No Waiting


www.liveoffice.com                                                                  Slide 24

More Related Content

What's hot

Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For AmlKartik Mehta
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingKartik Mehta
 
Public Sector's Playbook for Payment Fraud Protection
Public Sector's Playbook for Payment Fraud ProtectionPublic Sector's Playbook for Payment Fraud Protection
Public Sector's Playbook for Payment Fraud ProtectionKyriba Corporation
 
Reducing Fraud Through Agreements and Compliance
Reducing Fraud Through Agreements and ComplianceReducing Fraud Through Agreements and Compliance
Reducing Fraud Through Agreements and ComplianceVivastream
 
Tax evasion, fci, fraud, compliance 2 28-14
Tax evasion, fci, fraud, compliance 2 28-14Tax evasion, fci, fraud, compliance 2 28-14
Tax evasion, fci, fraud, compliance 2 28-14ACFCS
 
Gac, money flow, ds, ar, 2 26-14
Gac, money flow, ds, ar, 2 26-14Gac, money flow, ds, ar, 2 26-14
Gac, money flow, ds, ar, 2 26-14ACFCS
 
Commonalities, money laundering, ethics, international standards, gac 2 24-14
Commonalities, money laundering, ethics, international standards, gac 2 24-14Commonalities, money laundering, ethics, international standards, gac 2 24-14
Commonalities, money laundering, ethics, international standards, gac 2 24-14ACFCS
 
TRUST. IP and Technology Update - IT Audit Toolkit for CIOs and General Couns...
TRUST. IP and Technology Update - IT Audit Toolkit for CIOs and General Couns...TRUST. IP and Technology Update - IT Audit Toolkit for CIOs and General Couns...
TRUST. IP and Technology Update - IT Audit Toolkit for CIOs and General Couns...Jan Lindberg
 
AZCI Commercial Reality Start Up Session Protecting And Managing Your Intel...
AZCI Commercial Reality Start Up Session   Protecting And Managing Your Intel...AZCI Commercial Reality Start Up Session   Protecting And Managing Your Intel...
AZCI Commercial Reality Start Up Session Protecting And Managing Your Intel...sdgarrison
 

What's hot (10)

Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For Aml
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money Laundering
 
Public Sector's Playbook for Payment Fraud Protection
Public Sector's Playbook for Payment Fraud ProtectionPublic Sector's Playbook for Payment Fraud Protection
Public Sector's Playbook for Payment Fraud Protection
 
Reducing Fraud Through Agreements and Compliance
Reducing Fraud Through Agreements and ComplianceReducing Fraud Through Agreements and Compliance
Reducing Fraud Through Agreements and Compliance
 
Tax evasion, fci, fraud, compliance 2 28-14
Tax evasion, fci, fraud, compliance 2 28-14Tax evasion, fci, fraud, compliance 2 28-14
Tax evasion, fci, fraud, compliance 2 28-14
 
Gac, money flow, ds, ar, 2 26-14
Gac, money flow, ds, ar, 2 26-14Gac, money flow, ds, ar, 2 26-14
Gac, money flow, ds, ar, 2 26-14
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Commonalities, money laundering, ethics, international standards, gac 2 24-14
Commonalities, money laundering, ethics, international standards, gac 2 24-14Commonalities, money laundering, ethics, international standards, gac 2 24-14
Commonalities, money laundering, ethics, international standards, gac 2 24-14
 
TRUST. IP and Technology Update - IT Audit Toolkit for CIOs and General Couns...
TRUST. IP and Technology Update - IT Audit Toolkit for CIOs and General Couns...TRUST. IP and Technology Update - IT Audit Toolkit for CIOs and General Couns...
TRUST. IP and Technology Update - IT Audit Toolkit for CIOs and General Couns...
 
AZCI Commercial Reality Start Up Session Protecting And Managing Your Intel...
AZCI Commercial Reality Start Up Session   Protecting And Managing Your Intel...AZCI Commercial Reality Start Up Session   Protecting And Managing Your Intel...
AZCI Commercial Reality Start Up Session Protecting And Managing Your Intel...
 

Viewers also liked (20)

201006 its tutorial
201006 its tutorial201006 its tutorial
201006 its tutorial
 
201101 affective learning
201101 affective learning201101 affective learning
201101 affective learning
 
Valvuloplastie
ValvuloplastieValvuloplastie
Valvuloplastie
 
Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009
 
New Venture Presentatie
New Venture PresentatieNew Venture Presentatie
New Venture Presentatie
 
201003 Alice (part 1/15)
201003 Alice (part 1/15)201003 Alice (part 1/15)
201003 Alice (part 1/15)
 
Itf ipp ch04_2012_final
Itf ipp ch04_2012_finalItf ipp ch04_2012_final
Itf ipp ch04_2012_final
 
Farma
FarmaFarma
Farma
 
007 014 belcaro corrige
007 014 belcaro corrige007 014 belcaro corrige
007 014 belcaro corrige
 
Week5-Group-J
Week5-Group-JWeek5-Group-J
Week5-Group-J
 
Week11 Presentation Group-C
Week11 Presentation Group-CWeek11 Presentation Group-C
Week11 Presentation Group-C
 
201107 ICALT
201107 ICALT201107 ICALT
201107 ICALT
 
Резервісти
РезервістиРезервісти
Резервісти
 
Monaco 020909
Monaco 020909Monaco 020909
Monaco 020909
 
201506 CSE340 Lecture 19
201506 CSE340 Lecture 19201506 CSE340 Lecture 19
201506 CSE340 Lecture 19
 
Presentation
PresentationPresentation
Presentation
 
CQRS introduction
CQRS introductionCQRS introduction
CQRS introduction
 
Eddie Slide Show
Eddie Slide ShowEddie Slide Show
Eddie Slide Show
 
Syst reninangiot pp cv aomi 02fev 2
Syst reninangiot pp cv   aomi 02fev 2Syst reninangiot pp cv   aomi 02fev 2
Syst reninangiot pp cv aomi 02fev 2
 
Itf ipp ch10_2012_final
Itf ipp ch10_2012_finalItf ipp ch10_2012_final
Itf ipp ch10_2012_final
 

Similar to LiveOffice Email Archiving & Compliance 201

MiFID II Update August 2017
MiFID II Update August 2017MiFID II Update August 2017
MiFID II Update August 2017IRESS
 
Remote Deposit Capture Risk Management & FFIEC Complaince
Remote Deposit Capture Risk Management & FFIEC ComplainceRemote Deposit Capture Risk Management & FFIEC Complaince
Remote Deposit Capture Risk Management & FFIEC ComplainceJTLeekley
 
Dodd-Frank Compliance and Technology Summer Meeting 2013
Dodd-Frank Compliance and Technology Summer Meeting 2013Dodd-Frank Compliance and Technology Summer Meeting 2013
Dodd-Frank Compliance and Technology Summer Meeting 2013Jeffrey C.Y. Li
 
David Chung, ING Presentation - BDI 2/23/12 Social Media in Wealth Management...
David Chung, ING Presentation - BDI 2/23/12 Social Media in Wealth Management...David Chung, ING Presentation - BDI 2/23/12 Social Media in Wealth Management...
David Chung, ING Presentation - BDI 2/23/12 Social Media in Wealth Management...Business Development Institute
 
D&B onboard.pdf
D&B onboard.pdfD&B onboard.pdf
D&B onboard.pdfWilson Kao
 
LiveOffice Email Archiving & Compliance 301
LiveOffice Email Archiving & Compliance 301LiveOffice Email Archiving & Compliance 301
LiveOffice Email Archiving & Compliance 301Veritas Technologies LLC
 
Evaluating Vendor Risks - slides
Evaluating Vendor Risks - slidesEvaluating Vendor Risks - slides
Evaluating Vendor Risks - slidesISACA New England
 
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...Business Development Institute
 
Evolving stringent regulatory requirements (reworked)
Evolving stringent regulatory requirements (reworked)Evolving stringent regulatory requirements (reworked)
Evolving stringent regulatory requirements (reworked)ChunJia Sio
 
Digital banking an regulatry compliance
Digital banking an regulatry compliance   Digital banking an regulatry compliance
Digital banking an regulatry compliance sathyananda prabhu
 
04/28/2010 Meeting - Contract Compliance
04/28/2010 Meeting - Contract Compliance04/28/2010 Meeting - Contract Compliance
04/28/2010 Meeting - Contract Complianceacfesj
 
Update Your CCPA Plan with Practical Insights into the Proposed Regulations, ...
Update Your CCPA Plan with Practical Insights into the Proposed Regulations, ...Update Your CCPA Plan with Practical Insights into the Proposed Regulations, ...
Update Your CCPA Plan with Practical Insights into the Proposed Regulations, ...TrustArc
 
Evaluating Vendor Risks - Presentation
Evaluating Vendor Risks - PresentationEvaluating Vendor Risks - Presentation
Evaluating Vendor Risks - PresentationISACA New England
 
Bournemouth- Essential 6-monthly Finance Directors' Update - June 2017
Bournemouth- Essential 6-monthly Finance Directors' Update - June 2017 Bournemouth- Essential 6-monthly Finance Directors' Update - June 2017
Bournemouth- Essential 6-monthly Finance Directors' Update - June 2017 PKF Francis Clark
 
Steelbridge Compliance Brochure
Steelbridge Compliance BrochureSteelbridge Compliance Brochure
Steelbridge Compliance Brochuredniknejad
 
File Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesFile Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesBlackBerry
 
Reducing the Risk of Fraud​ through Treasury Technology
Reducing the Risk of Fraud​ through Treasury TechnologyReducing the Risk of Fraud​ through Treasury Technology
Reducing the Risk of Fraud​ through Treasury TechnologyElena Oliveira
 
Building & Running A Successful Identity Program
Building & Running A Successful Identity ProgramBuilding & Running A Successful Identity Program
Building & Running A Successful Identity ProgramDan Houser
 
Finance in the South West 2018 - Start Up Session
Finance in the South West 2018 - Start Up SessionFinance in the South West 2018 - Start Up Session
Finance in the South West 2018 - Start Up SessionPKF Francis Clark
 
Navigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management ProgramNavigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management ProgramPerficient, Inc.
 

Similar to LiveOffice Email Archiving & Compliance 201 (20)

MiFID II Update August 2017
MiFID II Update August 2017MiFID II Update August 2017
MiFID II Update August 2017
 
Remote Deposit Capture Risk Management & FFIEC Complaince
Remote Deposit Capture Risk Management & FFIEC ComplainceRemote Deposit Capture Risk Management & FFIEC Complaince
Remote Deposit Capture Risk Management & FFIEC Complaince
 
Dodd-Frank Compliance and Technology Summer Meeting 2013
Dodd-Frank Compliance and Technology Summer Meeting 2013Dodd-Frank Compliance and Technology Summer Meeting 2013
Dodd-Frank Compliance and Technology Summer Meeting 2013
 
David Chung, ING Presentation - BDI 2/23/12 Social Media in Wealth Management...
David Chung, ING Presentation - BDI 2/23/12 Social Media in Wealth Management...David Chung, ING Presentation - BDI 2/23/12 Social Media in Wealth Management...
David Chung, ING Presentation - BDI 2/23/12 Social Media in Wealth Management...
 
D&B onboard.pdf
D&B onboard.pdfD&B onboard.pdf
D&B onboard.pdf
 
LiveOffice Email Archiving & Compliance 301
LiveOffice Email Archiving & Compliance 301LiveOffice Email Archiving & Compliance 301
LiveOffice Email Archiving & Compliance 301
 
Evaluating Vendor Risks - slides
Evaluating Vendor Risks - slidesEvaluating Vendor Risks - slides
Evaluating Vendor Risks - slides
 
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
 
Evolving stringent regulatory requirements (reworked)
Evolving stringent regulatory requirements (reworked)Evolving stringent regulatory requirements (reworked)
Evolving stringent regulatory requirements (reworked)
 
Digital banking an regulatry compliance
Digital banking an regulatry compliance   Digital banking an regulatry compliance
Digital banking an regulatry compliance
 
04/28/2010 Meeting - Contract Compliance
04/28/2010 Meeting - Contract Compliance04/28/2010 Meeting - Contract Compliance
04/28/2010 Meeting - Contract Compliance
 
Update Your CCPA Plan with Practical Insights into the Proposed Regulations, ...
Update Your CCPA Plan with Practical Insights into the Proposed Regulations, ...Update Your CCPA Plan with Practical Insights into the Proposed Regulations, ...
Update Your CCPA Plan with Practical Insights into the Proposed Regulations, ...
 
Evaluating Vendor Risks - Presentation
Evaluating Vendor Risks - PresentationEvaluating Vendor Risks - Presentation
Evaluating Vendor Risks - Presentation
 
Bournemouth- Essential 6-monthly Finance Directors' Update - June 2017
Bournemouth- Essential 6-monthly Finance Directors' Update - June 2017 Bournemouth- Essential 6-monthly Finance Directors' Update - June 2017
Bournemouth- Essential 6-monthly Finance Directors' Update - June 2017
 
Steelbridge Compliance Brochure
Steelbridge Compliance BrochureSteelbridge Compliance Brochure
Steelbridge Compliance Brochure
 
File Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesFile Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial Services
 
Reducing the Risk of Fraud​ through Treasury Technology
Reducing the Risk of Fraud​ through Treasury TechnologyReducing the Risk of Fraud​ through Treasury Technology
Reducing the Risk of Fraud​ through Treasury Technology
 
Building & Running A Successful Identity Program
Building & Running A Successful Identity ProgramBuilding & Running A Successful Identity Program
Building & Running A Successful Identity Program
 
Finance in the South West 2018 - Start Up Session
Finance in the South West 2018 - Start Up SessionFinance in the South West 2018 - Start Up Session
Finance in the South West 2018 - Start Up Session
 
Navigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management ProgramNavigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management Program
 

Recently uploaded

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 

Recently uploaded (20)

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 

LiveOffice Email Archiving & Compliance 201

  • 1.
  • 2. Email Compliance 201 Managing Captured Data Presented by Core Compliance & Legal Services, Inc. February 19, 2009
  • 3. Introduction • Why This Is Important • Recap: “Electronic Communications 101: Fundamentals of Regulatory Requirements” • Where to Begin • Risk Area Categories Requiring Email Supervision • Rules of Thumb on Managing Captured Email 3 3
  • 4. Why This Is Important • SEC and FINRA require investment advisers and broker-dealers to supervise business activities • Fiduciary duty/best interest of the client • Current regulatory climate/recent events • Trend toward more disclosure, transparency and due diligence 4 4
  • 5. Recap: Regulatory Requirements For Broker-Dealers • Overview of FINRA rules – FINRA Rule 3010 Supervision – Securities Exchange Act 1934 17a-3 & 17a-4 – Notice to Members 07-59 • FINRA Expectations – Flexible risk-based approach – Content and target audience of the e-mail or IM – “Legible, true, complete, and current” records 5 5
  • 6. Recap: Regulatory Requirements For Investment Advisers • Overview of SEC Rules – Investment Advisers Act Rule 204-2 • SEC Expectations – Risk-based approach – Have effective policies and procedures for electronic communication – Safeguard records from unauthorized access or destruction 6 6
  • 7. Where to Begin • Review your firm’s customizable list of words and phrases • Recognize any areas of high risk which may require special attention – New hires – Heightened supervision of personnel – Communications between various departments within the business unit 7 7
  • 8. Risk Area Categories Requiring Email Supervision • Performance Advertising and Marketing • Safeguarding Confidential Client Information • Anti-Money Laundering • Conflicts of Interest/Insider Trading 8 8
  • 9. Performance Advertising and Marketing • Investment Advisers Act of 1940 Rule 206(4)-1 Advertisements by Investment Advisers – Prohibits fraudulent, deceptive, or manipulative advertising practices • FINRA Rule 2210 Communications with the Public – Prohibits false, exaggerated, unwarranted or misleading statements or claims 9 9
  • 10. Performance Advertising and Marketing • Examples of what to look for: – Emails from sales discussing performance returns without disclosures or compliance approval – Inclusions of projections/predictions, testimonials and charts/graphs – References to any past specific recommendations – Balanced discussions of risk/reward 10 10
  • 11. Safeguarding Confidential Client Information • Privacy of Consumer Financial Information (Regulation S-P) – Safeguarding confidential client information – Mandates privacy measures of all financial services firms • State laws govern – California SB1 Financial Information Privacy Act 11 11
  • 12. Safeguarding Confidential Client Information • Examples of what to look for: – Social Security/Driver’s License Numbers/Birthdays – Emailed completed New Account Forms – Authorized recipients of sensitive and confidential client information – Client account information such as current income, assets, and investments 12 12
  • 13. Anti-Money Laundering • Federal law requires financial institutions to develop and implement an Anti-Money Laundering (AML) Program which includes: – Policies and procedures and internal controls – Designation of an AML Officer – Annual independent testing of AML compliance – Ongoing employee training 13 13
  • 14. Anti-Money Laundering • Examples of What to Look For: – Wire transfers information – Emails to and/or from client services or new accounts containing identifying information – Discussions of transactions involving off-shore or international accounts 14 14
  • 15. Conflicts of Interest/Insider Trading • Insider Trading and Securities Fraud Act of 1988 • Remember: Investment Advisers and Broker- Dealers are required to act in best interest of the client 15 15
  • 16. Conflicts of Interest/Insider Trading • Examples of what to look for: – Emails between the research analysts and the trading desk – Emails making recommendations and compensation arrangements for the benefit of the adviser/representative – Emails containing sensitive confidential information sent from the firm to a third party outside the firm 16 16
  • 17. Rules of Thumb on Managing Captured Email • Spot and troubleshoot any loopholes – Too little data captured? Too much? • Ensure that your list of words and phrases fits the nature of the business (e.g., firm size, business activities) and keep the list confidential! • Verify that escalation procedures are being followed • Test the adequacy and effectiveness of back- up tapes/hard drives 17 17
  • 18. Rules of Thumb on Managing Captured Email • Document the review—merely capturing/opening email is not enough! • Keep your email supervision system up-to- date and in compliance with the latest regulatory requirements • Devise a system to delegate and supervise email review if needed—keep in mind the supervisor maintains ultimate responsibility! • Take advantage of your third-party service provider for guidance 18 18
  • 19. Questions? • Please contact us if you have any additional questions – Core Compliance & Legal Services, Inc. Tel: (619) 278-0020 Email: christina.rovira@corecls.com Website: www.corecls.com 19 19
  • 20. Email Compliance 201 R. Anthony Seyboth 2.19.09 No Hardware No Software No Waiting www.liveoffice.com Slide 20
  • 21. Overview: Experience The leading provider of email compliance solutions Who We Are What We Do Who We Serve  $22M in revenue  Archiving  20K successful audits  Founded in 1998  Compliance  99% client retention  Experienced team  Discovery  Fortune 100 clients  100+ employees  Continuity  Financial svcs focused  Profitable  Hosting  10,000 clients No Hardware No Software No Waiting www.liveoffice.com Slide 21
  • 22. LiveOffice AdvisorMail Difference • Automatically captures all sent and received messages Archive • Offers unlimited storage & retention • Protects messages in redundant data centers • Scans all messages for keywords & phrases • Provides random sampling of messages for rapid review Review • Comprehensive reporting features to satisfy requirements • Complies with state & federal requirements (SEC/FINRA/SRO) Comply • Offers end-to-end audit support • Provides peace of mind having passed 20K audits No Hardware No Software No Waiting www.liveoffice.com Slide 22
  • 23. LiveOffice Difference Meet Requirements Archive Review Comply Trust a 10,000+ Clients Proven Leader Worry Less Unlimited Storage, Guaranteed with Our Deployed in 5 Days, Guaranteed Guarantees 99.99% Uptime, Guaranteed No Hardware No Software No Waiting www.liveoffice.com Slide 23
  • 24. Thank You! Meet Trust Guaranteed Requirements R. Anthony Seyboth Director, Compliance & Litigation Services 800.374.2032 X 117 anthony.seyboth@liveoffice.com No Hardware No Software No Waiting www.liveoffice.com Slide 24