Compliance Risk Assessment
Fall 2016 Class 8
Stephen Paine
Diane McEnroe, Guest Lecturer
Compliance Risk by Area:
An Overview of Pharmaceutical Industry Regulation
Recap of Class 1
Pfizer Case Study and Compliance Risks
Legal and Regulatory Incentives/Conflicts of Interest
Political Failure of Controls
Reputational Recidivism
Point of Sale/Distribution
Definitions
Compliance Risk is the risk of failing to comply with applicable legal or regulatory requirements resulting in a material loss (financial or reputational) or legal/regulatory sanction
A Compliance Risk Assessment is a framework to enable the evaluation and analysis of the overall Compliance risk (both inherent risks and control effectiveness) associated with a particular business area
Recap of Class 2
The Five Elements of an Effective Compliance Program
Tone at the Top
Enron Chronology: July 1985 Enron established through merger and by November 2006 entire senior management team has either been indicted or convicted with Enron and Arthur Andersen no longer operating
Corporate Culture and Communication
Codes of Conduct set the values for employees to follow and those values are based on Compliance Risk.
3. Compliance Risk Assessment
4. Testing and Monitoring
5. Chief Compliance Officer
Case Study: HSBC
Financing drug cartels
Permitting sanctioned regimes to process dollar payments
Claw back of compensation (including Compliance Officers)
Criminal charges for “failure to maintain an effective AML program”
Recap of Class 3
Compliance Tools/Controls
Advisory Function
Coverage of Front Office and Technology, Finance and Operations
Conflicts of Interest -- A Deep Dive
Conflicts of interest are inherent in the financial services business
Historical success of the industry has been managing these conflicts by eliminating or disclosing them
Top to bottom review of business operations to address conflicts of interest of every kind
Risk Assessments
Follow-Up
Policies and Procedures
Education and Training
Compliance Surveillance and Business Unit Review and Testing
‹#›
Recap of Class 4
A Compliance Risk Assessment is a framework to enable the evaluation and analysis of the overall Compliance risk (both inherent risks and control effectiveness) associated with a particular business area
1. Identifying Business Area(s) and Metrics
2. Mapping Applicable Rules
3. Identifying Key Compliance Risks and Themes
4. Defining a Controls Inventory
5. Rating Control Effectiveness
6. Determining Residual Risks
7. Scoring, Rating and Reporting
It’s All About the Questionnaire . . .
Compliance Risk Assessment Steps
Identify Business Area and Metrics
Map Applicable Rules
Identify Key Compliance Risks & Themes
Define Controls Inventory
Rate Controls Effectiveness
Determine Residual Risk
Score, Rate and Report
Phase 2 of the Course
Assi ...
Compliance Risk Assessment Fall 2016 Class 11 Stephen Paine.docxaryan532920
Compliance Risk Assessment
Fall 2016 Class 11
Stephen Paine
Compliance Risk Assessment:
Case Studies and Third Party Risk
Announcements
Tuesday, November 22 is our last class and it will be a Laboratory Class in which you will participate in mock interviews. Consider it a Moot CRA. More details next week.
You have turned in four assignments that have been graded; although your second graded assignment does not have to count. That grade was still recorded and I will drop your lowest of the four grades to calculate your total written assignment component (25%) of your overall grade for the course.
Course evaluations are starting and you are STRONGLY urged, encouraged and begged to complete your evaluation of this course.
http://law.fordham.edu/evaluate
Recap of Class 1
Pfizer Case Study and Compliance Risks
Legal and Regulatory Incentives/Conflicts of Interest
Political Failure of Controls
Reputational Recidivism
Point of Sale/Distribution
Definitions
Compliance Risk is the risk of failing to comply with applicable legal or regulatory requirements resulting in a material loss (financial or reputational) or legal/regulatory sanction
A Compliance Risk Assessment is a framework to enable the evaluation and analysis of the overall Compliance risk (both inherent risks and control effectiveness) associated with a particular business area
Recap of Class 2
The Five Elements of an Effective Compliance Program
Tone at the Top
Enron Chronology: July 1985 Enron established through merger and by November 2006 entire senior management team has either been indicted or convicted with Enron and Arthur Andersen no longer operating
Corporate Culture and Communication
Codes of Conduct set the values for employees to follow and those values are based on Compliance Risk.
3. Compliance Risk Assessment
4. Testing and Monitoring
5. Chief Compliance Officer
Case Study: HSBC
Financing drug cartels
Permitting sanctioned regimes to process dollar payments
Claw back of compensation (including Compliance Officers)
Criminal charges for “failure to maintain an effective AML program”
Recap of Class 3
Compliance Tools/Controls
Advisory Function
Coverage of Front Office and Technology, Finance and Operations
Conflicts of Interest -- A Deep Dive
Conflicts of interest are inherent in the financial services business
Historical success of the industry has been managing these conflicts by eliminating or disclosing them
Top to bottom review of business operations to address conflicts of interest of every kind
Risk Assessments
Follow-Up
Policies and Procedures
Education and Training
Compliance Surveillance and Business Unit Review and Testing
‹#›
Recap of Class 4
A Compliance Risk Assessment is a framework to enable the evaluation and analysis of the overall Compliance risk (both inherent risks and control effect ...
Compliance Risk Assessment Fall 2016 Class 7 Stephen Paine .docxaryan532920
Compliance Risk Assessment
Fall 2016 Class 7
Stephen Paine
Jay Holtmeier, Guest Lecturer
Compliance Risk by Area:
Anti-Corruption and Insider Trading
Recap of Class 1
Pfizer Case Study and Compliance Risks
Legal and Regulatory Incentives/Conflicts of Interest
Political Failure of Controls
Reputational Recidivism
Point of Sale/Distribution
Definitions
Compliance Risk is the risk of failing to comply with applicable legal or regulatory requirements resulting in a material loss (financial or reputational) or legal/regulatory sanction
A Compliance Risk Assessment is a framework to enable the evaluation and analysis of the overall Compliance risk (both inherent risks and control effectiveness) associated with a particular business area
Recap of Class 2
The Five Elements of an Effective Compliance Program
Tone at the Top
Enron Chronology: July 1985 Enron established through merger and by November 2006 entire senior management team has either been indicted or convicted with Enron and Arthur Andersen no longer operating
Corporate Culture and Communication
Codes of Conduct set the values for employees to follow and those values are based on Compliance Risk.
3. Compliance Risk Assessment
4. Testing and Monitoring
5. Chief Compliance Officer
Case Study: HSBC
Financing drug cartels
Permitting sanctioned regimes to process dollar payments
Claw back of compensation (including Compliance Officers)
Criminal charges for “failure to maintain an effective AML program”
Recap of Class 3
Compliance Tools/Controls
Advisory Function
Coverage of Front Office and Technology, Finance and Operations
Conflicts of Interest -- A Deep Dive
Conflicts of interest are inherent in the financial services business
Historical success of the industry has been managing these conflicts by eliminating or disclosing them
Top to bottom review of business operations to address conflicts of interest of every kind
Risk Assessments
Follow-Up
Policies and Procedures
Education and Training
Compliance Surveillance and Business Unit Review and Testing
‹#›
Recap of Class 4
A Compliance Risk Assessment is a framework to enable the evaluation and analysis of the overall Compliance risk (both inherent risks and control effectiveness) associated with a particular business area
1. Identifying Business Area(s) and Metrics
2. Mapping Applicable Rules
3. Identifying Key Compliance Risks and Themes
4. Defining a Controls Inventory
5. Rating Control Effectiveness
6. Determining Residual Risks
7. Scoring, Rating and Reporting
It’s All About the Questionnaire . . .
Compliance Risk Assessment Steps
Identify Business Area and Metrics
Map Applicable Rules
Identify Key Compliance Risks & Themes
Define Controls Inventory
Rate Controls Effectiveness
Determine Residual Risk
Score, Rate and Report
Phase 2 of the Course
Assignments
Listen c ...
Customer Due Diligence: Improving Screening Processes for OFAC Entities and O...SHAUN HASSETT
Update on current OFAC Screening Requirements and How to Improve the Screening Processes as part of your overall Customer Due Diligence Program.
For more information about this topic, please contact SHAUN HASSETT at due_diligence@att.net
Compliance Risk Assessment Fall 2016 Class 4 Stephen Paine.docxaryan532920
Compliance Risk Assessment
Fall 2016 Class 4
Stephen Paine
Compliance Risk Assessment
Overview
Recap of Class 1
Pfizer Case Study and Compliance Risks
Legal and Regulatory Incentives/Conflicts of Interest
Political Failure of Controls
Reputational Recidivism
Point of Sale/Distribution
Definitions
Compliance Risk is the risk of failing to comply with applicable legal or regulatory requirements resulting in a material loss (financial or reputational) or legal/regulatory sanction
A Compliance Risk Assessment is a framework to enable the evaluation and analysis of the overall Compliance risk (both inherent risks and control effectiveness) associated with a particular business area
Recap of Class 2
The Five Elements of an Effective Compliance Program
Tone at the Top
Enron Chronology: July 1985 Enron established through merger and by November 2006 entire senior management team has either been indicted or convicted with Enron and Arthur Andersen no longer operating
Corporate Culture and Communication
Codes of Conduct set the values for employees to follow and those values are based on Compliance Risk.
3. Compliance Risk Assessment
4. Testing and Monitoring
5. Chief Compliance Officer
Case Study: HSBC
Financing drug cartels
Permitting sanctioned regimes to process dollar payments
Claw back of compensation (including Compliance Officers)
Criminal charges for “failure to maintain an effective AML program”
Recap of Class 3
Compliance Tools/Controls
Advisory Function
Coverage of Front Office and Technology, Finance and Operations
Conflicts of Interest -- A Deep Dive
Conflicts of interest are inherent in the financial services business
Historical success of the industry has been managing these conflicts by eliminating or disclosing them
Top to bottom review of business operations to address conflicts of interest of every kind
Risk Assessments
Follow-Up
Policies and Procedures
Education and Training
Compliance Surveillance and Business Unit Review and Testing
‹#›
In the News This Week
The Wells Fargo Cross-Selling Matter
Consent Order
Unauthorized Deposit Accounts and Simulated Funding
Unauthorized Credit Cards
Unauthorized Enrollments into Online Banking
Unauthorized Debit Cards
Independent Consultant’s Remit
Pay Redress Costs to Customers
$185 Million in Civil Penalties and Fines
Compliance Monitoring (page 23)
John Stumpf, Wells Fargo CEO, Appears before Senate Committee on Banking
http://www.cnn.com/videos/cnnmoney/2016/09/21/elizabeth-warren-wells-fargo-ceo-cnnmoney.cnn
‹#›
Our Journey So Far
Class 1
Class 2
Class 3
Tonight . . . finally
Compliance Risk
Compliance Program
Compliance Controls
Compliance Risk Assessment
Compliance Risk Assessment
A Compliance Risk Assessment is a framework to enable the evaluation and analysis of the overall Compliance risk (both inherent ri ...
Foreign Corrupt Practices Act in China - Compliance Strategies Given China\'s Unique Cultural and Governmental Intricacies: Best practices for mitigating risk
Compliance Risk Assessment Fall 2016 Class 11 Stephen Paine.docxaryan532920
Compliance Risk Assessment
Fall 2016 Class 11
Stephen Paine
Compliance Risk Assessment:
Case Studies and Third Party Risk
Announcements
Tuesday, November 22 is our last class and it will be a Laboratory Class in which you will participate in mock interviews. Consider it a Moot CRA. More details next week.
You have turned in four assignments that have been graded; although your second graded assignment does not have to count. That grade was still recorded and I will drop your lowest of the four grades to calculate your total written assignment component (25%) of your overall grade for the course.
Course evaluations are starting and you are STRONGLY urged, encouraged and begged to complete your evaluation of this course.
http://law.fordham.edu/evaluate
Recap of Class 1
Pfizer Case Study and Compliance Risks
Legal and Regulatory Incentives/Conflicts of Interest
Political Failure of Controls
Reputational Recidivism
Point of Sale/Distribution
Definitions
Compliance Risk is the risk of failing to comply with applicable legal or regulatory requirements resulting in a material loss (financial or reputational) or legal/regulatory sanction
A Compliance Risk Assessment is a framework to enable the evaluation and analysis of the overall Compliance risk (both inherent risks and control effectiveness) associated with a particular business area
Recap of Class 2
The Five Elements of an Effective Compliance Program
Tone at the Top
Enron Chronology: July 1985 Enron established through merger and by November 2006 entire senior management team has either been indicted or convicted with Enron and Arthur Andersen no longer operating
Corporate Culture and Communication
Codes of Conduct set the values for employees to follow and those values are based on Compliance Risk.
3. Compliance Risk Assessment
4. Testing and Monitoring
5. Chief Compliance Officer
Case Study: HSBC
Financing drug cartels
Permitting sanctioned regimes to process dollar payments
Claw back of compensation (including Compliance Officers)
Criminal charges for “failure to maintain an effective AML program”
Recap of Class 3
Compliance Tools/Controls
Advisory Function
Coverage of Front Office and Technology, Finance and Operations
Conflicts of Interest -- A Deep Dive
Conflicts of interest are inherent in the financial services business
Historical success of the industry has been managing these conflicts by eliminating or disclosing them
Top to bottom review of business operations to address conflicts of interest of every kind
Risk Assessments
Follow-Up
Policies and Procedures
Education and Training
Compliance Surveillance and Business Unit Review and Testing
‹#›
Recap of Class 4
A Compliance Risk Assessment is a framework to enable the evaluation and analysis of the overall Compliance risk (both inherent risks and control effect ...
Compliance Risk Assessment Fall 2016 Class 7 Stephen Paine .docxaryan532920
Compliance Risk Assessment
Fall 2016 Class 7
Stephen Paine
Jay Holtmeier, Guest Lecturer
Compliance Risk by Area:
Anti-Corruption and Insider Trading
Recap of Class 1
Pfizer Case Study and Compliance Risks
Legal and Regulatory Incentives/Conflicts of Interest
Political Failure of Controls
Reputational Recidivism
Point of Sale/Distribution
Definitions
Compliance Risk is the risk of failing to comply with applicable legal or regulatory requirements resulting in a material loss (financial or reputational) or legal/regulatory sanction
A Compliance Risk Assessment is a framework to enable the evaluation and analysis of the overall Compliance risk (both inherent risks and control effectiveness) associated with a particular business area
Recap of Class 2
The Five Elements of an Effective Compliance Program
Tone at the Top
Enron Chronology: July 1985 Enron established through merger and by November 2006 entire senior management team has either been indicted or convicted with Enron and Arthur Andersen no longer operating
Corporate Culture and Communication
Codes of Conduct set the values for employees to follow and those values are based on Compliance Risk.
3. Compliance Risk Assessment
4. Testing and Monitoring
5. Chief Compliance Officer
Case Study: HSBC
Financing drug cartels
Permitting sanctioned regimes to process dollar payments
Claw back of compensation (including Compliance Officers)
Criminal charges for “failure to maintain an effective AML program”
Recap of Class 3
Compliance Tools/Controls
Advisory Function
Coverage of Front Office and Technology, Finance and Operations
Conflicts of Interest -- A Deep Dive
Conflicts of interest are inherent in the financial services business
Historical success of the industry has been managing these conflicts by eliminating or disclosing them
Top to bottom review of business operations to address conflicts of interest of every kind
Risk Assessments
Follow-Up
Policies and Procedures
Education and Training
Compliance Surveillance and Business Unit Review and Testing
‹#›
Recap of Class 4
A Compliance Risk Assessment is a framework to enable the evaluation and analysis of the overall Compliance risk (both inherent risks and control effectiveness) associated with a particular business area
1. Identifying Business Area(s) and Metrics
2. Mapping Applicable Rules
3. Identifying Key Compliance Risks and Themes
4. Defining a Controls Inventory
5. Rating Control Effectiveness
6. Determining Residual Risks
7. Scoring, Rating and Reporting
It’s All About the Questionnaire . . .
Compliance Risk Assessment Steps
Identify Business Area and Metrics
Map Applicable Rules
Identify Key Compliance Risks & Themes
Define Controls Inventory
Rate Controls Effectiveness
Determine Residual Risk
Score, Rate and Report
Phase 2 of the Course
Assignments
Listen c ...
Customer Due Diligence: Improving Screening Processes for OFAC Entities and O...SHAUN HASSETT
Update on current OFAC Screening Requirements and How to Improve the Screening Processes as part of your overall Customer Due Diligence Program.
For more information about this topic, please contact SHAUN HASSETT at due_diligence@att.net
Compliance Risk Assessment Fall 2016 Class 4 Stephen Paine.docxaryan532920
Compliance Risk Assessment
Fall 2016 Class 4
Stephen Paine
Compliance Risk Assessment
Overview
Recap of Class 1
Pfizer Case Study and Compliance Risks
Legal and Regulatory Incentives/Conflicts of Interest
Political Failure of Controls
Reputational Recidivism
Point of Sale/Distribution
Definitions
Compliance Risk is the risk of failing to comply with applicable legal or regulatory requirements resulting in a material loss (financial or reputational) or legal/regulatory sanction
A Compliance Risk Assessment is a framework to enable the evaluation and analysis of the overall Compliance risk (both inherent risks and control effectiveness) associated with a particular business area
Recap of Class 2
The Five Elements of an Effective Compliance Program
Tone at the Top
Enron Chronology: July 1985 Enron established through merger and by November 2006 entire senior management team has either been indicted or convicted with Enron and Arthur Andersen no longer operating
Corporate Culture and Communication
Codes of Conduct set the values for employees to follow and those values are based on Compliance Risk.
3. Compliance Risk Assessment
4. Testing and Monitoring
5. Chief Compliance Officer
Case Study: HSBC
Financing drug cartels
Permitting sanctioned regimes to process dollar payments
Claw back of compensation (including Compliance Officers)
Criminal charges for “failure to maintain an effective AML program”
Recap of Class 3
Compliance Tools/Controls
Advisory Function
Coverage of Front Office and Technology, Finance and Operations
Conflicts of Interest -- A Deep Dive
Conflicts of interest are inherent in the financial services business
Historical success of the industry has been managing these conflicts by eliminating or disclosing them
Top to bottom review of business operations to address conflicts of interest of every kind
Risk Assessments
Follow-Up
Policies and Procedures
Education and Training
Compliance Surveillance and Business Unit Review and Testing
‹#›
In the News This Week
The Wells Fargo Cross-Selling Matter
Consent Order
Unauthorized Deposit Accounts and Simulated Funding
Unauthorized Credit Cards
Unauthorized Enrollments into Online Banking
Unauthorized Debit Cards
Independent Consultant’s Remit
Pay Redress Costs to Customers
$185 Million in Civil Penalties and Fines
Compliance Monitoring (page 23)
John Stumpf, Wells Fargo CEO, Appears before Senate Committee on Banking
http://www.cnn.com/videos/cnnmoney/2016/09/21/elizabeth-warren-wells-fargo-ceo-cnnmoney.cnn
‹#›
Our Journey So Far
Class 1
Class 2
Class 3
Tonight . . . finally
Compliance Risk
Compliance Program
Compliance Controls
Compliance Risk Assessment
Compliance Risk Assessment
A Compliance Risk Assessment is a framework to enable the evaluation and analysis of the overall Compliance risk (both inherent ri ...
Foreign Corrupt Practices Act in China - Compliance Strategies Given China\'s Unique Cultural and Governmental Intricacies: Best practices for mitigating risk
E-book: How to manage Anti-Money Laundering and Counter Financing of Terroris...Jitske de Bruijne
Financial Institutions continue to face heightened fines and regulatory scrutiny over their AML/CFT Programs. This e-book helps you to manage AML/CFT Programs.
Don’t let the title fool you. Establishing a comprehensive AML Program may involve “Five Steps” – but the steps are giant. We’ll break them down, but each area is time-consuming and takes a focused mindset.
We don’t suggest holding someone new to the AML profession solely responsible for implementing an AML Programme. Senior Management needs to understand that there are significant financial and reputational risk exposures if you have an underdeveloped AML Programme. Seek the input of an experienced advisor rather than trying to build a programme alone if you don’t have the experience.
Join us for the 5th Middle East Summit on Anti-Corruption and take part in the region’s only event that addresses your company’s local bribery risks and provides a detailed look at the anti-bribery landscape in countries including the UAE, Saudi Arabia, Egypt, Qatar, Iraq and other jurisdictions crucial to your operations in the Middle East.
Warning how background checks can get your staffing agency in big troubleMike McCarty
The highly unregulated background screening industry has peddled extremely low quality background checks by relying on incomplete databases, limiting the scope of the search to 7 years or not including alias names. Now, there is a fast growing movement to restrict the use of criminal background checks. It is critical that staffing companies understand how to conduct legally compliant criminal background checks that align with:
• Ban the Box
• EEOC 2012-2016 Strategic Plan
• Fair Credit Reporting Act
• Social Media Background Checks
The GFC has affected the risk environment for organisations in many ways, one of which is the risk for internal and external fraud. Understanding the changes, and some of the specific areas of risk, and taking action is important to maintain effective corruption prevention
This webinar will provide a quick update on health care data privacy and security matters, including recent breaches, government enforcement actions and the rise in state law claims. We will also address the need for cyber liability insurance and provide key points in selecting the right policy or evaluating your existing policy.
On the agenda:
Basis of a Breach
Recent Settlements/Enforcement Areas
State Actions on the Rise
Need for Cyber Liability Insurance
According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docxaryan532920
According to the NASW Code of Ethics section 6.04 (NASW, 2008), social workers are ethically bound to work for policies that support the healthy development of individuals, guarantee equal access to services, and promote social and economic justice.
For this Discussion
, review this week’s resources, including
Working with Survivors of Sexual Abuse and Trauma: The Case of Rita
and “The Johnson Family”. Consider what change you might make to the policies that affect the client in the case you chose. Finally, think about how you might evaluate the success of the policy changes.
By Day 3
Post
an explanation of one change you might make to the policies that affect the client in the case. Be sure to reference the case you selected in your post. Finally, explain how you might evaluate the success of the policy changes.
Working With Survivors of Sexual Abuse and Trauma: The Case of Rita
Rita is a 22-year-old, heterosexual, Latina female working in the hospitality industry at a resort. She is the youngest of five children and lives at home with her parents. Rita has dated in the past but never developed a serious relationship. She is close to her immediate and extended family as well as to her female friends in the Latino community. Although her parents and three of her siblings were born in the Dominican Republic, Rita was born in the United States.
A year ago, Rita was sexually assaulted by an acquaintance of a male coworker. Rita and a female coworker met Juan and Bob after work at a local bar for a light meal and a few drinks. Because Rita had to get up early to work her shift the next day, Bob offered to drive her home. Instead of taking Rita directly home, however, he drove to a desolate spot nearby and assaulted her. Afterward, Bob threatened to harm her family if she did not remain silent and proceeded to drive her home. Although Rita did not tell her family what happened, she did call our agency hotline the next day to discuss her options. Because Rita’s assault occurred within the 5-day window for forensic evidence collection of this kind, Rita consented to activation of the county’s sexual assault response team (SART). Although she agreed to have an advocate and the sexual assault nurse examiner (SANE) meet her at the hospital, Rita tearfully stated that she did not want to file a police report at that time because she did not want to upset her family. The nurse examiner interviewed Rita, collected evidence, recorded any injuries, administered antibiotics for possible sexually transmitted infections, and gave Rita emergency contraception in case of pregnancy. The advocate stayed with Rita during the procedure, supporting her and validating her experience, and gave her a referral for individual crisis counseling at our agency.
My treatment goals for Rita included alleviation of rape trauma syndrome symptoms that included shame and self-blame, validation of self-worth and empowerment, and processing how it would feel to discl.
According to the text, crime has been part of the human condition si.docxaryan532920
According to the text, crime has been part of the human condition since people began to live in groups. Ancient documents indicate that conduct we now call murder, theft, or robbery was identified as criminal by civilizations that existed thousands of years ago. Criminal laws regulate human conduct and tell people what they can and cannot do and, in some instances, what they must do under certain circumstances. In this assignment, you will explore different types of criminal conduct and the goals of criminal law.
Write a four to six (4-6) page paper in which you:
Determine whether or not the Ex Post Facto Clause can be used as a defense to prohibit the increase in federal minimum/mandatory sentencing guidelines after a federal defendant has committed the crime. Provide a rationale to support your position.
Explain the distinction between criminal, tort, and moral wrongs. Next, support or criticize the premise that the standards set by moral laws are higher than those set by criminal law.
Identify and discuss the differences between solicitation of another to commit a crime and a conspiracy to commit a crime. Next, support or criticize the use of the unilateral approach to conspiracy convictions.
Identify the four (4) goals of criminal law, and discuss the manner in which these four goals effectuate the purpose of protecting the public and preventing the conviction of innocent persons.
Use at least three (3) quality academic resources in this assignment.
Note:
Wikipedia and similar types of websites do not qualify as academic resources.
Your assignment must follow these formatting requirements:
This course requires use of new
Strayer Writing Standards (SWS
). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
Describe the nature and history of American criminal law.
Explain the role of individuals and federal, state, and local government agencies in crime fighting and prosecution of criminal offenses.
Analyze the essential legal elements of criminal conduct.
Use technology and information resources to research issues in criminal law.
Write clearly and concisely about criminal law using proper writing mechanics.
.
More Related Content
Similar to Compliance Risk Assessment Fall 2016 Class 8 Stephen Paine .docx
E-book: How to manage Anti-Money Laundering and Counter Financing of Terroris...Jitske de Bruijne
Financial Institutions continue to face heightened fines and regulatory scrutiny over their AML/CFT Programs. This e-book helps you to manage AML/CFT Programs.
Don’t let the title fool you. Establishing a comprehensive AML Program may involve “Five Steps” – but the steps are giant. We’ll break them down, but each area is time-consuming and takes a focused mindset.
We don’t suggest holding someone new to the AML profession solely responsible for implementing an AML Programme. Senior Management needs to understand that there are significant financial and reputational risk exposures if you have an underdeveloped AML Programme. Seek the input of an experienced advisor rather than trying to build a programme alone if you don’t have the experience.
Join us for the 5th Middle East Summit on Anti-Corruption and take part in the region’s only event that addresses your company’s local bribery risks and provides a detailed look at the anti-bribery landscape in countries including the UAE, Saudi Arabia, Egypt, Qatar, Iraq and other jurisdictions crucial to your operations in the Middle East.
Warning how background checks can get your staffing agency in big troubleMike McCarty
The highly unregulated background screening industry has peddled extremely low quality background checks by relying on incomplete databases, limiting the scope of the search to 7 years or not including alias names. Now, there is a fast growing movement to restrict the use of criminal background checks. It is critical that staffing companies understand how to conduct legally compliant criminal background checks that align with:
• Ban the Box
• EEOC 2012-2016 Strategic Plan
• Fair Credit Reporting Act
• Social Media Background Checks
The GFC has affected the risk environment for organisations in many ways, one of which is the risk for internal and external fraud. Understanding the changes, and some of the specific areas of risk, and taking action is important to maintain effective corruption prevention
This webinar will provide a quick update on health care data privacy and security matters, including recent breaches, government enforcement actions and the rise in state law claims. We will also address the need for cyber liability insurance and provide key points in selecting the right policy or evaluating your existing policy.
On the agenda:
Basis of a Breach
Recent Settlements/Enforcement Areas
State Actions on the Rise
Need for Cyber Liability Insurance
According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docxaryan532920
According to the NASW Code of Ethics section 6.04 (NASW, 2008), social workers are ethically bound to work for policies that support the healthy development of individuals, guarantee equal access to services, and promote social and economic justice.
For this Discussion
, review this week’s resources, including
Working with Survivors of Sexual Abuse and Trauma: The Case of Rita
and “The Johnson Family”. Consider what change you might make to the policies that affect the client in the case you chose. Finally, think about how you might evaluate the success of the policy changes.
By Day 3
Post
an explanation of one change you might make to the policies that affect the client in the case. Be sure to reference the case you selected in your post. Finally, explain how you might evaluate the success of the policy changes.
Working With Survivors of Sexual Abuse and Trauma: The Case of Rita
Rita is a 22-year-old, heterosexual, Latina female working in the hospitality industry at a resort. She is the youngest of five children and lives at home with her parents. Rita has dated in the past but never developed a serious relationship. She is close to her immediate and extended family as well as to her female friends in the Latino community. Although her parents and three of her siblings were born in the Dominican Republic, Rita was born in the United States.
A year ago, Rita was sexually assaulted by an acquaintance of a male coworker. Rita and a female coworker met Juan and Bob after work at a local bar for a light meal and a few drinks. Because Rita had to get up early to work her shift the next day, Bob offered to drive her home. Instead of taking Rita directly home, however, he drove to a desolate spot nearby and assaulted her. Afterward, Bob threatened to harm her family if she did not remain silent and proceeded to drive her home. Although Rita did not tell her family what happened, she did call our agency hotline the next day to discuss her options. Because Rita’s assault occurred within the 5-day window for forensic evidence collection of this kind, Rita consented to activation of the county’s sexual assault response team (SART). Although she agreed to have an advocate and the sexual assault nurse examiner (SANE) meet her at the hospital, Rita tearfully stated that she did not want to file a police report at that time because she did not want to upset her family. The nurse examiner interviewed Rita, collected evidence, recorded any injuries, administered antibiotics for possible sexually transmitted infections, and gave Rita emergency contraception in case of pregnancy. The advocate stayed with Rita during the procedure, supporting her and validating her experience, and gave her a referral for individual crisis counseling at our agency.
My treatment goals for Rita included alleviation of rape trauma syndrome symptoms that included shame and self-blame, validation of self-worth and empowerment, and processing how it would feel to discl.
According to the text, crime has been part of the human condition si.docxaryan532920
According to the text, crime has been part of the human condition since people began to live in groups. Ancient documents indicate that conduct we now call murder, theft, or robbery was identified as criminal by civilizations that existed thousands of years ago. Criminal laws regulate human conduct and tell people what they can and cannot do and, in some instances, what they must do under certain circumstances. In this assignment, you will explore different types of criminal conduct and the goals of criminal law.
Write a four to six (4-6) page paper in which you:
Determine whether or not the Ex Post Facto Clause can be used as a defense to prohibit the increase in federal minimum/mandatory sentencing guidelines after a federal defendant has committed the crime. Provide a rationale to support your position.
Explain the distinction between criminal, tort, and moral wrongs. Next, support or criticize the premise that the standards set by moral laws are higher than those set by criminal law.
Identify and discuss the differences between solicitation of another to commit a crime and a conspiracy to commit a crime. Next, support or criticize the use of the unilateral approach to conspiracy convictions.
Identify the four (4) goals of criminal law, and discuss the manner in which these four goals effectuate the purpose of protecting the public and preventing the conviction of innocent persons.
Use at least three (3) quality academic resources in this assignment.
Note:
Wikipedia and similar types of websites do not qualify as academic resources.
Your assignment must follow these formatting requirements:
This course requires use of new
Strayer Writing Standards (SWS
). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
Describe the nature and history of American criminal law.
Explain the role of individuals and federal, state, and local government agencies in crime fighting and prosecution of criminal offenses.
Analyze the essential legal elements of criminal conduct.
Use technology and information resources to research issues in criminal law.
Write clearly and concisely about criminal law using proper writing mechanics.
.
According to Ronald Story and Bruce Laurie, The dozen years between.docxaryan532920
According to Ronald Story and Bruce Laurie, “The dozen years between 1968 and 1980 marked more than the beginning of Republican ascendency; they also saw the breakup of the New Deal coalition and the advent of conservative domination of American politics.” (CP 139).
In this essay, you should explain,
first
, how it is that conservatives came to dominate American politics by the 1980s and,
second
,
how the ideas and policies they embraced shaped American society into the twenty first century.
Rules:
1. 3-4 pages
2. Double spaced, 12-point font
3. Standard margins—Approximately 1.25 on left and right margins and 1 on top and bottom
4. In crafting your essay, you will want to construct a clear thesis and draw on evidence from the sources described below.
5.
Only
use these sources below.
Sources:
Context: The Close of the 1960s
1. The black cat tavern and the LGBT Movement
Link:
https://www.npr.org/2017/02/13/514935126/stonewall-riots-grab-the-spotlight-from-black-cat-protests
2. ESPN Sport center on Katherine Switzwer
Link:
https://www.youtube.com/watch?v=U6CoScOIK_I
3. Crisis in the Cities and 1968.pdf (attachment)
4. Excerpt from MLK’s final Speech in 1968
Link:
https://www.youtube.com/watch?v=Oehry1JC9Rk
5. Vietnam-The path to war.pdf (attachment)
The Rediscovery of the Market: Conservative Politics and Policies
6. Alfred Kahn’s Legacy: Cheap Flights
Link:
https://www.npr.org/2010/12/29/132422495/alfred-kahns-legacy-cheap-flights
7. A Second Gilded Age?.pdf (attachment)
.
According to Kirk (2016), most of your time will be spent work with .docxaryan532920
According to Kirk (2016), most of your time will be spent work with your data. The four following group actions were mentioned by Kirk (2016):
Data acquisition: Gathering the raw material
Data examination: Identifying physical properties and meaning
Data transformation: Enhancing your data through modification and consolidation
Data exploration: Using exploratory analysis and research techniques to learn
Select 1 data action and elaborate on the actions performed in that action group.
Reference: Kirk, A. (2016). Data Visualisation: A Handbook for Data Driven Design (p. 50). SAGE Publications.
.
According to the Council on Social Work Education, Competency 5 Eng.docxaryan532920
According to the Council on Social Work Education, Competency 5: Engage in Policy Practice:
Social workers understand that human rights and social justice, as well as social welfare and services, are mediated by policy and its implementation at the federal, state, and local levels. Social workers understand the history and current structures of social policies and services, the role of policy in service delivery, and the role of practice in policy development. Social workers understand their role in policy development and implementation within their practice settings at the micro, mezzo, and macro levels and they actively engage in policy practice to effect change within those settings. Social workers recognize and understand the historical, social, cultural, economic, organizational, environmental, and global influences that affect social policy. They are also knowledgeable about policy formulation, analysis, implementation, and evaluation.
Walden’s MSW program expects students in their specialization year to be able to:
Evaluate the implication of policies and policy change in the lives of clients/constituents.
Demonstrate critical thinking skills that can be used to inform policymakers and influence policies that impact clients/constituents and services.
This assignment is intended to help students demonstrate the behavioral components of this competency in their field education.
To prepare
: Working with your field instructor, identify a social problem that is common among the organization (or its clients) and research current policies at that state and federal levels that impact the social problem. Then, from a position of advocacy, identify methods to address the social problem (i.e., how you, as a social worker, and the agency advocate to change the problem). You are expected to specifically address how both you and the agency can effectively engage policy makers to make them aware of the social problem and the impact that the policies have on the agency and clients.
The Assignment (2-3 pages): Social Problems is Ex-cons finding Jobs Opportunities in State of California. The Agency is Called "Manifest" the website is Manifest.org
Identify the social problem
Explain rational for selecting social problem
Describe state and federal policies that impact the social problem
Identify specific methods to address the social problems
Explain how the agency and student can advocate to change the social problem
You are expected to present and discuss this assignment with your agency Field Instructor. Your field instructor will be evaluating your ability to demonstrate this competency in their field evaluation. In addition, you will submit this assignment for classroom credit. The Field Liaison will grade the assignment “PASS/FAIL,” see rubric for passing criteria.
.
According to Kirk (2016), most of our time will be spent working.docxaryan532920
According to Kirk (2016), most of our time will be spent working with our data. The four following group actions were mentioned by Kirk (2016):
Book: Kirk, A. (2016). Data visualisation a handbook for data driven design. Los Angeles, CA: Sage.
Data acquisition: Gathering the raw material
Data examination: Identifying physical properties and meaning
Data transformation: Enhancing your data through modification and consolidation
Data exploration: Using exploratory analysis and research techniques to learn
Select 1 data action and elaborate on the actions preformed in that action group.
.
According to Kirk (2016), most of your time will be spent working wi.docxaryan532920
According to Kirk (2016), most of your time will be spent working with your data. The four following group actions were mentioned by Kirk (2016):
Data acquisition: Gathering the raw material
Data examination: Identifying physical properties and meaning
Data transformation: Enhancing your data through modification and consolidation
Data exploration: Using exploratory analysis and research techniques to learn
Select 1 data action and elaborate on the actions preformed in that action group.
.
According to Davenport (2014) the organizational value of healthcare.docxaryan532920
According to Davenport (2014) the organizational value of healthcare analytics, both determination and importance, provide a potential increase in annual revenue and ROI based on the value and use of analytics. To complete this assignment, research and evaluate the challenges faced in the implementation of healthcare analytics in the Health Care Organization (HCO) or health care industry using the following tools:
The paper must also address the following:
Application of PICO (problem, intervention, comparison group, and outcomes) to the challenge identified in your research.
The paper:
Must be two to four double-spaced pages in length (not including title and references pages) and formatted according to APA style as outlined in the
Ashford Writing Center. (Links to an external site.)
Must include a separate title page with the following:
Title of paper
Student’s name
Course name and number
Instructor’s name
Date submitted
Must use at least three scholarly sources in addition to the course text.
Must document all sources in APA style as outlined in the Ashford Writing Center.
Must include a separate references page that is formatted according to APA style as outlined in the Ashford Writing Center.
.
According to the authors, privacy and security go hand in hand; .docxaryan532920
According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business. As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations. Taking Cyberattacks proliferation of 2011 into context, security experts at Intel/McAfee discovered huge series of cyberattacks on the networks of 72 organizations globally, including the United Nations, governments and corporations.
Q: From this research revelation in our chapter 11, briefly state and name the countries and organizations identified as the targeted victims?
.
According to Gilbert and Troitzsch (2005), Foundations of Simula.docxaryan532920
According to Gilbert and Troitzsch (2005), Foundations of Simulation Modeling, a simulation model is a computer program that captures the behavior of a real-world system and its input and possible output processes.
Briefly explain what the simulation modeling relies upon?
-500 words at least.
-No Plagiarism.
-APA Format.
.
According to Klein (2016), using ethical absolutism and ethical .docxaryan532920
According to Klein (2016), using ethical absolutism and ethical relativism in ethical decision making can lead to different outcomes. How can moral reasoning about a specific situation differ based on relativism or absolutism? Can you provide an illustration or example of an accounting procedure/situation whose outcome may differ based on absolutism or relativism? Is ethical relativism a more suitable standard within a global IFRS Environment? Why or why not?
at least 250 words
.
According to Franks and Smallwood (2013), information has become.docxaryan532920
According to Franks and Smallwood (2013), information has become the lifeblood of every business organization, and that an increasing volume of information today has increased and exchanged through the use of social networks and Web2.0 tools like blogs, microblogs, and wikis. When looking at social media in the enterprise, there is a notable difference in functionality between e-mail and social media, and has been documented by research – “…that social media differ greatly from e-mail use due to its maturity and stability.” (Franks & Smallwood, 2013).
Provide a page response identifying and clearly stating what the difference are? APA Standard, 2 page response, not including front page and references.
.
According to the Council on Social Work Education, Competency 5.docxaryan532920
According to the Council on Social Work Education, Competency 5: Engage in Policy Practice:
Social workers understand that human rights and social justice, as well as social welfare and services, are mediated by policy and its implementation at the federal, state, and local levels. Social workers understand the history and current structures of social policies and services, the role of policy in service delivery, and the role of practice in policy development. Social workers understand their role in policy development and implementation within their practice settings at the micro, mezzo, and macro levels and they actively engage in policy practice to effect change within those settings. Social workers recognize and understand the historical, social, cultural, economic, organizational, environmental, and global influences that affect social policy. They are also knowledgeable about policy formulation, analysis, implementation, and evaluation. Social workers:
Identify social policy at the local, state, and federal level that impacts well-being, service delivery, and access to social services;
Assess how social welfare and economic policies impact the delivery of and access to social services;
Apply critical thinking to analyze, formulate, and advocate for policies that advance human rights and social, economic, and environmental justice.
This assignment is intended to help students demonstrate the behavioral components of this competency in their field education.
To prepare: Working with your field instructor, identify, evaluate, and discuss policies established by the local, state, and federal government (within the last five years) that affect the day to day operations of the field placement agency.
The Assignment (1-2 pages): (In The States California. The Good Seed is a Drop-In center for 18-25 years!
Describe the policies and their impact on the field agency.
Propose specific recommendations regarding how you, as a social work intern, and the agency can advocate for policies pertaining to advancing social justice for the agency and the clients it serves.
.
According to the authors, privacy and security go hand in hand; and .docxaryan532920
According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business. As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations. Taking Cyberattacks proliferation of 2011 into context, security experts at Intel/McAfee discovered huge series of cyberattacks on the networks of 72 organizations globally, including the United Nations, governments and corporations.
From this research revelation in our chapter 11, briefly state and name the countries and organizations identified as the targeted victims?
Use the APA format to include your references. Each paragraph should have different references and each para should have at least 4 sentences.
.
According to recent surveys, China, India, and the Philippines are t.docxaryan532920
According to recent surveys, China, India, and the Philippines are the three most popular countries for IT outsourcing. Write a short paper (4 paragraphs) explaining what the appeal would be for US companies to outsource IT functions to these countries. You may discuss cost, labor pool, language, or possibly government support as your reasons. There are many other reasons you may choose to highlight in your paper. Be sure to use your own words.
Must be in APA format with references and citations.
.
According to the authors, countries that lag behind the rest of the .docxaryan532920
According to the authors, countries that lag behind the rest of the world’s ICT capabilities encounter difficulties at various levels. Discuss specific areas, both within and outside, eGovernance, in which citizens living in a country that lags behind the rest of the world in ICT capacity are lacking. Include in your discussion quality of life, sustainability, safety, affluence, and any other areas that you find of interest. Use at least 8-10 sentences to discuss this topic.
.
According to Peskin et al. (2013) in our course reader, Studies on .docxaryan532920
According to Peskin et al. (2013) in our course reader, "Studies on early health risk factors, including prenatal nicotine/alcohol exposure, birth complications, and minor physical anomalies have found that these risk factors significantly increase the likelihood of anti-social and criminal behavior throughout life." What policy changes might you suggest to help curtail the occurrence or effects of these risk factors? Remember to think about public health policy, not just criminal policy.
.
According to Franks and Smallwood (2013), information has become the.docxaryan532920
According to Franks and Smallwood (2013), information has become the lifeblood of every business organization, and that an increasing volume of information today has increased and exchanged through the use of social networks and Web2.0 tools like blogs, microblogs, and wikis. When looking at social media in the enterprise, there is a notable difference in functionality between e-mail and social media, and has been documented by research – “…that social media differ greatly from e-mail use due to its maturity and stability.” (Franks & Smallwood, 2013).
Q: Please identify and clearly state what the difference is?
Use the APA format to include your references. Each paragraph should have different references and each para should have at least 4 sentences.
.
According to Ang (2011), how is Social Media management differen.docxaryan532920
According to Ang (2011), how is Social Media management different than traditional Customer Relationship Management (CRM)? Define the four pillars of social media (connectivity, conversations, content creation and collaboration) and analyze how each pillar can be used to aid Social Media management. Identify the benefits Social Media management. Provide examples to illustrate each point.
The paper must be 1-2 pages in length (excluding title and reference page) and in APA (6th edition) format. The paper must include the Ang (2011) article in correct APA format.
.
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docxaryan532920
According to (Alsaidi & Kausar (2018), "It is expected that by 2020, around 25 billion objects will become the part of global IoT network, which will pose new challenges in securing IoT systems. It will become an easy target for hackers as these systems are often deployed in an uncontrolled and hostile environment. The main security challenges in IoT environment are authorization, privacy, authentication, admission control, system conformation, storage, and administration" (p. 213).
Discuss and describe the difference between a black hole attack and a wormhole attack.
.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
Delivering Micro-Credentials in Technical and Vocational Education and TrainingAG2 Design
Explore how micro-credentials are transforming Technical and Vocational Education and Training (TVET) with this comprehensive slide deck. Discover what micro-credentials are, their importance in TVET, the advantages they offer, and the insights from industry experts. Additionally, learn about the top software applications available for creating and managing micro-credentials. This presentation also includes valuable resources and a discussion on the future of these specialised certifications.
For more detailed information on delivering micro-credentials in TVET, visit this https://tvettrainer.com/delivering-micro-credentials-in-tvet/
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Compliance Risk Assessment Fall 2016 Class 8 Stephen Paine .docx
1. Compliance Risk Assessment
Fall 2016 Class 8
Stephen Paine
Diane McEnroe, Guest Lecturer
Compliance Risk by Area:
An Overview of Pharmaceutical Industry Regulation
Recap of Class 1
Pfizer Case Study and Compliance Risks
Legal and Regulatory Incentives/Conflicts of
Interest
Political Failure of Controls
Reputational Recidivism
Point of Sale/Distribution
Definitions
Compliance Risk is the risk of failing to comply with applicable
legal or regulatory requirements resulting in a material loss
(financial or reputational) or legal/regulatory sanction
A Compliance Risk Assessment is a framework to enable the
evaluation and analysis of the overall Compliance risk (both
inherent risks and control effectiveness) associated with a
particular business area
2. Recap of Class 2
The Five Elements of an Effective Compliance Program
Tone at the Top
Enron Chronology: July 1985 Enron established through merger
and by November 2006 entire senior management team has
either been indicted or convicted with Enron and Arthur
Andersen no longer operating
Corporate Culture and Communication
Codes of Conduct set the values for employees to follow and
those values are based on Compliance Risk.
3. Compliance Risk Assessment
4. Testing and Monitoring
5. Chief Compliance Officer
Case Study: HSBC
Financing drug cartels
Permitting sanctioned regimes to process dollar payments
Claw back of compensation (including Compliance Officers)
Criminal charges for “failure to maintain an effective AML
program”
Recap of Class 3
Compliance Tools/Controls
3. Advisory Function
Coverage of Front Office and Technology, Finance and
Operations
Conflicts of Interest -- A Deep Dive
Conflicts of interest are inherent in the financial services
business
Historical success of the industry has been managing these
conflicts by eliminating or disclosing them
Top to bottom review of business operations to address conflicts
of interest of every kind
Risk Assessments
Follow-Up
Policies and Procedures
Education and Training
Compliance Surveillance and Business Unit Review and Testing
‹#›
Recap of Class 4
A Compliance Risk Assessment is a framework to enable the
evaluation and analysis of the overall Compliance risk (both
inherent risks and control effectiveness) associated with a
particular business area
4. 1. Identifying Business Area(s) and Metrics
2. Mapping Applicable Rules
3. Identifying Key Compliance Risks and Themes
4. Defining a Controls Inventory
5. Rating Control Effectiveness
6. Determining Residual Risks
7. Scoring, Rating and Reporting
It’s All About the Questionnaire . . .
Compliance Risk Assessment Steps
Identify Business Area and Metrics
Map Applicable Rules
Identify Key Compliance Risks & Themes
Define Controls Inventory
Rate Controls Effectiveness
Determine Residual Risk
Score, Rate and Report
5. Phase 2 of the Course
Assignments
Listen carefully in class as assignments will be based on
material from the sector presented.
Sector Risk
Listen and assimilate the material/lecture through the lens of the
types of risks each of the areas present, as well as the
corresponding controls – the 3/4 central boxes of the CRA
Diagram
Be a proactive listener and ask questions or provide comments
Make notes of questions that you have or comments to discuss
later
Compliance Risk Assessment Steps
Identify Business Area and Metrics
Map Applicable Rules
Identify Key Compliance Risks & Themes
6. Define Controls Inventory
Rate Controls Effectiveness
Determine Residual Risk
Score, Rate and Report
Recap of Class 5
Financial Services Regulation
Banking Services
Deposit Taking
Lending
Fund Transfers, checking
Securities and Investments
Buying and selling stocks, bonds
Participating in Capital Markets transactions
Investment Advisory Activities
Investment Company Activities
Federal Reserve, OCC, SEC, FINRA and CFTC, plus Exchanges
7. FINRA Regulatory Regime
Supervision
Self-Reporting
Case Study: Prospectus Delivery
‹#›
Recap of Class 6
Anti-Money Laundering and Financial Crime Risk and Controls
Anti-Money Laundering
Rule Mapping: Bank Secrecy Act, USA PATRIOT Act, EU
Directives Proceeds of Crime Act
Elements: Proceeds of crime used in banking system
Inherent Risks of Clients – Client Lifecycle (Onboarding,
Processing Transactions, Refreshing Information)
Geographical Location
Type of Client
Products and Services
Client Identification serves as the primary control: KYC --
Client Due Diligence and Enhanced Due Diligence
Sanctions
Rule Mapping: OFAC, United Nations and EU Directives
Elements: Penalties imposed by one country on one or more
other countries/individuals
Client Screening as a control
Anti-Bribery and Corruption (ABC)
To be covered in Class 7
8. Suspicious Transaction Reporting
Filing a report with the appropriate regulatory authority when
suspicious activity is identified
Strictly prohibited to disclose the filing of the report to parties
involved
‹#›
Recap of Class 7
Anti-Corruption
Rule Mapping
US Foreign Corrupt Practices Act
UK Bribery Statute
Travel Act, Mail/Wire Fraud and Money Laundering
A Closer Look at the FCPA
Anti-Bribery
Books and Records
Internal Controls
FCPA Elements
Offer, Promise or Give
Anything of Value
Directly or Indirectly with “Knowledge”
To a Foreign Government Official
To Influence the Official
To Obtain or Retain Business
Case Studies
Glaxo Smith Kline and Nu Skin
BNY Mellon, Och Ziff and Morgan Stanley
‹#›
9. FCPA Basics – Key Provisions
Cannot offer/give anything of value to foreign official for
purpose of obtaining/retaining improper business advantage
Must keep accurate and reasonably detailed books and records
Must maintain sufficient internal controls designed to prevent,
detect, and address FCPA violations, and enable accurate
financial reporting
Anti-Bribery
Books/Records
Internal Controls
FCPA: Elements of an Anti-Bribery Offense
Offer, Promise, Pay, Authorize, or Give
_______________________
Anything of Value
________________________
Directly or Indirectly with “Knowledge”
________________________
Foreign Government Official
________________________
Influence the Official
________________________
Obtain or Retain Business
10. Offer, Promise, Pay, Authorize, or Give
The mere promise or offer of an improper payment is itself
punishable
An attempt to bribe is punishable (thus no requirement that
bribe actually be paid)
No requirement that offer or payment be successful in achieving
the desired outcome
Serving as an authorizer of a bribe may lead to an FCPA
violation
Anything of Value
“Value” may be monetary or in-kind
No minimum (but must be enough to suggest possible corrupt
motive)
Examples:
Cash, checks, wire transfers, gift certificates, other cash or
monetary equivalents
Commissions or similar fees
Meals, travel, and entertainment expenses
Personal services, theater tickets, jobs
Tangible and intangible gifts and favors (e.g., unpaid internship
for relative of government official)
Political or charitable contributions
Directly or Indirectly with Knowledge
Liability for your own acts
Liability for acts of others if you have “knowledge”
If unlawful to make a payment directly, then unlawful to make
it knowingly through a third person or entity
FCPA does not require proof of “actual knowledge” of third
party’s conduct
“Knowledge” standard is loose – evidence of “willful
blindness,” “deliberate ignorance,” or a “head-in-the-sand”
11. sufficient to convict
Failure to investigate suspicious circumstances – “red flags” –
can amount to “willful blindness”
Foreign Government Official
FCPA does not apply to U.S. federal, state, or local officials
(but other anti-bribery laws do)
Term “foreign official” may include, regardless of rank,
personnel of or agents acting for
National, regional, or local government body – e.g., department,
agency, customs, tax, permitting agency
State-owned or -controlled company (e.g., state-owned airline)
Public international organization (e.g., UN)
Foreign political parties, party officials, and candidates for
office
Royal family members
Sovereign wealth fund employees
Private party engaged to carry out a government function
Influence the Official
FCPA violated if payment or offer made with corrupt intent to
influence official to:
Take any official action
Refrain from acting
Influence others improperly
“Corrupt intent” means motive to achieve quid pro quo in return
for giving something of value
Obtain or Retain Business
FCPA violated if intended result is to obtain new, renew, or
12. maintain existing government business
In addition, enforcement authorities take view that FCPA covers
efforts to obtain essentially any favorable government action,
not just winning business:
Permits/licenses
Taxes
Regulatory decisions
Customs/immigration
FCPA: Internal Controls and Record Keeping
FCPA requires issuers to maintain reasonable internal controls
aimed at preventing and detecting FCPA violations
FCPA requires issuers to “make and keep books, records, and
accounts, which in reasonable detail, accurately and fairly
reflect the transactions and dispositions of the issuer”
The US government will bring charges under the books and
records provisions even when anti-bribery charges may not be
appropriate
There are no state of mind or materiality requirements, making
any problems with internal controls and record keeping
potentially serious
Other U.S. Anti-Corruption Laws: Travel Act, Mail/Wire Fraud,
Money Laundering
Travel ActMail/Wire FraudMoney LaunderingIllegal to travel or
communicate (e.g., use U.S. mail, email, telephone, bank wires)
to violate state commercial bribery laws
Increasingly aggressive DOJ prosecutionsIllegal to defraud via
U.S. mail, email, telephone, bank wires
13. Encompasses theft of honest servicesIllegal to conduct financial
transaction with proceeds of crime
Intent to conceal source, ownership, or control of funds
“Laundering” illegally obtained money to make it look clean
Recap of Class 7
Insider Trading
Definitions
Inside Information is material information that relates to the
securities of an issuer that is not publicly known -- MNPI
What is Material?
Insider Trading is the buying or selling of a security with the
intent to deceive and in breach of a fiduciary obligation or
other relationship of trust while in possess of material non-
public information
Rule Mapping
Section 10(b) of the Securities Exchange Act of 1934 and Rule
10b-5 promulgated thereunder
Prohibits fraud in connection with a purchase or sale of
securities
Rule 14e-3
Prohibits trading when you have MNPI about a tender offer, if
you got that information directly or indirectly from someone
involved in the tender offer
Section 16
Insider liability for short-swing profits (purchase/sale within 6
months)
Regulation FD
Prohibits selective disclosure by companies
Controls
Information Barriers -- Private Side and Public Side
The Control Room
14. Watch and Restricted Lists
Employee Trading
Surveillance
Case Studies
Galleon
Merck
‹#›
What is Inside Information?
23
Relates to the securities of an issuer
Not publicly known
Has not been disseminated in a manner reasonably designed to
provide broad, non-exclusionary distribution of the information
to the public
Material
It has “market significance” (likely to affect the market price of
any outstanding securities of the issuer)
A reasonable investor would consider the information important
in deciding whether to purchase, hold or sell a security
Would be viewed by a reasonable investor as having
significantly altered the total mix of information made available
to holders of securities
Inside information is also known as material, non-public
information (or “MNPI”).
What is Material?
24
There is no statutory definition of materiality – it is determined
according to caselaw, with significant room for judgment.
Courts routinely reject bright-line mathematical tests for
15. materiality
Both quantitative and qualitative factors can be relevant to
materiality (5% rule of thumb)
Information may be material even if it relates to future,
speculative, or contingent events. When events are contingent
or speculative, the test for materiality depends upon a balancing
of both the probability that the event will occur and the
anticipated magnitude of the event in light of the totality of the
company activity (the “probability/magnitude test”).
Examples of Material Information
25
A planned offering of securities
Mergers, acquisitions, purchases or sales of assets, refinancing,
joint ventures
Calls of securities, repurchase plans, stock splits or changes in
dividends
Earnings estimates, changes in previously released earnings or
estimates
Changes in ratings of debt securities
Expansion or curtailment of operations
16. New products or discoveries or developments regarding
customers or suppliers
Changes in control or in management
Writedowns of assets, additions to reserves
Defaults on securities, bankruptcy or receivership
What is Insider Trading?
Buying or selling a security
With intent to deceive
In breach of fiduciary duty or other relationship of trust
While in possession of MNPI about the security
17. Legislative History
No specific prohibition on Insider Trading – prohibitions from
various statutes and caselaw.
Section 10(b) of the Securities Exchange Act of 1934 and Rule
10b-5 promulgated thereunder
Prohibits fraud in connection with a purchase or sale of
securities
Rule 14e-3
Prohibits trading when you have MNPI about a tender offer, if
you got that information directly or indirectly from someone
involved in the tender offer
Section 16
Insider liability for short-swing profits (purchase/sale within 6
months)
Regulation FD
Prohibits selective disclosure by companies
27
Insider Trading: Controls
What is the primary control for handling inside information?
Information Barriers
And how are information barriers managed?
18. The Control Room
Insider Trading
What does the Control Room do?
The Control Room is a central function that monitors the Bank’s
Information Barriers and the flow of inside information
throughout the Bank
The functions of the Control Room related to Information
Barriers include:
30
Development and maintenance of the Bank’s Information
Barrier policies and procedures
Maintenance of the Bank’s Watch and Restricted Lists and
approving Wall Crossings
Monitoring the integrity of the Bank’s Information Barriers
(i.e., surveillance of Firm, Employee and Client trading
activity)
Reviewing Equity and Fixed Income research for companies that
may appear on the Watch List or Restricted List
19. Pre-clearance of private side employee personal account trades
and certain Firm trades
Providing ongoing advice and training on matters related to
inside information and information barriers
Private Side vs. Public Side
31
Above The Wall
Private Side
Investment Banking Department
Public Side
20. Equities and Fixed Income Sales and Trading
Capital Markets
Research
Private Banking
Asset Management
Shared Services functions with no access to Inside Information
Internal Audit
Asset Backed Origination
Structured Lending
Solution
21. s Partners
Private Equity
Shared Services functions with access to Inside Information
Prime Services
Inside Information Barriers
Manage the flow of inside information to prevent its inadvertent
spread and misuse
Restrict the sharing of inside information from employees on
the “private side” of the Bank (e.g., those employees working in
an investment banking or origination capacity) to employees on
the “public side” of the Bank
22. Consist of:
Policies & Procedures
Physical Barriers
Electronic Barriers
Monitoring
Training
32
Watch List
The Watch List is a confidential list of issuers with respect to
which the Firm possesses inside information that has not yet
been publicly disclosed, or for which a transaction has not been
publicly announced
Enables the Control Room to monitor sales, trading and research
activities in a subject company’s securities, and to validate the
integrity of the Firm’s information barriers
Generally does not impact the sales, trading and research
activities of the Firm, except in limited circumstances
The Watch List is not published and can only be accessed by the
Control Room
23. 33
Restricted List
The Restricted List generally reflects pending transactions in
which the Firm is involved that have been publicly announced
and in which we may have, or appear to have, inside
information
The Restricted List also may be used for other regulatory
purposes (e.g., to comply with the trading restrictions imposed
by Reg. M or by the tender rules, Section 16, or if we own a
large position or are an affiliate of the company)
The Restricted List limits certain marketing, research and
trading activity that could constitute misuse of inside
information or otherwise appear to be improper
The Restricted List is available to all employees via an internal
web page as well as via direct feeds to trading systems and
market data screens
34
Wall Crossings
Wall Crossing procedures must be followed when
communicating inside information to public side (i.e. sales,
trading and research) employees
24. All Wall Crossings require:
Prior approval by a designated senior executive;
Prior approval by an appropriate senior business line manager (a
“Conduit”) of the person being brought over the wall; and
Consultation with a member of the Control Room
35
Insider Trading: Surveillance
Overview
Monitor Firm, client and employee trading activity in the firm’s
divisions
Covers all products including equities, debt, derivatives and
bank loans
Types of reports include:
Restricted List
Watch List
Over The Wall
Research Frontrunning
Restricted List Lookbacks
Watch List Lookbacks
25. External Deals
37
Scope of Control Room Monitoring
38
Product Coverage
Equities, equity-related securities and related derivatives
Fixed Income securities and related derivatives
Bank Loans and related derivatives
Investment Banking
Private Banking & Wealth Management
30. Insider Trading Controls: Personal Account Trading
Employee Personal Account Trading
1
Minimum holding periods apply and, where applicable, are
subject to pre-clearance (generally good until end of trading
day).
An Employee account:
Is an account that has brokerage capability in which an
employee has an interest or the power to influence investment
decisions
Includes employee’s spouse, partner and minor children
31. Trading is generally not permitted in securities of issuers on the
Restricted List.
Bank securities may only be traded during approved windows
and with pre-trade approval, where applicable.
Many regulators require banks to monitor the personal trades of
their employees.
In most jurisdictions1, employees are required:
To declare their trading account details to Compliance
To receive pre-trade approval for certain transactions
40
Wells Fargo Update
New facts emerge about the cross-selling scandal from former
32. employees
October 20, 2016 NYT Headline: “Lions Hunting Zebras”
Elderly with memory problems
College students with first account
Small business owners with multiple lines of credit
Employee Pressure and Stress (hand sanitizer and anxiety
attack)
City of San Francisco looking to end its business with Wells
Fargo
Senate Banking Committee has sent a follow-up letter with 58
questions
Justice Department is investigating
Wells Fargo Class Discussion
Do you think a well crafted CRA could have identified cross-
selling as a potential problem?
What would a such a CRA look like?
The Seven Steps . . .
Identify Business Unit and Metrics
33. Rule Mapping
Compliance Risk Themes
Controls Inventory
Effectiveness of Controls
What should peer banks being doing now?
Compliance Risk Assessment Steps
Identify Business Area and Metrics
Map Applicable Rules
Identify Key Compliance Risks & Themes
Define Controls Inventory
Rate Controls Effectiveness
34. Determine Residual Risk
Score, Rate and Report
Assignment 7
Develop a list of topical areas of risk that should be included in
a Compliance Risk Assessment for a pharmaceutical company.
Note the categories of information that you would obtain for
each and which would be quantitative and qualitative.
You did a similar exercise for a financial services company in
Assignment 4.
Based on tonight’s lecture, identify a minimum of four risk
areas for a pharmaceutical company and then drill down on the
35. categories of information you would need to obtain under each.
See this exercise as the initial step in drafting a questionnaire.
For class discussion.
‹#›