SlideShare a Scribd company logo
Mitigating Corruption
Risk in a Global Market
Ralph El-Haddad
Global Compliance Leader at CAE Inc.
2
Agenda
 Familiarization with CAE’s background and anti-
corruption laws applicable to its operations
 Summary of CAE’s Anti-Corruption Policy and processes
 Description of CAE’s preventive measures and corporate
culture
 Reporting tools and support available for employees
3
CAE Background
 CAE is a global leader in training for the civil aviation,
defence and security, and healthcare markets
 Founded in 1947, CAE expanded its sales internationally
in the 1980s, became the world leader in the sale of
flight simulators in the 1990s, launched a network of
training centres in early 2000s
 Today, CAE has over 8,500 employees in over 35
countries, and operates 67 training locations
 CAE’s business is divided in three core business
sectors, each led by a Group President:
 Civil Aviation
 Defense and Security
 Healthcare
4
Anti-Corruption Laws
 Any corporation is bound by anti-corruption laws of the
origin country as well as any country in which said
corporation has presence.
 Along with local anti-corruption laws, CAE is mostly
concerned with three anti-corruption legislations:
1. The Corruption of Foreign Public Officials Act (CFPOA)
2. The Foreign Corrupt Practices Act (FCPA)
3. The UK Bribery Act (UKBA)
 It is important to note that a “foreign official” in the
context of CAE’s operations means any officer or
employee of a state-owned enterprise, or even a
corporation with a majority share owned by the
government.
5
Corruption Risk Profile
 CAE’s company profile places it in a position where there is a high
risk of exposure to corruption or unethical behavior for the following
reasons:
 Presence in countries with a high corruption index
 Independent offices expose CAE to risks of unauthorized payments
 Contact with government officials
 Use of third parties such as foreign representatives and consultants
 There are two main avenues that could put CAE at risk:
Foreign
Reps
Unauthorized
Payments
6
Foreign Representatives
 Foreign reps are third parties hired in countries where CAE has
minimal employee presence as they are a cost-effective alternative.
Their main task is to assist CAE in marketing activities and in selling
its products and services.
 As CAE is expanding its worldwide presence, the need for
representatives is diminishing. The CAE Compliance Office is
tasked with managing all rep agreements by working in conjunction
with the business unit:
 The business unit determines the need for a representative
 The Compliance Office conducts a detailed due diligence and
determines the amount that should be paid to the
representative
• Who are the reps? Are they related to government officials?
• Do they have any red flags associated to them?
• What services do they provide for the fee that they are earning?
7
Processes and Safety Measures
 Reps go through a rigorous process in order to be hired by CAE
 In addition, our foreign rep agreements contain safety measures to
ensure that reps will not use the fees paid as bribes:
 Agreements are only signed by the Group President of the applicable
business unit after obtaining approval from the Chief Compliance
Officer
 The fee is only paid after a contract is awarded to CAE
 The fee is paid to a bank account with the rep’s name using the project
milestones
 The fee amount is calculated based on the services provided
 Reps go through anti-corruption training and sign anti-corruption
certifications prior to being hired
 Rep agreements are only valid for one year, and if they are to be
renewed, the rep must undergo the above process upon renewal
Justification Interview
Due
Diligence
Training and
Certification
Agreement
8
Business Courtesies
 Business courtesies help corporations develop and maintain
relationships with customers. However, it is important to understand
the rules concerning the exchange of business courtesies in order to
avoid misconduct and the risk of unauthorized payments.
 A business courtesy is deemed unacceptable when it is:
 Money or a cash equivalent
 Requested by recipient
 Extravagant and luxurious
 Exchanged with the same party multiple times a year
 Provided solely to a spouse or close relative
 In CAE’s Anti-Corruption Policy, there are spending limits attributed
to business courtesies. These limits vary depending on what the
purpose is, who the recipient is and in what country the business
courtesy is being exchanged.
9
Prevention
 To mitigate the risk of unauthorized payments, CAE requires
employees to present proper justification before using company
funds. There has to be a detailed and valid explanation for the use
as well as prior approval from the employee’s supervisor and the
Finance department.
 In addition, CAE’s Internal Audit and the Compliance Office conduct
regular audits and risk assessments of areas that could potentially
be compromised, such as employee spending or fees paid to third
parties.
 Our Anti-Corruption Policy and related processes are subject to
continuous improvement in order to adapt to the everchanging
landscape.
 CAE’s Political and Charitable Contributions Policy prohibits
employees from making any political donations in CAE’s name, and
all charitable contributions must be made by the Global
Communications department.
10
Red Flags
 Here are some of the red flags to watch out for:
 Country has a reputation for corruption
 Signs of collusion between suppliers and customers
 Third parties requesting gifts or cash payments
 Excessive or lavish expenses incurred
 Frequent complaints about an individual or party
 Although these alone are sometimes not enough to
make deductions, they are a signal that prompts us to
investigate further.
11
Management Tone
 At CAE, our CEO, as well as all the executive
management committee are continuously vocal about
the importance of ethical conduct.
 The Chief Compliance Officer reports monthly to the
management committee on all compliance matters and
reports quarterly to the Board of Directors.
 CAE is also a member of the UNGC in support of social
responsibility and ethical practices.
12
Training
 Employees are required to go through the online Anti-
Corruption training annually.
 In addition to online training, the Compliance Office
conducts live training to several departments. This
training would be customized based on the activities
of each department.
 In addition, employees are required to annually certify to
the Code of Conduct.
 An anti-corruption manual is distributed to employees for
a quick reference on policy requirements.
13
Whistleblowing
 CAE’s Whistleblower Policy encourages employees to
report any suspicious activities that they may witness.
Under this Policy, CAE is not allowed to retaliate against
any whistleblower.
 EthicsPoint is an anonymous reporting tool that CAE
offers to its employees.
Thank you!

More Related Content

What's hot

Compliance Officer update: What you should know about your Business Partner -...
Compliance Officer update: What you should know about your Business Partner -...Compliance Officer update: What you should know about your Business Partner -...
Compliance Officer update: What you should know about your Business Partner -...
vivacidade
 
Third Party Oversight and Monitoring: How to Establish an Effective Third Par...
Third Party Oversight and Monitoring: How to Establish an Effective Third Par...Third Party Oversight and Monitoring: How to Establish an Effective Third Par...
Third Party Oversight and Monitoring: How to Establish an Effective Third Par...
PECB
 
Legal Governance, Risk Management and Compliance
Legal Governance, Risk Management and ComplianceLegal Governance, Risk Management and Compliance
Legal Governance, Risk Management and Compliance
Effacts
 
Financial crime hot topics: DPA's and Correspondent Banking
Financial crime hot topics: DPA's and Correspondent BankingFinancial crime hot topics: DPA's and Correspondent Banking
Financial crime hot topics: DPA's and Correspondent Banking
Bovill
 
Third Party Risk Due Diligence - Feb 2012
Third Party Risk Due Diligence - Feb 2012Third Party Risk Due Diligence - Feb 2012
Third Party Risk Due Diligence - Feb 2012
aj22dms
 
2016 fca look ahead bovill briefing
2016 fca look ahead   bovill briefing2016 fca look ahead   bovill briefing
2016 fca look ahead bovill briefing
Bovill
 
Crd for investment presentation march 2016
Crd for investment presentation   march 2016Crd for investment presentation   march 2016
Crd for investment presentation march 2016
Bovill
 
Middle East Summit on Anti-Corruption
Middle East Summit on Anti-CorruptionMiddle East Summit on Anti-Corruption
Middle East Summit on Anti-Corruption
Rachel Hamilton
 
2016 - IQPC - Understanding and Assessing Corruption Risk
2016 - IQPC - Understanding and Assessing Corruption Risk2016 - IQPC - Understanding and Assessing Corruption Risk
2016 - IQPC - Understanding and Assessing Corruption RiskDr Darren O'Connell AGIA
 
Presentation: Cross-Border Anti-Corruption Programs
Presentation: Cross-Border Anti-Corruption ProgramsPresentation: Cross-Border Anti-Corruption Programs
Presentation: Cross-Border Anti-Corruption Programs
ethiXbase
 
OFAC Name Matching and False-Positive Reduction Techniques
OFAC Name Matching and False-Positive Reduction TechniquesOFAC Name Matching and False-Positive Reduction Techniques
OFAC Name Matching and False-Positive Reduction Techniques
Cognizant
 
Countering Financial Crime - The Importance of Effective Training
Countering Financial Crime - The Importance of Effective TrainingCountering Financial Crime - The Importance of Effective Training
Countering Financial Crime - The Importance of Effective Training
Aperio Intelligence
 
White Paper: A summary of the FSA thematic review
White Paper: A summary of the FSA thematic reviewWhite Paper: A summary of the FSA thematic review
White Paper: A summary of the FSA thematic review
LexisNexis Benelux
 
Customer Due Diligence: Improving Screening Processes for OFAC Entities and O...
Customer Due Diligence: Improving Screening Processes for OFAC Entities and O...Customer Due Diligence: Improving Screening Processes for OFAC Entities and O...
Customer Due Diligence: Improving Screening Processes for OFAC Entities and O...
SHAUN HASSETT
 
ACCA-IIA Singapore Seminar 2015 part 2 fraud risk governance
ACCA-IIA Singapore Seminar 2015 part 2 fraud risk governanceACCA-IIA Singapore Seminar 2015 part 2 fraud risk governance
ACCA-IIA Singapore Seminar 2015 part 2 fraud risk governance
BillyCheuk
 
Intro to Legal Risk Management
Intro to Legal Risk Management Intro to Legal Risk Management
Intro to Legal Risk Management
Bryan Hopkins
 
SunGard 2010 Compliance Summit: Keynote Speech
SunGard 2010 Compliance Summit: Keynote SpeechSunGard 2010 Compliance Summit: Keynote Speech
SunGard 2010 Compliance Summit: Keynote Speech
guestf1dd184
 
ACCA-IIA Singapore Seminar 2015 Part 1 Introduction
ACCA-IIA Singapore Seminar 2015 Part 1 IntroductionACCA-IIA Singapore Seminar 2015 Part 1 Introduction
ACCA-IIA Singapore Seminar 2015 Part 1 Introduction
BillyCheuk
 
NICSA Webinar | AML Enhanced Customer Due Diligence - "Beneficial Owner Rule"
NICSA Webinar | AML Enhanced Customer Due Diligence - "Beneficial Owner Rule"NICSA Webinar | AML Enhanced Customer Due Diligence - "Beneficial Owner Rule"
NICSA Webinar | AML Enhanced Customer Due Diligence - "Beneficial Owner Rule"
NICSA
 
Exploring Relationship Between Risk & Compliance
Exploring Relationship Between Risk & ComplianceExploring Relationship Between Risk & Compliance
Exploring Relationship Between Risk & Compliance
ComplianceTrack
 

What's hot (20)

Compliance Officer update: What you should know about your Business Partner -...
Compliance Officer update: What you should know about your Business Partner -...Compliance Officer update: What you should know about your Business Partner -...
Compliance Officer update: What you should know about your Business Partner -...
 
Third Party Oversight and Monitoring: How to Establish an Effective Third Par...
Third Party Oversight and Monitoring: How to Establish an Effective Third Par...Third Party Oversight and Monitoring: How to Establish an Effective Third Par...
Third Party Oversight and Monitoring: How to Establish an Effective Third Par...
 
Legal Governance, Risk Management and Compliance
Legal Governance, Risk Management and ComplianceLegal Governance, Risk Management and Compliance
Legal Governance, Risk Management and Compliance
 
Financial crime hot topics: DPA's and Correspondent Banking
Financial crime hot topics: DPA's and Correspondent BankingFinancial crime hot topics: DPA's and Correspondent Banking
Financial crime hot topics: DPA's and Correspondent Banking
 
Third Party Risk Due Diligence - Feb 2012
Third Party Risk Due Diligence - Feb 2012Third Party Risk Due Diligence - Feb 2012
Third Party Risk Due Diligence - Feb 2012
 
2016 fca look ahead bovill briefing
2016 fca look ahead   bovill briefing2016 fca look ahead   bovill briefing
2016 fca look ahead bovill briefing
 
Crd for investment presentation march 2016
Crd for investment presentation   march 2016Crd for investment presentation   march 2016
Crd for investment presentation march 2016
 
Middle East Summit on Anti-Corruption
Middle East Summit on Anti-CorruptionMiddle East Summit on Anti-Corruption
Middle East Summit on Anti-Corruption
 
2016 - IQPC - Understanding and Assessing Corruption Risk
2016 - IQPC - Understanding and Assessing Corruption Risk2016 - IQPC - Understanding and Assessing Corruption Risk
2016 - IQPC - Understanding and Assessing Corruption Risk
 
Presentation: Cross-Border Anti-Corruption Programs
Presentation: Cross-Border Anti-Corruption ProgramsPresentation: Cross-Border Anti-Corruption Programs
Presentation: Cross-Border Anti-Corruption Programs
 
OFAC Name Matching and False-Positive Reduction Techniques
OFAC Name Matching and False-Positive Reduction TechniquesOFAC Name Matching and False-Positive Reduction Techniques
OFAC Name Matching and False-Positive Reduction Techniques
 
Countering Financial Crime - The Importance of Effective Training
Countering Financial Crime - The Importance of Effective TrainingCountering Financial Crime - The Importance of Effective Training
Countering Financial Crime - The Importance of Effective Training
 
White Paper: A summary of the FSA thematic review
White Paper: A summary of the FSA thematic reviewWhite Paper: A summary of the FSA thematic review
White Paper: A summary of the FSA thematic review
 
Customer Due Diligence: Improving Screening Processes for OFAC Entities and O...
Customer Due Diligence: Improving Screening Processes for OFAC Entities and O...Customer Due Diligence: Improving Screening Processes for OFAC Entities and O...
Customer Due Diligence: Improving Screening Processes for OFAC Entities and O...
 
ACCA-IIA Singapore Seminar 2015 part 2 fraud risk governance
ACCA-IIA Singapore Seminar 2015 part 2 fraud risk governanceACCA-IIA Singapore Seminar 2015 part 2 fraud risk governance
ACCA-IIA Singapore Seminar 2015 part 2 fraud risk governance
 
Intro to Legal Risk Management
Intro to Legal Risk Management Intro to Legal Risk Management
Intro to Legal Risk Management
 
SunGard 2010 Compliance Summit: Keynote Speech
SunGard 2010 Compliance Summit: Keynote SpeechSunGard 2010 Compliance Summit: Keynote Speech
SunGard 2010 Compliance Summit: Keynote Speech
 
ACCA-IIA Singapore Seminar 2015 Part 1 Introduction
ACCA-IIA Singapore Seminar 2015 Part 1 IntroductionACCA-IIA Singapore Seminar 2015 Part 1 Introduction
ACCA-IIA Singapore Seminar 2015 Part 1 Introduction
 
NICSA Webinar | AML Enhanced Customer Due Diligence - "Beneficial Owner Rule"
NICSA Webinar | AML Enhanced Customer Due Diligence - "Beneficial Owner Rule"NICSA Webinar | AML Enhanced Customer Due Diligence - "Beneficial Owner Rule"
NICSA Webinar | AML Enhanced Customer Due Diligence - "Beneficial Owner Rule"
 
Exploring Relationship Between Risk & Compliance
Exploring Relationship Between Risk & ComplianceExploring Relationship Between Risk & Compliance
Exploring Relationship Between Risk & Compliance
 

Viewers also liked

Utilité et limites de l'enquête numérique judiciaire dans le contexte anti-co...
Utilité et limites de l'enquête numérique judiciaire dans le contexte anti-co...Utilité et limites de l'enquête numérique judiciaire dans le contexte anti-co...
Utilité et limites de l'enquête numérique judiciaire dans le contexte anti-co...
PECB
 
L’enquête et le traitement des cas de corruption
L’enquête et le traitement  des cas de corruptionL’enquête et le traitement  des cas de corruption
L’enquête et le traitement des cas de corruption
PECB
 
Prévenir la corruption: Aller au-delà des normes
Prévenir la corruption:  Aller au-delà des normesPrévenir la corruption:  Aller au-delà des normes
Prévenir la corruption: Aller au-delà des normes
PECB
 
Challenges of Investigating Corruption Abroad
Challenges of Investigating Corruption AbroadChallenges of Investigating Corruption Abroad
Challenges of Investigating Corruption Abroad
PECB
 
Comprendre le contexte de la corruption - La façon d’atteindre l’objectif
Comprendre le contexte de la corruption - La façon d’atteindre l’objectifComprendre le contexte de la corruption - La façon d’atteindre l’objectif
Comprendre le contexte de la corruption - La façon d’atteindre l’objectif
PECB
 
Anti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyAnti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacy
PECB
 

Viewers also liked (6)

Utilité et limites de l'enquête numérique judiciaire dans le contexte anti-co...
Utilité et limites de l'enquête numérique judiciaire dans le contexte anti-co...Utilité et limites de l'enquête numérique judiciaire dans le contexte anti-co...
Utilité et limites de l'enquête numérique judiciaire dans le contexte anti-co...
 
L’enquête et le traitement des cas de corruption
L’enquête et le traitement  des cas de corruptionL’enquête et le traitement  des cas de corruption
L’enquête et le traitement des cas de corruption
 
Prévenir la corruption: Aller au-delà des normes
Prévenir la corruption:  Aller au-delà des normesPrévenir la corruption:  Aller au-delà des normes
Prévenir la corruption: Aller au-delà des normes
 
Challenges of Investigating Corruption Abroad
Challenges of Investigating Corruption AbroadChallenges of Investigating Corruption Abroad
Challenges of Investigating Corruption Abroad
 
Comprendre le contexte de la corruption - La façon d’atteindre l’objectif
Comprendre le contexte de la corruption - La façon d’atteindre l’objectifComprendre le contexte de la corruption - La façon d’atteindre l’objectif
Comprendre le contexte de la corruption - La façon d’atteindre l’objectif
 
Anti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyAnti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacy
 

Similar to Mitigating Corruption Risk in a Global Market

Actions speak louder than words
Actions speak louder than wordsActions speak louder than words
Actions speak louder than words
Rachel Hamilton
 
ICC ethics and compliance training handbook chapter 13 resisting solicitation
ICC ethics and compliance training handbook chapter 13 resisting solicitationICC ethics and compliance training handbook chapter 13 resisting solicitation
ICC ethics and compliance training handbook chapter 13 resisting solicitation
iohann Le Frapper
 
Ethical and unethical business practices
Ethical and unethical business practicesEthical and unethical business practices
Ethical and unethical business practicesPooja Lilani
 
Best practice for anti corruption
Best practice for anti corruptionBest practice for anti corruption
Best practice for anti corruption
Ethical Sector
 
2016 - IQPC - The key to raising awareness and comprehension
2016 - IQPC - The key to raising awareness and comprehension2016 - IQPC - The key to raising awareness and comprehension
2016 - IQPC - The key to raising awareness and comprehensionDr Darren O'Connell AGIA
 
Certified Compliance Professional - August 2015 Nairobi (4)
Certified Compliance Professional - August 2015 Nairobi (4)Certified Compliance Professional - August 2015 Nairobi (4)
Certified Compliance Professional - August 2015 Nairobi (4)chemutai carol
 
BDO Anti Bribery & Corruption Advisory
BDO Anti Bribery & Corruption AdvisoryBDO Anti Bribery & Corruption Advisory
BDO Anti Bribery & Corruption Advisory
BDO Indonesia
 
10 Ways To Reduce The Risk of Bribery and Corruption.pdf
10 Ways To Reduce The Risk of Bribery and Corruption.pdf10 Ways To Reduce The Risk of Bribery and Corruption.pdf
10 Ways To Reduce The Risk of Bribery and Corruption.pdf
WajidKhanMP
 
10 Ways To Reduce The Risk of Bribery and Corruption.pdf
10 Ways To Reduce The Risk of Bribery and Corruption.pdf10 Ways To Reduce The Risk of Bribery and Corruption.pdf
10 Ways To Reduce The Risk of Bribery and Corruption.pdf
Wajid Khan MP
 
Video business continuity planning and disaster recovery
Video business continuity planning and disaster recoveryVideo business continuity planning and disaster recovery
Video business continuity planning and disaster recovery
Clive Bonny
 
Key elements of an anti-bribery/anti-corruption framework
Key elements of an anti-bribery/anti-corruption frameworkKey elements of an anti-bribery/anti-corruption framework
Key elements of an anti-bribery/anti-corruption framework
Robin Singh, Ms.(Law), MBA, Ms. (IT), LPEC, CFE
 
Bribery Act 2010: Has it Made a Difference
Bribery Act 2010: Has it Made a DifferenceBribery Act 2010: Has it Made a Difference
Bribery Act 2010: Has it Made a DifferenceLexisNexisRiskUK
 
Blake lapthorn Bribery Act Thames Valley HR forum - 13 september 2011
Blake lapthorn Bribery Act Thames Valley HR forum - 13 september 2011Blake lapthorn Bribery Act Thames Valley HR forum - 13 september 2011
Blake lapthorn Bribery Act Thames Valley HR forum - 13 september 2011Blake Morgan
 
Corporate integrity system compliance training 2017
Corporate integrity system compliance training 2017Corporate integrity system compliance training 2017
Corporate integrity system compliance training 2017
Transparency International Cambodia
 
Eluding sanction related risks through enhanced compliance
Eluding sanction related risks through enhanced complianceEluding sanction related risks through enhanced compliance
Eluding sanction related risks through enhanced compliance
GlobalCompact
 
Compliance Professional Yesterday, Today And Tomorrow
Compliance Professional   Yesterday, Today And TomorrowCompliance Professional   Yesterday, Today And Tomorrow
Compliance Professional Yesterday, Today And TomorrowAnn Oglanian
 
Anti-Money Laundering and Anti-Bribery and Corruption Systems & controls: Ass...
Anti-Money Laundering and Anti-Bribery and Corruption Systems & controls: Ass...Anti-Money Laundering and Anti-Bribery and Corruption Systems & controls: Ass...
Anti-Money Laundering and Anti-Bribery and Corruption Systems & controls: Ass...
LexisNexis Benelux
 
Financial Eye Brochure
Financial Eye BrochureFinancial Eye Brochure
Financial Eye BrochureNigel Wilson
 
16 Nonprofit Accounting Issues & Opportunities Slide Presentation.pptx
16 Nonprofit Accounting Issues & Opportunities Slide Presentation.pptx16 Nonprofit Accounting Issues & Opportunities Slide Presentation.pptx
16 Nonprofit Accounting Issues & Opportunities Slide Presentation.pptx
communication18
 

Similar to Mitigating Corruption Risk in a Global Market (20)

Actions speak louder than words
Actions speak louder than wordsActions speak louder than words
Actions speak louder than words
 
ICC ethics and compliance training handbook chapter 13 resisting solicitation
ICC ethics and compliance training handbook chapter 13 resisting solicitationICC ethics and compliance training handbook chapter 13 resisting solicitation
ICC ethics and compliance training handbook chapter 13 resisting solicitation
 
Ethical and unethical business practices
Ethical and unethical business practicesEthical and unethical business practices
Ethical and unethical business practices
 
Best practice for anti corruption
Best practice for anti corruptionBest practice for anti corruption
Best practice for anti corruption
 
2016 - IQPC - The key to raising awareness and comprehension
2016 - IQPC - The key to raising awareness and comprehension2016 - IQPC - The key to raising awareness and comprehension
2016 - IQPC - The key to raising awareness and comprehension
 
Certified Compliance Professional - August 2015 Nairobi (4)
Certified Compliance Professional - August 2015 Nairobi (4)Certified Compliance Professional - August 2015 Nairobi (4)
Certified Compliance Professional - August 2015 Nairobi (4)
 
BDO Anti Bribery & Corruption Advisory
BDO Anti Bribery & Corruption AdvisoryBDO Anti Bribery & Corruption Advisory
BDO Anti Bribery & Corruption Advisory
 
10 Ways To Reduce The Risk of Bribery and Corruption.pdf
10 Ways To Reduce The Risk of Bribery and Corruption.pdf10 Ways To Reduce The Risk of Bribery and Corruption.pdf
10 Ways To Reduce The Risk of Bribery and Corruption.pdf
 
10 Ways To Reduce The Risk of Bribery and Corruption.pdf
10 Ways To Reduce The Risk of Bribery and Corruption.pdf10 Ways To Reduce The Risk of Bribery and Corruption.pdf
10 Ways To Reduce The Risk of Bribery and Corruption.pdf
 
Video business continuity planning and disaster recovery
Video business continuity planning and disaster recoveryVideo business continuity planning and disaster recovery
Video business continuity planning and disaster recovery
 
Key elements of an anti-bribery/anti-corruption framework
Key elements of an anti-bribery/anti-corruption frameworkKey elements of an anti-bribery/anti-corruption framework
Key elements of an anti-bribery/anti-corruption framework
 
Bribery Act 2010: Has it Made a Difference
Bribery Act 2010: Has it Made a DifferenceBribery Act 2010: Has it Made a Difference
Bribery Act 2010: Has it Made a Difference
 
Blake lapthorn Bribery Act Thames Valley HR forum - 13 september 2011
Blake lapthorn Bribery Act Thames Valley HR forum - 13 september 2011Blake lapthorn Bribery Act Thames Valley HR forum - 13 september 2011
Blake lapthorn Bribery Act Thames Valley HR forum - 13 september 2011
 
Corporate integrity system compliance training 2017
Corporate integrity system compliance training 2017Corporate integrity system compliance training 2017
Corporate integrity system compliance training 2017
 
Social resp
Social respSocial resp
Social resp
 
Eluding sanction related risks through enhanced compliance
Eluding sanction related risks through enhanced complianceEluding sanction related risks through enhanced compliance
Eluding sanction related risks through enhanced compliance
 
Compliance Professional Yesterday, Today And Tomorrow
Compliance Professional   Yesterday, Today And TomorrowCompliance Professional   Yesterday, Today And Tomorrow
Compliance Professional Yesterday, Today And Tomorrow
 
Anti-Money Laundering and Anti-Bribery and Corruption Systems & controls: Ass...
Anti-Money Laundering and Anti-Bribery and Corruption Systems & controls: Ass...Anti-Money Laundering and Anti-Bribery and Corruption Systems & controls: Ass...
Anti-Money Laundering and Anti-Bribery and Corruption Systems & controls: Ass...
 
Financial Eye Brochure
Financial Eye BrochureFinancial Eye Brochure
Financial Eye Brochure
 
16 Nonprofit Accounting Issues & Opportunities Slide Presentation.pptx
16 Nonprofit Accounting Issues & Opportunities Slide Presentation.pptx16 Nonprofit Accounting Issues & Opportunities Slide Presentation.pptx
16 Nonprofit Accounting Issues & Opportunities Slide Presentation.pptx
 

More from PECB

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
PECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
PECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
PECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
PECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
PECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
PECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
PECB
 

More from PECB (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 

Recently uploaded

Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
faizulhassanfaiz1670
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Access Innovations, Inc.
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
Sebastiano Panichella
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
IP ServerOne
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
Vladimir Samoylov
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Sebastiano Panichella
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
OWASP Beja
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Sebastiano Panichella
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Matjaž Lipuš
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
eCommerce Institute
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Orkestra
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
Access Innovations, Inc.
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
Howard Spence
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
khadija278284
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
Faculty of Medicine And Health Sciences
 

Recently uploaded (16)

Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
 

Mitigating Corruption Risk in a Global Market

  • 1. Mitigating Corruption Risk in a Global Market Ralph El-Haddad Global Compliance Leader at CAE Inc.
  • 2. 2 Agenda  Familiarization with CAE’s background and anti- corruption laws applicable to its operations  Summary of CAE’s Anti-Corruption Policy and processes  Description of CAE’s preventive measures and corporate culture  Reporting tools and support available for employees
  • 3. 3 CAE Background  CAE is a global leader in training for the civil aviation, defence and security, and healthcare markets  Founded in 1947, CAE expanded its sales internationally in the 1980s, became the world leader in the sale of flight simulators in the 1990s, launched a network of training centres in early 2000s  Today, CAE has over 8,500 employees in over 35 countries, and operates 67 training locations  CAE’s business is divided in three core business sectors, each led by a Group President:  Civil Aviation  Defense and Security  Healthcare
  • 4. 4 Anti-Corruption Laws  Any corporation is bound by anti-corruption laws of the origin country as well as any country in which said corporation has presence.  Along with local anti-corruption laws, CAE is mostly concerned with three anti-corruption legislations: 1. The Corruption of Foreign Public Officials Act (CFPOA) 2. The Foreign Corrupt Practices Act (FCPA) 3. The UK Bribery Act (UKBA)  It is important to note that a “foreign official” in the context of CAE’s operations means any officer or employee of a state-owned enterprise, or even a corporation with a majority share owned by the government.
  • 5. 5 Corruption Risk Profile  CAE’s company profile places it in a position where there is a high risk of exposure to corruption or unethical behavior for the following reasons:  Presence in countries with a high corruption index  Independent offices expose CAE to risks of unauthorized payments  Contact with government officials  Use of third parties such as foreign representatives and consultants  There are two main avenues that could put CAE at risk: Foreign Reps Unauthorized Payments
  • 6. 6 Foreign Representatives  Foreign reps are third parties hired in countries where CAE has minimal employee presence as they are a cost-effective alternative. Their main task is to assist CAE in marketing activities and in selling its products and services.  As CAE is expanding its worldwide presence, the need for representatives is diminishing. The CAE Compliance Office is tasked with managing all rep agreements by working in conjunction with the business unit:  The business unit determines the need for a representative  The Compliance Office conducts a detailed due diligence and determines the amount that should be paid to the representative • Who are the reps? Are they related to government officials? • Do they have any red flags associated to them? • What services do they provide for the fee that they are earning?
  • 7. 7 Processes and Safety Measures  Reps go through a rigorous process in order to be hired by CAE  In addition, our foreign rep agreements contain safety measures to ensure that reps will not use the fees paid as bribes:  Agreements are only signed by the Group President of the applicable business unit after obtaining approval from the Chief Compliance Officer  The fee is only paid after a contract is awarded to CAE  The fee is paid to a bank account with the rep’s name using the project milestones  The fee amount is calculated based on the services provided  Reps go through anti-corruption training and sign anti-corruption certifications prior to being hired  Rep agreements are only valid for one year, and if they are to be renewed, the rep must undergo the above process upon renewal Justification Interview Due Diligence Training and Certification Agreement
  • 8. 8 Business Courtesies  Business courtesies help corporations develop and maintain relationships with customers. However, it is important to understand the rules concerning the exchange of business courtesies in order to avoid misconduct and the risk of unauthorized payments.  A business courtesy is deemed unacceptable when it is:  Money or a cash equivalent  Requested by recipient  Extravagant and luxurious  Exchanged with the same party multiple times a year  Provided solely to a spouse or close relative  In CAE’s Anti-Corruption Policy, there are spending limits attributed to business courtesies. These limits vary depending on what the purpose is, who the recipient is and in what country the business courtesy is being exchanged.
  • 9. 9 Prevention  To mitigate the risk of unauthorized payments, CAE requires employees to present proper justification before using company funds. There has to be a detailed and valid explanation for the use as well as prior approval from the employee’s supervisor and the Finance department.  In addition, CAE’s Internal Audit and the Compliance Office conduct regular audits and risk assessments of areas that could potentially be compromised, such as employee spending or fees paid to third parties.  Our Anti-Corruption Policy and related processes are subject to continuous improvement in order to adapt to the everchanging landscape.  CAE’s Political and Charitable Contributions Policy prohibits employees from making any political donations in CAE’s name, and all charitable contributions must be made by the Global Communications department.
  • 10. 10 Red Flags  Here are some of the red flags to watch out for:  Country has a reputation for corruption  Signs of collusion between suppliers and customers  Third parties requesting gifts or cash payments  Excessive or lavish expenses incurred  Frequent complaints about an individual or party  Although these alone are sometimes not enough to make deductions, they are a signal that prompts us to investigate further.
  • 11. 11 Management Tone  At CAE, our CEO, as well as all the executive management committee are continuously vocal about the importance of ethical conduct.  The Chief Compliance Officer reports monthly to the management committee on all compliance matters and reports quarterly to the Board of Directors.  CAE is also a member of the UNGC in support of social responsibility and ethical practices.
  • 12. 12 Training  Employees are required to go through the online Anti- Corruption training annually.  In addition to online training, the Compliance Office conducts live training to several departments. This training would be customized based on the activities of each department.  In addition, employees are required to annually certify to the Code of Conduct.  An anti-corruption manual is distributed to employees for a quick reference on policy requirements.
  • 13. 13 Whistleblowing  CAE’s Whistleblower Policy encourages employees to report any suspicious activities that they may witness. Under this Policy, CAE is not allowed to retaliate against any whistleblower.  EthicsPoint is an anonymous reporting tool that CAE offers to its employees.