Presentation delivered by Aletheia Consulting Group on HR.com focused on best practices in international background screening for transnational organizations.
Understanding The Legal Boundaries For Competitive Intelligence In India 9th ...Harsh_Sinha
The document discusses competitive intelligence (CI) and corporate espionage in India. It provides an overview of legal and ethical considerations for gathering competitor information. Specifically, it outlines that (1) CI involves the legal and ethical collection of public information about competitors, while corporate espionage uses illegal means; (2) while not explicitly illegal, espionage activities may violate other laws; and (3) information technology is an important tool for CI but also enables abuse, which some IT laws aim to curb.
Electronic Health Records (EHR) - A Look at the Industry and Its Future, A CV...Paige Rasid
The document summarizes upcoming events hosted by CVG including boardroom series meetings on various topics like M&A, employment issues, and crowdfunding in different locations from April to July. It also lists three minute pitches from several individuals and a panel discussion on electronic health records focusing on the industry and its future.
Global Networking and Offshoring HCL - Operations strategyAnkur Verma
Global networking refers to methods that connect all departments, offices, and subsidiaries of a corporation across international borders, bringing challenges like different time zones and standards. Offshoring involves relocating business processes or facilities to foreign countries to reduce costs. HCL is a leading global IT company founded in 1976 with over 80,000 professionals operating in 31 countries. It has expanded through offshoring by acquiring foreign companies and establishing joint ventures to address opportunities in markets like finance. While most functions can be offshored, there are risks to consider like lower savings than expected or inadequate local skills that companies try to mitigate through strategies like supplier development.
Software can help banks sort through large volumes of customer transaction records and flag suspicious activities that violate anti-money laundering (AML) regulations. However, technology alone does not ensure compliance - banks must also develop strong processes to monitor transactions, identify customers, and assess risks. While each regulation has different requirements, many compliance activities like data protection can be addressed through common best practices. The right technology partner can help banks prioritize needs and integrate solutions to strengthen AML compliance over time.
Remote Deposit Capture Risk Management, May 2010 UpdateJTLeekley
Just as the Remote Deposit Capture Industry continues to change and evolve, so too must your organization\'s approach to RDC Risk Management & FFIEC Compliance. The FFIEC has issues important updates to their RDC Risk Management Guidelines in February, and as recently as April 29, 2010. Beginning may 19th, Join John Leekley and Ed McLaughlin of RemoteDepositCapture.com for an in-depth discussion on this topic, brought to you free of charge by FISERV and FIS. Visit www.RemoteDepositCapture.com to learn more.
This document provides an overview of the costs associated with data breaches. It begins by introducing the speakers and the agenda. It then discusses what constitutes a data breach and the types of data that may be exposed, such as PII, PHI, intellectual property, and financial information. The document explores the various direct and indirect costs of a breach for different entities. It provides examples of cost estimates from past breaches, which range from thousands to over $170 million depending on the size and type of breach. Patterns in breach cost data are examined, though correlations are weak. Overall, the document deconstructs the complexities involved in understanding and estimating the full costs of a data breach.
Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...Rob Robinson
This document provides an overview of a presentation on complex discovery in corporations and law firms. The presentation discusses challenges with electronic discovery (eDiscovery) including rising costs and proportionality issues. It provides tips for developing an efficient eDiscovery plan including early case assessment, limiting data collection and review, using technology tools, and negotiating with opposing counsel. The presentation also covers retention policies, privilege review, production formats, and risks of sanctions. The overall goal discussed is developing a discovery process that minimizes costs and risks while being defensible.
Understanding The Legal Boundaries For Competitive Intelligence In India 9th ...Harsh_Sinha
The document discusses competitive intelligence (CI) and corporate espionage in India. It provides an overview of legal and ethical considerations for gathering competitor information. Specifically, it outlines that (1) CI involves the legal and ethical collection of public information about competitors, while corporate espionage uses illegal means; (2) while not explicitly illegal, espionage activities may violate other laws; and (3) information technology is an important tool for CI but also enables abuse, which some IT laws aim to curb.
Electronic Health Records (EHR) - A Look at the Industry and Its Future, A CV...Paige Rasid
The document summarizes upcoming events hosted by CVG including boardroom series meetings on various topics like M&A, employment issues, and crowdfunding in different locations from April to July. It also lists three minute pitches from several individuals and a panel discussion on electronic health records focusing on the industry and its future.
Global Networking and Offshoring HCL - Operations strategyAnkur Verma
Global networking refers to methods that connect all departments, offices, and subsidiaries of a corporation across international borders, bringing challenges like different time zones and standards. Offshoring involves relocating business processes or facilities to foreign countries to reduce costs. HCL is a leading global IT company founded in 1976 with over 80,000 professionals operating in 31 countries. It has expanded through offshoring by acquiring foreign companies and establishing joint ventures to address opportunities in markets like finance. While most functions can be offshored, there are risks to consider like lower savings than expected or inadequate local skills that companies try to mitigate through strategies like supplier development.
Software can help banks sort through large volumes of customer transaction records and flag suspicious activities that violate anti-money laundering (AML) regulations. However, technology alone does not ensure compliance - banks must also develop strong processes to monitor transactions, identify customers, and assess risks. While each regulation has different requirements, many compliance activities like data protection can be addressed through common best practices. The right technology partner can help banks prioritize needs and integrate solutions to strengthen AML compliance over time.
Remote Deposit Capture Risk Management, May 2010 UpdateJTLeekley
Just as the Remote Deposit Capture Industry continues to change and evolve, so too must your organization\'s approach to RDC Risk Management & FFIEC Compliance. The FFIEC has issues important updates to their RDC Risk Management Guidelines in February, and as recently as April 29, 2010. Beginning may 19th, Join John Leekley and Ed McLaughlin of RemoteDepositCapture.com for an in-depth discussion on this topic, brought to you free of charge by FISERV and FIS. Visit www.RemoteDepositCapture.com to learn more.
This document provides an overview of the costs associated with data breaches. It begins by introducing the speakers and the agenda. It then discusses what constitutes a data breach and the types of data that may be exposed, such as PII, PHI, intellectual property, and financial information. The document explores the various direct and indirect costs of a breach for different entities. It provides examples of cost estimates from past breaches, which range from thousands to over $170 million depending on the size and type of breach. Patterns in breach cost data are examined, though correlations are weak. Overall, the document deconstructs the complexities involved in understanding and estimating the full costs of a data breach.
Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...Rob Robinson
This document provides an overview of a presentation on complex discovery in corporations and law firms. The presentation discusses challenges with electronic discovery (eDiscovery) including rising costs and proportionality issues. It provides tips for developing an efficient eDiscovery plan including early case assessment, limiting data collection and review, using technology tools, and negotiating with opposing counsel. The presentation also covers retention policies, privilege review, production formats, and risks of sanctions. The overall goal discussed is developing a discovery process that minimizes costs and risks while being defensible.
3rd Party Risk: Practical Considerations for Privacy & Security Due DiligenceResilient Systems
This document provides an overview of 3rd party risk due diligence best practices for privacy and security. It discusses using questionnaires and on-site reviews to assess 3rd party vendors. It also addresses considerations for evaluating foreign service providers, such as the scope of services, data sensitivity, geographic factors, business continuity, local laws, legal risks, and security controls. The document provides examples of key questions to include in a questionnaire and areas to focus on during an on-site review.
Emids Morning Security Virtual India V3techcouncil
The document discusses data security and privacy in offshore operations. It outlines potential risks like loss of data, intellectual property, and damage to brand. It then discusses ways to mitigate these risks, including understanding relevant laws and regulations, NASSCOM's role in promoting standards in the Indian IT market, vendor best practices around frameworks and audits, and drafting secure contracts.
Mike Rosten gave a presentation on forensic accounting. He discussed his credentials and experience in forensic accounting since 1998. He outlined typical forensic accounting assignments like fraud investigations, evaluating insurance claims, and analyzing bankruptcy cases. Forensic accountants reconstruct financial transactions, identify anomalies, quantify damages, and may testify in court. Their work requires skills in accounting, investigation, communication, and analyzing financial records from various sources to determine what happened and who is responsible. Forensic accounting differs from auditing in its investigative focus on confirming or refuting specific allegations rather than providing an opinion on general financial statements.
Addressing Fraud Risk Management with FactsInfosys BPM
Fraud is identified and caught with the aid of facts. Facts give a deeper understanding to what you could be looking at in your organization. Facts have also given rise to the mnemonic that Fraud is Always Committed by Trusted Souls. As simplistic as it may seem, it holds key to a potential trigger. Are you equipped with the necessary tools to address this challenge? Is your organization equipped with fraud Risk Management? Here are some quick slides to take you through what you need to have.
Technology Enabled Corporate Communications- Forum For Corporate Directors an...Roger Cohen
This document discusses technology trends in consumer and enterprise technology and how they can enable professional services and improve compliance processes. It summarizes Roger Cohen's expertise in designing technology solutions for legally intensive business processes. It also outlines challenges public companies face in managing information for regulatory filings, audits, and compliance. It proposes that technology-enabled professional services using tools like virtual data rooms and apps can help address these challenges by providing structure, automation and transparency. Finally, it discusses keys to successful enterprise IT projects, including implementing solutions incrementally from the bottom-up and focusing on user experience, change management and governance.
A powerpoint presentation giving basic insights on forensic audit,forensic auditors, how is the engagement conducted, its scope , the famous Satyam Case and the Nirav Modi case along with the RBI guidelines regarding the same. It is a presentation made for educational and awareness purpose and not to be copied or reproduced without prior consent.
Third-party due diligence is important for preventing corruption in supply chains. Effective due diligence includes identifying risks, conducting checks on suppliers, and monitoring relationships. Key risks include country risks, sector risks, and deficiencies within a company. Checks examine a supplier's ownership, legal issues, financials, and anti-corruption procedures. Global databases like LexisNexis allow searching public records to verify supplier information and identify any red flags. Ongoing monitoring is also important for managing third-party risks.
Third-party due diligence is an important process for identifying corruption risks in the supply chain. It involves conducting thorough background checks of potential business partners, including verifying their identity and ownership structure, reviewing financial records and legal issues, assessing anti-corruption compliance programs, and evaluating country and sector risks. Regular monitoring and audits of existing partners are also important aspects of effective third-party due diligence.
The article discusses how operational due diligence can help investors assess a hedge fund's risk of insider trading. A four step process is outlined:
1. Determine the fund's research sources to understand how analysts obtain information.
2. Evaluate the oversight of the research process, such as what compliance monitoring is in place.
3. Assess the oversight of trading to ensure controls prevent trading on nonpublic information.
4. Analyze restrictions on gifts to prevent potential conflicts around information sharing.
Operational due diligence allows investors to evaluate a fund's control environment surrounding research and trading, helping minimize exposure to insider trading.
This document provides an overview of the costs associated with data breaches. It begins by introducing the speakers and the agenda. It then discusses what constitutes a data breach and the types of data that may be exposed, such as PII, PHI, intellectual property, and financial information. The document outlines direct and indirect costs of breaches, including response costs, lost productivity, fines, and reputation damage. It provides estimates of costs from studies and actual breaches, which range from hundreds of thousands to over $170 million depending on the size and type of breach. Patterns in breach cost data are discussed. The document aims to help organizations understand and plan for the potential financial impact of a data security incident.
Presentation discussing the importance of reserves, how they should be used, ways to predict risk, and strategies for enhancing - Tate Tryon CPAs - Nonprofit CPA Firm
Corgentum has launched a new service that integrates background investigations into its operational due diligence process. This offers clients a seamless solution and addresses issues with traditional models that outsource background checks. Corgentum's integrated approach provides ratings and customized investigations, coordinates document releases, and focuses on evaluating findings rather than just reporting data.
Riskpro is an Indian risk management consulting firm with offices in Mumbai, Delhi, and Bangalore. It provides a wide range of risk management advisory services including Basel II/III advisory, corporate risk assessment, information security audits, and operational risk reviews. The document discusses Riskpro's mission, value propositions, service offerings, client examples, team resumes, and partnerships. It also covers topics like legal and compliance audits, the audit methodology, and benefits and challenges of such audits.
The document provides information about Riskpro, an organization that offers risk management consulting services in India. It has offices in major cities and alliances in other cities, managed by experienced professionals. Riskpro aims to provide integrated risk management solutions and be a preferred service provider for governance, risk, and compliance needs. It offers a wide range of advisory services including audits, assessments, and training. The document then focuses on Riskpro's legal and compliance audits, outlining their objectives, methodology, and coverage of relevant acts.
This document provides information about Riskpro, an organization that offers risk management consulting services in India. It has offices in three major cities and alliances in other cities. The document discusses Riskpro's mission, value proposition, services, clients, and team experiences. Riskpro's services include legal and compliance audits, Basel II/III advisory, corporate risk assessment, information security services, and training. Example clients mentioned are from the retail sector. Biographies are provided for several of Riskpro's experienced professionals on its management team.
Riskpro is an Indian risk management consulting firm with offices in Mumbai, Delhi, and Bangalore. It provides a wide range of risk management advisory services including Basel II/III advisory, corporate risk assessment, information security audits, and operational risk reviews. The document discusses Riskpro's mission, value propositions, service offerings, client examples, team resumes, and partnerships. It also covers topics like legal and compliance audits, the audit methodology, and benefits and challenges of such audits.
RISKPRO INDIA
• Riskpro is India’s first national practice dedicated to risk management services and training, corporate governance, and global regulatory compliances
• Risk can be defined as a prospect of loss or reduced gain that can adversely affect the achievement of an organisation’s objectives
• When greed overtakes need, it spells trouble. Manifested as ‘bankruptcy’ in much of the developed world and ‘corruption’ closer to home, greed has clearly disrupted some major industrialised economies and enhanced the risks of doing business
• In today’s world, risks are not few. The reason companies so often fail to systematically manage their key risks is rooted in the way they define the risks they face. Risks are manageable and the answer to untapped business opportunities that lie dormant waiting for risk factors to turn favourable
• Riskpro was founded in 2009 with offices in Mumbai, Delhi, and Bangalore and it has already added eight member firms in Ahmedabad, Agra, Chennai, Gurgaon, Hyderabad, Jaipur, Ludhiana, and Pune. All our offices and member firms are well equipped and staffed with qualified professionals viz. CA, CWA, CS, CPA, CIA, CISA, CFA, and MBA
• Riskpro’s founders are qualified risk management specialists with extensive work experience in Europe and USA in several industries and financial institutions
• Riskpro aims to be the preferred service provider for large and medium enterprises on risk protection, corporate governance, and global regulatory issues; delivering state-of-the-art quality and timely services at viable rates
RISKPRO SERVICES
• Our four major practice specialisations /service lines are:
Risk: Enterprise Risk Management (services and training & recruitment)
Governance: Corporate Governance and Transparency
Compliance: Global and Indian Regulatory Compliances
Training: in all of the above service lines
• The Risk Practice deals with all classes of risks and processes viz. governance, strategic, systemic /infrastructure, compliance, reporting, and financial reporting. Processes require that key risks are properly identified, measured, monitored, controlled, and reported. Processes may also require tools like risk based internal audit, information security testing, and fraud investigations, to be employed
• The Governance Practice deals with corporate oversight and risk governance issues within an organization including business continuity planning, compliance with SEBI guidelines by listed companies, regulations relating to independent directors, investor expectation and protection, Clause-49 on corporate governance, etc
• The Compliance Practice covers a wide range of regulatory and environmental compliances including Sox, IFRS, Solvency II, Basel II /III, Corporate Laws & Direct Tax Code etc
• The Training Practice comprises of a variety of structured and /or industry specific training programs and modules designed and conducted by Riskpro experts and trainers at onsite (client or other off
Rule Imc Records Management & Discovery Offering Q109 V2mikelines
The document is a presentation by Rule Financial on electronic discovery best practices. It was prepared in Q1 2009. The presentation discusses the challenges of increasing litigation volumes and discovery obligations, as well as the fragmented software vendor landscape. It promotes adopting the Electronic Discovery Reference Model process and bringing discovery management in-house through strategic investment in people, processes, and technology.
Human Rights Impact Assesments And Corporate ResponsibilityAviva Canada
This presentation is a companion piece to a larger work that looks at the grand tension between the corporate model of wealth generation and human
rights abuses. I advocate that the integration and implementation of pre-emptive risk management
tools can operationalise corporate human rights obligations within the UN Ruggie framework. In the
context of a case study analysis of water privatisation in Argentina, I have placed specific focus on the
corporate operationalisation of (human rights) due diligence utilizing a Human Rights Impact
Assessment model in its ex-ante project planning as an effective risk aversion-profit generation
model.
Building an enterprise forensics response serviceSeccuris Inc.
What issues are enterprises facing that require digital forensics?
• In-depth technical issues within the IT environment
o Complex attack / virus analysis
o Packet analysis
o Complex environment investigation coordination (VMWare)
• Separation of duties / transparency issues with IT staff
o Integrity and audit-ability issues from regulators and common due diligence requirements
• System Audit Functionality verification
o Audit System Investigation / Recovery
• Ensure systems are preserved for forensic investigation*
o Banking Standards
o NIST Standards
o PCI
o US State Laws
• Legal issues such as eDiscovery
o Prepare, Preserve & Produce electronically stored information
• Privacy issues from legislation, regulation and clients
o “DNA Forensics” – Identification for good & evil
• Records Management issues
o Historical Data Retrieval
o Data reconstruction
• Human Resources issues / employee investigations
o Inappropriate Use
o Harassment / Workplace Safety
o Loss management issues / evidence verification
o Theft / Fraud investigation support
o Sabotage
What is an Enterprise Forensics Response Service?
• Enables business owners to actively enforce corporate policy and protect and preserve digital assets through the use of forensic methods.
• Handles investigation requests from many different parts of the organization
o IT (Network / Applications)
o Internal Audit / Compliance
o Legal
o Privacy
o Records Management
o Human Resources / Employee Managers
o Loss Management / Physical Security
• An Enterprise Architectural Perspective of an EDF Service (Overview)
o Conceptual linkages to the business & information security strategy
o Logical service definition, examples of peer services
o Physical mechanisms that the EDF service is comprised of
o Examples of components that the EDF service utilizes
- What does the presentation cover?
• Identification & definition of required forensic services
• Review of common service mechanisms and components
• Considerations for implementing & service management in the enterprise
More Related Content
Similar to Best Practices In International Background Screening
3rd Party Risk: Practical Considerations for Privacy & Security Due DiligenceResilient Systems
This document provides an overview of 3rd party risk due diligence best practices for privacy and security. It discusses using questionnaires and on-site reviews to assess 3rd party vendors. It also addresses considerations for evaluating foreign service providers, such as the scope of services, data sensitivity, geographic factors, business continuity, local laws, legal risks, and security controls. The document provides examples of key questions to include in a questionnaire and areas to focus on during an on-site review.
Emids Morning Security Virtual India V3techcouncil
The document discusses data security and privacy in offshore operations. It outlines potential risks like loss of data, intellectual property, and damage to brand. It then discusses ways to mitigate these risks, including understanding relevant laws and regulations, NASSCOM's role in promoting standards in the Indian IT market, vendor best practices around frameworks and audits, and drafting secure contracts.
Mike Rosten gave a presentation on forensic accounting. He discussed his credentials and experience in forensic accounting since 1998. He outlined typical forensic accounting assignments like fraud investigations, evaluating insurance claims, and analyzing bankruptcy cases. Forensic accountants reconstruct financial transactions, identify anomalies, quantify damages, and may testify in court. Their work requires skills in accounting, investigation, communication, and analyzing financial records from various sources to determine what happened and who is responsible. Forensic accounting differs from auditing in its investigative focus on confirming or refuting specific allegations rather than providing an opinion on general financial statements.
Addressing Fraud Risk Management with FactsInfosys BPM
Fraud is identified and caught with the aid of facts. Facts give a deeper understanding to what you could be looking at in your organization. Facts have also given rise to the mnemonic that Fraud is Always Committed by Trusted Souls. As simplistic as it may seem, it holds key to a potential trigger. Are you equipped with the necessary tools to address this challenge? Is your organization equipped with fraud Risk Management? Here are some quick slides to take you through what you need to have.
Technology Enabled Corporate Communications- Forum For Corporate Directors an...Roger Cohen
This document discusses technology trends in consumer and enterprise technology and how they can enable professional services and improve compliance processes. It summarizes Roger Cohen's expertise in designing technology solutions for legally intensive business processes. It also outlines challenges public companies face in managing information for regulatory filings, audits, and compliance. It proposes that technology-enabled professional services using tools like virtual data rooms and apps can help address these challenges by providing structure, automation and transparency. Finally, it discusses keys to successful enterprise IT projects, including implementing solutions incrementally from the bottom-up and focusing on user experience, change management and governance.
A powerpoint presentation giving basic insights on forensic audit,forensic auditors, how is the engagement conducted, its scope , the famous Satyam Case and the Nirav Modi case along with the RBI guidelines regarding the same. It is a presentation made for educational and awareness purpose and not to be copied or reproduced without prior consent.
Third-party due diligence is important for preventing corruption in supply chains. Effective due diligence includes identifying risks, conducting checks on suppliers, and monitoring relationships. Key risks include country risks, sector risks, and deficiencies within a company. Checks examine a supplier's ownership, legal issues, financials, and anti-corruption procedures. Global databases like LexisNexis allow searching public records to verify supplier information and identify any red flags. Ongoing monitoring is also important for managing third-party risks.
Third-party due diligence is an important process for identifying corruption risks in the supply chain. It involves conducting thorough background checks of potential business partners, including verifying their identity and ownership structure, reviewing financial records and legal issues, assessing anti-corruption compliance programs, and evaluating country and sector risks. Regular monitoring and audits of existing partners are also important aspects of effective third-party due diligence.
The article discusses how operational due diligence can help investors assess a hedge fund's risk of insider trading. A four step process is outlined:
1. Determine the fund's research sources to understand how analysts obtain information.
2. Evaluate the oversight of the research process, such as what compliance monitoring is in place.
3. Assess the oversight of trading to ensure controls prevent trading on nonpublic information.
4. Analyze restrictions on gifts to prevent potential conflicts around information sharing.
Operational due diligence allows investors to evaluate a fund's control environment surrounding research and trading, helping minimize exposure to insider trading.
This document provides an overview of the costs associated with data breaches. It begins by introducing the speakers and the agenda. It then discusses what constitutes a data breach and the types of data that may be exposed, such as PII, PHI, intellectual property, and financial information. The document outlines direct and indirect costs of breaches, including response costs, lost productivity, fines, and reputation damage. It provides estimates of costs from studies and actual breaches, which range from hundreds of thousands to over $170 million depending on the size and type of breach. Patterns in breach cost data are discussed. The document aims to help organizations understand and plan for the potential financial impact of a data security incident.
Presentation discussing the importance of reserves, how they should be used, ways to predict risk, and strategies for enhancing - Tate Tryon CPAs - Nonprofit CPA Firm
Corgentum has launched a new service that integrates background investigations into its operational due diligence process. This offers clients a seamless solution and addresses issues with traditional models that outsource background checks. Corgentum's integrated approach provides ratings and customized investigations, coordinates document releases, and focuses on evaluating findings rather than just reporting data.
Riskpro is an Indian risk management consulting firm with offices in Mumbai, Delhi, and Bangalore. It provides a wide range of risk management advisory services including Basel II/III advisory, corporate risk assessment, information security audits, and operational risk reviews. The document discusses Riskpro's mission, value propositions, service offerings, client examples, team resumes, and partnerships. It also covers topics like legal and compliance audits, the audit methodology, and benefits and challenges of such audits.
The document provides information about Riskpro, an organization that offers risk management consulting services in India. It has offices in major cities and alliances in other cities, managed by experienced professionals. Riskpro aims to provide integrated risk management solutions and be a preferred service provider for governance, risk, and compliance needs. It offers a wide range of advisory services including audits, assessments, and training. The document then focuses on Riskpro's legal and compliance audits, outlining their objectives, methodology, and coverage of relevant acts.
This document provides information about Riskpro, an organization that offers risk management consulting services in India. It has offices in three major cities and alliances in other cities. The document discusses Riskpro's mission, value proposition, services, clients, and team experiences. Riskpro's services include legal and compliance audits, Basel II/III advisory, corporate risk assessment, information security services, and training. Example clients mentioned are from the retail sector. Biographies are provided for several of Riskpro's experienced professionals on its management team.
Riskpro is an Indian risk management consulting firm with offices in Mumbai, Delhi, and Bangalore. It provides a wide range of risk management advisory services including Basel II/III advisory, corporate risk assessment, information security audits, and operational risk reviews. The document discusses Riskpro's mission, value propositions, service offerings, client examples, team resumes, and partnerships. It also covers topics like legal and compliance audits, the audit methodology, and benefits and challenges of such audits.
RISKPRO INDIA
• Riskpro is India’s first national practice dedicated to risk management services and training, corporate governance, and global regulatory compliances
• Risk can be defined as a prospect of loss or reduced gain that can adversely affect the achievement of an organisation’s objectives
• When greed overtakes need, it spells trouble. Manifested as ‘bankruptcy’ in much of the developed world and ‘corruption’ closer to home, greed has clearly disrupted some major industrialised economies and enhanced the risks of doing business
• In today’s world, risks are not few. The reason companies so often fail to systematically manage their key risks is rooted in the way they define the risks they face. Risks are manageable and the answer to untapped business opportunities that lie dormant waiting for risk factors to turn favourable
• Riskpro was founded in 2009 with offices in Mumbai, Delhi, and Bangalore and it has already added eight member firms in Ahmedabad, Agra, Chennai, Gurgaon, Hyderabad, Jaipur, Ludhiana, and Pune. All our offices and member firms are well equipped and staffed with qualified professionals viz. CA, CWA, CS, CPA, CIA, CISA, CFA, and MBA
• Riskpro’s founders are qualified risk management specialists with extensive work experience in Europe and USA in several industries and financial institutions
• Riskpro aims to be the preferred service provider for large and medium enterprises on risk protection, corporate governance, and global regulatory issues; delivering state-of-the-art quality and timely services at viable rates
RISKPRO SERVICES
• Our four major practice specialisations /service lines are:
Risk: Enterprise Risk Management (services and training & recruitment)
Governance: Corporate Governance and Transparency
Compliance: Global and Indian Regulatory Compliances
Training: in all of the above service lines
• The Risk Practice deals with all classes of risks and processes viz. governance, strategic, systemic /infrastructure, compliance, reporting, and financial reporting. Processes require that key risks are properly identified, measured, monitored, controlled, and reported. Processes may also require tools like risk based internal audit, information security testing, and fraud investigations, to be employed
• The Governance Practice deals with corporate oversight and risk governance issues within an organization including business continuity planning, compliance with SEBI guidelines by listed companies, regulations relating to independent directors, investor expectation and protection, Clause-49 on corporate governance, etc
• The Compliance Practice covers a wide range of regulatory and environmental compliances including Sox, IFRS, Solvency II, Basel II /III, Corporate Laws & Direct Tax Code etc
• The Training Practice comprises of a variety of structured and /or industry specific training programs and modules designed and conducted by Riskpro experts and trainers at onsite (client or other off
Rule Imc Records Management & Discovery Offering Q109 V2mikelines
The document is a presentation by Rule Financial on electronic discovery best practices. It was prepared in Q1 2009. The presentation discusses the challenges of increasing litigation volumes and discovery obligations, as well as the fragmented software vendor landscape. It promotes adopting the Electronic Discovery Reference Model process and bringing discovery management in-house through strategic investment in people, processes, and technology.
Human Rights Impact Assesments And Corporate ResponsibilityAviva Canada
This presentation is a companion piece to a larger work that looks at the grand tension between the corporate model of wealth generation and human
rights abuses. I advocate that the integration and implementation of pre-emptive risk management
tools can operationalise corporate human rights obligations within the UN Ruggie framework. In the
context of a case study analysis of water privatisation in Argentina, I have placed specific focus on the
corporate operationalisation of (human rights) due diligence utilizing a Human Rights Impact
Assessment model in its ex-ante project planning as an effective risk aversion-profit generation
model.
Building an enterprise forensics response serviceSeccuris Inc.
What issues are enterprises facing that require digital forensics?
• In-depth technical issues within the IT environment
o Complex attack / virus analysis
o Packet analysis
o Complex environment investigation coordination (VMWare)
• Separation of duties / transparency issues with IT staff
o Integrity and audit-ability issues from regulators and common due diligence requirements
• System Audit Functionality verification
o Audit System Investigation / Recovery
• Ensure systems are preserved for forensic investigation*
o Banking Standards
o NIST Standards
o PCI
o US State Laws
• Legal issues such as eDiscovery
o Prepare, Preserve & Produce electronically stored information
• Privacy issues from legislation, regulation and clients
o “DNA Forensics” – Identification for good & evil
• Records Management issues
o Historical Data Retrieval
o Data reconstruction
• Human Resources issues / employee investigations
o Inappropriate Use
o Harassment / Workplace Safety
o Loss management issues / evidence verification
o Theft / Fraud investigation support
o Sabotage
What is an Enterprise Forensics Response Service?
• Enables business owners to actively enforce corporate policy and protect and preserve digital assets through the use of forensic methods.
• Handles investigation requests from many different parts of the organization
o IT (Network / Applications)
o Internal Audit / Compliance
o Legal
o Privacy
o Records Management
o Human Resources / Employee Managers
o Loss Management / Physical Security
• An Enterprise Architectural Perspective of an EDF Service (Overview)
o Conceptual linkages to the business & information security strategy
o Logical service definition, examples of peer services
o Physical mechanisms that the EDF service is comprised of
o Examples of components that the EDF service utilizes
- What does the presentation cover?
• Identification & definition of required forensic services
• Review of common service mechanisms and components
• Considerations for implementing & service management in the enterprise
Similar to Best Practices In International Background Screening (20)
2. Presented by
Terry Corley, Managing Principal
Aletheia Consulting Group
• Aletheia Consulting Group (www.aletheiaconsultinggroup.co)
provides expert global advisory solutions for multinational
organizations human resource, compliance, and security
international risk management resource needs. Our primary
focus is on companies that have overseas operations that
seek to navigate the sometimes challenging sea of
international risk management.
Gary Clayton, CEO
Privacy Compliance Group
• Privacy Compliance Group
(www.privacycompliancegroup.com) is a data management
and privacy consulting service that provides the expert legal
knowledge necessary to align an organization's business
goals with its privacy, security, and compliance requirements.
2
3. Session Objectives
What are today’s most common types of
international background checks and how do
they help organizations exercise required
due diligence?
What is considered a reasonable level of
due diligence according to prominent anti-
corruption laws affecting global trade?
How can multinational organizations
implement best practice international
screening programs that meet necessary
due care and legal compliance?
3
4. Overview
A Way
Forward -
Overview of How to
Common how to
today's evaluate
Types of implement a
Typical International Legal what to
International best
Scenarios Background Landscape check on
Background practice
Check overseas
Checks international
Market candidates
screening
program
4
8. Legal Landscape View
Overview of Regulatory
Environment,
Internationally
Data Provisions Corporate & Financial
• Privacy and Data Protection Governance
• Mandatory - what's required by law • Anti-Money Laundering
• Transfer - Transborder • Anti-Corruption
• Record Restrictions • Anti-Terrorism
• Purpose / Consent • Know-Your-Customer
• Financial Services / Regulatory
Authorities
• Other Regulated Industries
8
9. Legal Landscape View (2)
Overview of Regulatory
Environment, U.S.
Data Provisions Corporate & Financial
• Privacy Governance
• Mandatory • AML
• Non-Transferable • FCPA
• Record Restrictions • USA Patriot Act
• Financial Services / Regulatory
• FCRA
• Bank Secrecy Act
• Purpose / Consent • Sarbanes OX.
• Other Regulated Industries
9
10. Legal Landscape View (3)
• Consequences for
not getting it right
– Criminal
Prosecution
– Civil Action
– Enforcement Action
– Data Transfer
Injunction
10
11. Case Examples
Case Examples
• Oil Company
• Financial Services
• Publicly Traded Companies
• Critical Infrastructure Organizations
• Data Processors
11
12. Common Types of International
Background Checks
Right to work check –
Identity check – confirms
confirms candidate is
candidate is who they say
authorized to work in a
they are
given country
Address verification –
Education – confirms
confirms candidate’s
academic credentials
current residency
Reference check –
Employment – confirms
confirms professional
claimed work history
reputation
Professional credential –
confirms professional
certifications
12
13. Common Types of International
Background Checks (2)
Criminal records history – determine if
Consumer Credit - evaluate candidate's
candidate has a propensity to engage in
financial responsibility
illegal activities
Regulatory and Compliance / Sanctions
Search – determine if candidate has been
Civil Records - determine if candidate has sanctioned by relevant regulatory
any judgments, bankruptcy, or liens. authorities, has been the subject of other
enforcement actions, or identified as a
possible politically exposed person
Adverse media – news articles that
Conflict of interest – evaluate if candidate
contain derogatory information the
may be involved in multiple interests
candidate
Trading Partner / Vendor Screening –
Drug Testing – determination if candidate
determine if vendor is legitimate and of
has a propensity to abuse illicit drugs
good standing
13
14. How to determine scope
Risk Benefit Analysis
Answering the who, what, when where, how
and why questions
– Does it exist?
– Is it available?
– What is the purpose?
– What is the Relevance / Sensitivity?
– Where is it available?
– Who has it / what is the source?
– What is the reliability?
– What is required to get it?
– Is it transferable?
– What are the notice & consent
requirements?
– What are the data storage and
retention requirements?
– Do we or will we have the appropriate
procedures?
– Timeliness
– Cost Benefit
14
15. How to determine scope (2)
• Who's involved in
making decisions?
– Gen Counsel
– Human Resources
– Compliance
– Security
– Risk Management
– Supervisor of
Candidate
– BOD
15
16. A Way Forward - How to implement
• Priority, Authority,
Establish Responsibility
• Assess your privacy,
Assess compliance, and
cultural environment
• Organize your
resources
• Identify personnel
• Global HR
Organize • Regional / Local HR
• Compliance
• Security
• Legal
• IT
16
17. A Way Forward - How to implement (2)
• Develop
Develop
Policies,
Practices &
Procedures
• Implement
Implement
Policies,
Practices, &
Procedures
• Maintain
Maintain
Polices,
Practices, &
Procedures
Manage
• Manage your
exceptions
17
19. SERVICES
• Global Background
Reporting & Privacy
Assessment™
• Global HR Background
Screening Policy &
Procedure Guides
• Strategic Vendor Sourcing
of International Data and
Services Globally
• Human Resource
Technology Evaluation and
Integrations
• International Background
Check Provider Vendor
Evaluation and Audits
Aletheia Consulting Group is the trusted name for We provide the advice
today’s global HR,
global risk mitigation and privacy advice. Compliance, and Security
Aletheia Consulting Group provides strategic global risk management information professionals need when
technology advice to todays’ Global Organizations. We offer thought-leading integrated navigating the challenges
business and technology advice that drives risk mitigation and organizational faced with international risk
effectiveness. management programs.
As a strategic business consulting and specialized advisory practice, Aletheia focuses on 770.262.9113
helping Human Resource, Security, and Compliance leaders achieve global success
info@AletheiaConsultingGroup.co
through the deployment of best-practice transnational solutions covering the people,
processes and technology supporting the global HR and risk management function. www.AletheiaConsultingGroup.co