SlideShare a Scribd company logo
1 of 14
Investigating and
dealing with bribery
ISO 37001
Clause 8.10
2
ISO 37001 – Clause 8.10
Investigating and dealing with bribery
 A management responsibility
 Important for credibility of the ABMS and top
management
 Framework for ordering and managing investigation
3
ISO 37001 – Clause 8.10
The organization shall implement procedures that:
a) Require assessment and, where appropriate, investigation of any bribery,
or violation of the anti-bribery policy or the anti-bribery management
system, which is reported, detected or reasonably suspected;
b) Require appropriate action in the event that the investigation reveals any
bribery, or violation of the anti-bribery policy or the anti-bribery
management system;
c) Empower and enable investigators;
d) Require co-operation in the investigation by relevant personnel;
e) Require that the status and results of the investigation are reported to the
anti-bribery compliance function and other compliance functions, as
appropriate;
f) Require that the investigation is carried out confidentially and that the
outputs of the investigation are confidential.
4
Initial assessment of allegations
All complaint should be taken seriously
 Gather all pertinent information
 Assess credibility of the source
Hearsay vs first hand observations
Level of details
Corroboration of evidence
 Support of counsel (in-house or external)
 If in doubt: order an investigation
5
Who should get the complaint
 Preferably the anti-bribery compliance function;
 If reported to other person, the internal procedure should
require immediate transmission of the alleged violation to
the anti-bribery compliance function;
 Procedure should establish who is responsible of the
initial assessment;
 If a major violation is reported, anti-bribery compliance
function should bring the situation to top management to
assess best response.
6
Benefits of a professionally conducted
investigation
 Determine and understand the facts and the potential
legal impact;
 Assess the efficiency of its management systems and
controls;
 Prevent further violations;
 Demonstrate strong leadership;
 Minimize disruptive impact on business and employee
morale;
 Promote the anti-bribery culture in the organization
7
Failure to investigate credible allegations
Failure to investigate credible evidence of violation
 Undermine credibility of the ABMS;
 May expose senior management to allegations of cover-
up and wrongdoing;
 Suspension or loss of certification and resulting negative
press;
 Criminal charges or civil liability.
8
Planning the internal investigation
 Conducted by personnel who are not part of the role or
function being investigated;
 Counsel (internal or external) should be part of the
investigative team;
 Investigators must be properly empowered;
 Expertise and experience in bribery investigations.
9
Risks of bribery investigations
 Legal implications (Major corruption scheme);
 Difficulty of establishing the scope of the corruption
scheme;
 Fishing expedition;
 Time, money and unwanted negative press exposure.
10
Urgency to stop an ongoing violation
 Clear innocent employees as soon as possible;
 Take corrective actions sooner than later;
 Minimize negative impact on employee morale;
 Minimize negative impact on operations;
 Demonstrate strong leadership;
 Reinforce credibility of the ABMS.
11
Top management responsibilities
 Top management must be informed by the anti-bribery
compliance function of the progress;
 Follow-up by top management is not an intrusion in the
investigation;
 Make certain that clause 8.9 of the standard is applied
(source protection, no retaliation);
 Communication plan.
12
Content of the investigation report
 Nature of the alleged bribery violation;
 Summary of the facts gathered during the investigation;
 Chronology of events;
 People interviewed and documents reviewed;
 Organization’s procedures and guidelines that apply;
 Possible breakdown in internal controls;
 Conclusion reached on key issues;
 No specific recommendations.
13
Management decisions
 Terminate, withdraw from or modify the organization’s
involvement in a project, transaction or contract;
 Repay or reclaim any improper benefit obtained;
 Discipline responsible personnel;
 Report the matter to the authorities;
 Review ABMS policy and procedures.
14
Questions

More Related Content

What's hot

Key Elements of an Effective Anti-Bribery Management System Implementation
Key Elements of an Effective Anti-Bribery Management System ImplementationKey Elements of an Effective Anti-Bribery Management System Implementation
Key Elements of an Effective Anti-Bribery Management System ImplementationPECB
 
ISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxDr Madhu Aman Sharma
 
ISO 37001: Procurement factors
ISO 37001: Procurement factorsISO 37001: Procurement factors
ISO 37001: Procurement factorsDr Mark Lovatt
 
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...iFour Consultancy
 
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...himalya sharma
 
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?PECB
 
COBIT 5.0 Vs ISO / IEC 38500 (IT Governance)
COBIT 5.0 Vs ISO / IEC 38500 (IT Governance)COBIT 5.0 Vs ISO / IEC 38500 (IT Governance)
COBIT 5.0 Vs ISO / IEC 38500 (IT Governance)ISACA Riyadh
 
NQA - ISO 9001 Implementation Guide
NQA - ISO 9001 Implementation GuideNQA - ISO 9001 Implementation Guide
NQA - ISO 9001 Implementation GuideNA Putra
 
Mandatory documents and records required by iso 14001:2015
Mandatory documents and records required by iso 14001:2015Mandatory documents and records required by iso 14001:2015
Mandatory documents and records required by iso 14001:2015eimayem
 
ISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureUppala Anand
 
Auditing Anti-Bribery
Auditing Anti-BriberyAuditing Anti-Bribery
Auditing Anti-BriberyPECB
 
ISO 31022 Management of Legal Risks IE Law School Masterclass Hernan Huwyler
ISO 31022 Management of Legal Risks IE Law School Masterclass Hernan Huwyler ISO 31022 Management of Legal Risks IE Law School Masterclass Hernan Huwyler
ISO 31022 Management of Legal Risks IE Law School Masterclass Hernan Huwyler Hernan Huwyler, MBA CPA
 
Planning for security and security audit process
Planning for security and security audit processPlanning for security and security audit process
Planning for security and security audit processDivya Tiwari
 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromMart Rovers
 

What's hot (20)

Key Elements of an Effective Anti-Bribery Management System Implementation
Key Elements of an Effective Anti-Bribery Management System ImplementationKey Elements of an Effective Anti-Bribery Management System Implementation
Key Elements of an Effective Anti-Bribery Management System Implementation
 
ISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptx
 
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdfISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
 
ISO 37001: Procurement factors
ISO 37001: Procurement factorsISO 37001: Procurement factors
ISO 37001: Procurement factors
 
Iso 37000
Iso 37000Iso 37000
Iso 37000
 
ISO/IEC 27001:2005 naar ISO 27001:2013 Checklist
ISO/IEC 27001:2005 naar ISO 27001:2013  ChecklistISO/IEC 27001:2005 naar ISO 27001:2013  Checklist
ISO/IEC 27001:2005 naar ISO 27001:2013 Checklist
 
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
 
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
 
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
 
Isms
IsmsIsms
Isms
 
COBIT 5.0 Vs ISO / IEC 38500 (IT Governance)
COBIT 5.0 Vs ISO / IEC 38500 (IT Governance)COBIT 5.0 Vs ISO / IEC 38500 (IT Governance)
COBIT 5.0 Vs ISO / IEC 38500 (IT Governance)
 
NQA - ISO 9001 Implementation Guide
NQA - ISO 9001 Implementation GuideNQA - ISO 9001 Implementation Guide
NQA - ISO 9001 Implementation Guide
 
Iso 31000
Iso 31000Iso 31000
Iso 31000
 
ISO 27001:2022 Introduction
ISO 27001:2022 IntroductionISO 27001:2022 Introduction
ISO 27001:2022 Introduction
 
Mandatory documents and records required by iso 14001:2015
Mandatory documents and records required by iso 14001:2015Mandatory documents and records required by iso 14001:2015
Mandatory documents and records required by iso 14001:2015
 
ISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedure
 
Auditing Anti-Bribery
Auditing Anti-BriberyAuditing Anti-Bribery
Auditing Anti-Bribery
 
ISO 31022 Management of Legal Risks IE Law School Masterclass Hernan Huwyler
ISO 31022 Management of Legal Risks IE Law School Masterclass Hernan Huwyler ISO 31022 Management of Legal Risks IE Law School Masterclass Hernan Huwyler
ISO 31022 Management of Legal Risks IE Law School Masterclass Hernan Huwyler
 
Planning for security and security audit process
Planning for security and security audit processPlanning for security and security audit process
Planning for security and security audit process
 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interprom
 

Viewers also liked

Protecting Against Bribery Risk in Business Transactions: Developing an Effec...
Protecting Against Bribery Risk in Business Transactions: Developing an Effec...Protecting Against Bribery Risk in Business Transactions: Developing an Effec...
Protecting Against Bribery Risk in Business Transactions: Developing an Effec...PECB
 
Comprendre le contexte de la corruption - La façon d’atteindre l’objectif
Comprendre le contexte de la corruption - La façon d’atteindre l’objectifComprendre le contexte de la corruption - La façon d’atteindre l’objectif
Comprendre le contexte de la corruption - La façon d’atteindre l’objectifPECB
 
ISO Standards support for Anti-Bribery investigations and audits in the cyber...
ISO Standards support for Anti-Bribery investigations and audits in the cyber...ISO Standards support for Anti-Bribery investigations and audits in the cyber...
ISO Standards support for Anti-Bribery investigations and audits in the cyber...PECB
 
L’enquête et le traitement des cas de corruption
L’enquête et le traitement  des cas de corruptionL’enquête et le traitement  des cas de corruption
L’enquête et le traitement des cas de corruptionPECB
 
The New Competitive Advantage – How a robust compliance program can both prot...
The New Competitive Advantage – How a robust compliance program can both prot...The New Competitive Advantage – How a robust compliance program can both prot...
The New Competitive Advantage – How a robust compliance program can both prot...PECB
 
Investigating Corruption: First responses to signs of trouble
Investigating Corruption: First responses to signs of troubleInvestigating Corruption: First responses to signs of trouble
Investigating Corruption: First responses to signs of troublePECB
 
Utilité et limites de l'enquête numérique judiciaire dans le contexte anti-co...
Utilité et limites de l'enquête numérique judiciaire dans le contexte anti-co...Utilité et limites de l'enquête numérique judiciaire dans le contexte anti-co...
Utilité et limites de l'enquête numérique judiciaire dans le contexte anti-co...PECB
 
Whistleblowers – A key but misunderstood tool in the fight against corruption
Whistleblowers – A key but misunderstood tool in the fight against corruptionWhistleblowers – A key but misunderstood tool in the fight against corruption
Whistleblowers – A key but misunderstood tool in the fight against corruptionPECB
 
Challenges of Investigating Corruption Abroad
Challenges of Investigating Corruption AbroadChallenges of Investigating Corruption Abroad
Challenges of Investigating Corruption AbroadPECB
 
Mitigating Corruption Risk in a Global Market
Mitigating Corruption Risk in a Global MarketMitigating Corruption Risk in a Global Market
Mitigating Corruption Risk in a Global MarketPECB
 
Prévenir la corruption: Aller au-delà des normes
Prévenir la corruption:  Aller au-delà des normesPrévenir la corruption:  Aller au-delà des normes
Prévenir la corruption: Aller au-delà des normesPECB
 
Third Party Oversight and Monitoring: How to Establish an Effective Third Par...
Third Party Oversight and Monitoring: How to Establish an Effective Third Par...Third Party Oversight and Monitoring: How to Establish an Effective Third Par...
Third Party Oversight and Monitoring: How to Establish an Effective Third Par...PECB
 
FCPA Enforcement Tends and Their Impact on Corporate Compliance Programs
FCPA Enforcement Tends and Their Impact on Corporate Compliance ProgramsFCPA Enforcement Tends and Their Impact on Corporate Compliance Programs
FCPA Enforcement Tends and Their Impact on Corporate Compliance ProgramsPECB
 
Anti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyAnti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyPECB
 

Viewers also liked (14)

Protecting Against Bribery Risk in Business Transactions: Developing an Effec...
Protecting Against Bribery Risk in Business Transactions: Developing an Effec...Protecting Against Bribery Risk in Business Transactions: Developing an Effec...
Protecting Against Bribery Risk in Business Transactions: Developing an Effec...
 
Comprendre le contexte de la corruption - La façon d’atteindre l’objectif
Comprendre le contexte de la corruption - La façon d’atteindre l’objectifComprendre le contexte de la corruption - La façon d’atteindre l’objectif
Comprendre le contexte de la corruption - La façon d’atteindre l’objectif
 
ISO Standards support for Anti-Bribery investigations and audits in the cyber...
ISO Standards support for Anti-Bribery investigations and audits in the cyber...ISO Standards support for Anti-Bribery investigations and audits in the cyber...
ISO Standards support for Anti-Bribery investigations and audits in the cyber...
 
L’enquête et le traitement des cas de corruption
L’enquête et le traitement  des cas de corruptionL’enquête et le traitement  des cas de corruption
L’enquête et le traitement des cas de corruption
 
The New Competitive Advantage – How a robust compliance program can both prot...
The New Competitive Advantage – How a robust compliance program can both prot...The New Competitive Advantage – How a robust compliance program can both prot...
The New Competitive Advantage – How a robust compliance program can both prot...
 
Investigating Corruption: First responses to signs of trouble
Investigating Corruption: First responses to signs of troubleInvestigating Corruption: First responses to signs of trouble
Investigating Corruption: First responses to signs of trouble
 
Utilité et limites de l'enquête numérique judiciaire dans le contexte anti-co...
Utilité et limites de l'enquête numérique judiciaire dans le contexte anti-co...Utilité et limites de l'enquête numérique judiciaire dans le contexte anti-co...
Utilité et limites de l'enquête numérique judiciaire dans le contexte anti-co...
 
Whistleblowers – A key but misunderstood tool in the fight against corruption
Whistleblowers – A key but misunderstood tool in the fight against corruptionWhistleblowers – A key but misunderstood tool in the fight against corruption
Whistleblowers – A key but misunderstood tool in the fight against corruption
 
Challenges of Investigating Corruption Abroad
Challenges of Investigating Corruption AbroadChallenges of Investigating Corruption Abroad
Challenges of Investigating Corruption Abroad
 
Mitigating Corruption Risk in a Global Market
Mitigating Corruption Risk in a Global MarketMitigating Corruption Risk in a Global Market
Mitigating Corruption Risk in a Global Market
 
Prévenir la corruption: Aller au-delà des normes
Prévenir la corruption:  Aller au-delà des normesPrévenir la corruption:  Aller au-delà des normes
Prévenir la corruption: Aller au-delà des normes
 
Third Party Oversight and Monitoring: How to Establish an Effective Third Par...
Third Party Oversight and Monitoring: How to Establish an Effective Third Par...Third Party Oversight and Monitoring: How to Establish an Effective Third Par...
Third Party Oversight and Monitoring: How to Establish an Effective Third Par...
 
FCPA Enforcement Tends and Their Impact on Corporate Compliance Programs
FCPA Enforcement Tends and Their Impact on Corporate Compliance ProgramsFCPA Enforcement Tends and Their Impact on Corporate Compliance Programs
FCPA Enforcement Tends and Their Impact on Corporate Compliance Programs
 
Anti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyAnti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacy
 

Similar to Investigating and dealing with bribery

Ccs conduct rules.do and donot.vigilance aspect.bose
Ccs conduct rules.do and donot.vigilance aspect.boseCcs conduct rules.do and donot.vigilance aspect.bose
Ccs conduct rules.do and donot.vigilance aspect.boseShankar Bose Sbose1958
 
Detecting and Preventing Corruption in Merges and Acquisitions 1
Detecting and Preventing Corruption in Merges and Acquisitions 1Detecting and Preventing Corruption in Merges and Acquisitions 1
Detecting and Preventing Corruption in Merges and Acquisitions 1Frank Dupuy
 
BUSS_213_Week_7___Final_Submission_and_Portfolio_Project_Reflection
BUSS_213_Week_7___Final_Submission_and_Portfolio_Project_ReflectionBUSS_213_Week_7___Final_Submission_and_Portfolio_Project_Reflection
BUSS_213_Week_7___Final_Submission_and_Portfolio_Project_ReflectionLorie Francisco
 
Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2, Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2, Tahir Abbas
 
Vigil mechanism policy 02.02.2016
Vigil mechanism policy 02.02.2016Vigil mechanism policy 02.02.2016
Vigil mechanism policy 02.02.2016Sharad Sharma
 
2016 - IQPC - The key to raising awareness and comprehension
2016 - IQPC - The key to raising awareness and comprehension2016 - IQPC - The key to raising awareness and comprehension
2016 - IQPC - The key to raising awareness and comprehensionDr Darren O'Connell AGIA
 
5. op risk and aml
5. op risk and aml5. op risk and aml
5. op risk and amlcrmbasel
 
Chapt 3 - Internal Controls and Conflicts
Chapt 3 - Internal Controls and ConflictsChapt 3 - Internal Controls and Conflicts
Chapt 3 - Internal Controls and ConflictsMOHD GHADAFI SHARI
 
Actions speak louder than words
Actions speak louder than wordsActions speak louder than words
Actions speak louder than wordsRachel Hamilton
 
page 9 STAFF DISCUSSION OF THE RISK OF MATERIAL MISSTATEMENT DUE T.pdf
page 9 STAFF DISCUSSION OF THE RISK OF MATERIAL MISSTATEMENT DUE T.pdfpage 9 STAFF DISCUSSION OF THE RISK OF MATERIAL MISSTATEMENT DUE T.pdf
page 9 STAFF DISCUSSION OF THE RISK OF MATERIAL MISSTATEMENT DUE T.pdfalicesilverblr
 
Whistle blower policy - DMI Finance
Whistle blower policy - DMI FinanceWhistle blower policy - DMI Finance
Whistle blower policy - DMI Financedmifinance
 
Thought Leadership on Ethics & Compliance scale Final
Thought Leadership on Ethics & Compliance scale FinalThought Leadership on Ethics & Compliance scale Final
Thought Leadership on Ethics & Compliance scale FinalSundaraparipurnan Narayanan
 
Encouraging Internal Compliance Communication Webinar
Encouraging Internal Compliance Communication WebinarEncouraging Internal Compliance Communication Webinar
Encouraging Internal Compliance Communication WebinarCase IQ
 
Embedding anti corruption due diligence in procurement
Embedding anti corruption due diligence in procurementEmbedding anti corruption due diligence in procurement
Embedding anti corruption due diligence in procurementMyron Duncan Burton Betshanger
 
Whitepaper: How to Avoid 15 Common Pitfalls that Undermine Workplace Investig...
Whitepaper: How to Avoid 15 Common Pitfalls that Undermine Workplace Investig...Whitepaper: How to Avoid 15 Common Pitfalls that Undermine Workplace Investig...
Whitepaper: How to Avoid 15 Common Pitfalls that Undermine Workplace Investig...Gradytl
 
topic 3 internal controls..audit.pptx
topic 3 internal controls..audit.pptxtopic 3 internal controls..audit.pptx
topic 3 internal controls..audit.pptxvailethmwaisanila
 

Similar to Investigating and dealing with bribery (20)

Ccs conduct rules.do and donot.vigilance aspect.bose
Ccs conduct rules.do and donot.vigilance aspect.boseCcs conduct rules.do and donot.vigilance aspect.bose
Ccs conduct rules.do and donot.vigilance aspect.bose
 
Preventive Vigilance.pdf
Preventive Vigilance.pdfPreventive Vigilance.pdf
Preventive Vigilance.pdf
 
COMPLIANCE WITH ETHICAL REQUIREMENTS
COMPLIANCE WITH ETHICAL REQUIREMENTS COMPLIANCE WITH ETHICAL REQUIREMENTS
COMPLIANCE WITH ETHICAL REQUIREMENTS
 
Fraud Deterrence
Fraud DeterrenceFraud Deterrence
Fraud Deterrence
 
Detecting and Preventing Corruption in Merges and Acquisitions 1
Detecting and Preventing Corruption in Merges and Acquisitions 1Detecting and Preventing Corruption in Merges and Acquisitions 1
Detecting and Preventing Corruption in Merges and Acquisitions 1
 
Kenya AMC Presentation 2
Kenya AMC Presentation 2Kenya AMC Presentation 2
Kenya AMC Presentation 2
 
BUSS_213_Week_7___Final_Submission_and_Portfolio_Project_Reflection
BUSS_213_Week_7___Final_Submission_and_Portfolio_Project_ReflectionBUSS_213_Week_7___Final_Submission_and_Portfolio_Project_Reflection
BUSS_213_Week_7___Final_Submission_and_Portfolio_Project_Reflection
 
Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2, Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2,
 
Vigil mechanism policy 02.02.2016
Vigil mechanism policy 02.02.2016Vigil mechanism policy 02.02.2016
Vigil mechanism policy 02.02.2016
 
2016 - IQPC - The key to raising awareness and comprehension
2016 - IQPC - The key to raising awareness and comprehension2016 - IQPC - The key to raising awareness and comprehension
2016 - IQPC - The key to raising awareness and comprehension
 
5. op risk and aml
5. op risk and aml5. op risk and aml
5. op risk and aml
 
Chapt 3 - Internal Controls and Conflicts
Chapt 3 - Internal Controls and ConflictsChapt 3 - Internal Controls and Conflicts
Chapt 3 - Internal Controls and Conflicts
 
Actions speak louder than words
Actions speak louder than wordsActions speak louder than words
Actions speak louder than words
 
page 9 STAFF DISCUSSION OF THE RISK OF MATERIAL MISSTATEMENT DUE T.pdf
page 9 STAFF DISCUSSION OF THE RISK OF MATERIAL MISSTATEMENT DUE T.pdfpage 9 STAFF DISCUSSION OF THE RISK OF MATERIAL MISSTATEMENT DUE T.pdf
page 9 STAFF DISCUSSION OF THE RISK OF MATERIAL MISSTATEMENT DUE T.pdf
 
Whistle blower policy - DMI Finance
Whistle blower policy - DMI FinanceWhistle blower policy - DMI Finance
Whistle blower policy - DMI Finance
 
Thought Leadership on Ethics & Compliance scale Final
Thought Leadership on Ethics & Compliance scale FinalThought Leadership on Ethics & Compliance scale Final
Thought Leadership on Ethics & Compliance scale Final
 
Encouraging Internal Compliance Communication Webinar
Encouraging Internal Compliance Communication WebinarEncouraging Internal Compliance Communication Webinar
Encouraging Internal Compliance Communication Webinar
 
Embedding anti corruption due diligence in procurement
Embedding anti corruption due diligence in procurementEmbedding anti corruption due diligence in procurement
Embedding anti corruption due diligence in procurement
 
Whitepaper: How to Avoid 15 Common Pitfalls that Undermine Workplace Investig...
Whitepaper: How to Avoid 15 Common Pitfalls that Undermine Workplace Investig...Whitepaper: How to Avoid 15 Common Pitfalls that Undermine Workplace Investig...
Whitepaper: How to Avoid 15 Common Pitfalls that Undermine Workplace Investig...
 
topic 3 internal controls..audit.pptx
topic 3 internal controls..audit.pptxtopic 3 internal controls..audit.pptx
topic 3 internal controls..audit.pptx
 

More from PECB

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityPECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernancePECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyPECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationPECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsPECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptxPECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxPECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 

More from PECB (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 

Recently uploaded

OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...NETWAYS
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Kayode Fayemi
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...henrik385807
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024eCommerce Institute
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesPooja Nehwal
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Salam Al-Karadaghi
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...NETWAYS
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@vikas rana
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxmohammadalnahdi22
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...NETWAYS
 
Motivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfMotivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfakankshagupta7348026
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfhenrik385807
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfhenrik385807
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Pooja Nehwal
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Hasting Chen
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...NETWAYS
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Krijn Poppe
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024eCommerce Institute
 

Recently uploaded (20)

OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
 
Motivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfMotivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdf
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024
 

Investigating and dealing with bribery

  • 1. Investigating and dealing with bribery ISO 37001 Clause 8.10
  • 2. 2 ISO 37001 – Clause 8.10 Investigating and dealing with bribery  A management responsibility  Important for credibility of the ABMS and top management  Framework for ordering and managing investigation
  • 3. 3 ISO 37001 – Clause 8.10 The organization shall implement procedures that: a) Require assessment and, where appropriate, investigation of any bribery, or violation of the anti-bribery policy or the anti-bribery management system, which is reported, detected or reasonably suspected; b) Require appropriate action in the event that the investigation reveals any bribery, or violation of the anti-bribery policy or the anti-bribery management system; c) Empower and enable investigators; d) Require co-operation in the investigation by relevant personnel; e) Require that the status and results of the investigation are reported to the anti-bribery compliance function and other compliance functions, as appropriate; f) Require that the investigation is carried out confidentially and that the outputs of the investigation are confidential.
  • 4. 4 Initial assessment of allegations All complaint should be taken seriously  Gather all pertinent information  Assess credibility of the source Hearsay vs first hand observations Level of details Corroboration of evidence  Support of counsel (in-house or external)  If in doubt: order an investigation
  • 5. 5 Who should get the complaint  Preferably the anti-bribery compliance function;  If reported to other person, the internal procedure should require immediate transmission of the alleged violation to the anti-bribery compliance function;  Procedure should establish who is responsible of the initial assessment;  If a major violation is reported, anti-bribery compliance function should bring the situation to top management to assess best response.
  • 6. 6 Benefits of a professionally conducted investigation  Determine and understand the facts and the potential legal impact;  Assess the efficiency of its management systems and controls;  Prevent further violations;  Demonstrate strong leadership;  Minimize disruptive impact on business and employee morale;  Promote the anti-bribery culture in the organization
  • 7. 7 Failure to investigate credible allegations Failure to investigate credible evidence of violation  Undermine credibility of the ABMS;  May expose senior management to allegations of cover- up and wrongdoing;  Suspension or loss of certification and resulting negative press;  Criminal charges or civil liability.
  • 8. 8 Planning the internal investigation  Conducted by personnel who are not part of the role or function being investigated;  Counsel (internal or external) should be part of the investigative team;  Investigators must be properly empowered;  Expertise and experience in bribery investigations.
  • 9. 9 Risks of bribery investigations  Legal implications (Major corruption scheme);  Difficulty of establishing the scope of the corruption scheme;  Fishing expedition;  Time, money and unwanted negative press exposure.
  • 10. 10 Urgency to stop an ongoing violation  Clear innocent employees as soon as possible;  Take corrective actions sooner than later;  Minimize negative impact on employee morale;  Minimize negative impact on operations;  Demonstrate strong leadership;  Reinforce credibility of the ABMS.
  • 11. 11 Top management responsibilities  Top management must be informed by the anti-bribery compliance function of the progress;  Follow-up by top management is not an intrusion in the investigation;  Make certain that clause 8.9 of the standard is applied (source protection, no retaliation);  Communication plan.
  • 12. 12 Content of the investigation report  Nature of the alleged bribery violation;  Summary of the facts gathered during the investigation;  Chronology of events;  People interviewed and documents reviewed;  Organization’s procedures and guidelines that apply;  Possible breakdown in internal controls;  Conclusion reached on key issues;  No specific recommendations.
  • 13. 13 Management decisions  Terminate, withdraw from or modify the organization’s involvement in a project, transaction or contract;  Repay or reclaim any improper benefit obtained;  Discipline responsible personnel;  Report the matter to the authorities;  Review ABMS policy and procedures.