SlideShare a Scribd company logo
Navigating the expanding
e-communications compliance perimeter
Ken Anderson
Vice President, Marketing
Today’s discussion items
Technology &
compliance at
a crossroads
The
landscape:
How are firms
managing?
The path
forward
2
Every 60 seconds on the Web
Compare 2013 to 2015:
• Email
• WordPress
• Twitter
3
www.smartinsights.com
+12%
+48%
+51%
Proliferation of content in regulated industries
2000 2016
The diversity and complexity of
electronic communications being
used continues to grow year over year
4
EMAIL
IM
SOCIAL
WEB
MOBILE
FILES
VIDEOS
VOICE/AUDIO
Regulatory oversight, today and tomorrow
5
• FCA Final Guidance 15/4
Social Media & Customer
Communications (2015)
• The Markets in Financial
Instruments (MiFID) II (Jan. 2018)
Expanded governance & intensified scrutiny
• Records of all electronic communications and telephone
calls (fixed and mobile) retained for minimum of 5 years.
• Includes not just communications that conclude in a
trade, but all those calls and communications that are
intended to conclude in a trade.
• Electronic communications and telephone calls on both
privately owned and firm issued equipment need to be
retained, for both permanent and contracting staff.
Source: MiFID II Directive 2014/65/EU Article 16 (7)
7
You need to be prepared to produce records:
• Email
• Phone call logs/recordings
• Instant message platforms
• Website content
• Mobile/text messaging
• Enterprise & personal social platforms
• Collaboration tools/files
The time of maximum need
69%
39% 36% 36%
25% 25%
0%
20%
40%
60%
80%
Most Common Electronic Message Types
Requested During Last Regulatory
Examination
Source: 2015 UK Compliance Survey
7
The
Landscape:
How Are
Firms
Managing?
8
How are firms managing?
The 2015 Electronic
Communications Compliance
Survey Report
9
Allowance of social channels
has grown in financial firms…
Source: Smarsh Annual Compliance Surveys
(US FinServ orgs)
But a significant compliance
gap exists.
of US firms that permit
social do not have retention/
supervision in place.
39%
10
Compliance beyond email
UK compliance gaps
Graphic mage
(with white background)
goes here
UK firms recognise value of social media,
allowing use for business
communication
of UK firms that permit social
do not have retention/
supervision in place.
73%
11
• LinkedIn
• Twitter
• Mobile
~60%
60%
56%
Some observations on US vs. UK
12
"...a member firm's obligations to supervise electronic
communications are based on the content and audience of the
message, rather than the electronic form of the communication.
Consequently...FINRA expects a firm to have supervisory policies and
procedures to monitor all electronic communications technology
used by the firm and its associated persons to conduct the firm's
business. To that end, a firm should consider, prior to implementing
new or different methods of communication, the impact on the
firm's supervisory system, particularly any updates or changes to the
firm's supervisory policies and procedures that might be necessary.”
FINRA Notice to Members 07-59, Dec. 2007
Timeline of US social regulatory scrutiny
13
Jan. 2010 Aug. 2011
FINRA Regulatory Notice
10-06
Guidance on Blogs and
Social Networking
Websites
Jan. 2012
FINRA Regulatory Notice
11-39
Social Media Websites
and the use of Personal
Devices for Business
Communications
SEC National Examination
Risk Alert
Investment Adviser Use of
Social Media
July 2011
FINRA Quarterly Report of
Disciplinary Cases
: “…former rep of a Texas
firm is serving a one-year
suspension for a series of
violations, including failure
to inform her firm's principal
that she had a Twitter
account and sending more
than 30 tweets about
securities.”
The path
forward
14
Challenge: Bringing order to the chaos
15
The good news: you can…
use the latest digital
marketing apps and
channels AND stay
compliant.
16
Stakeholder alignment in action
The Challenge
• Social organisation with an active adviser community
• FCA FG15/4 social media compliance
• Key driver: “Compliant business enablement”
• More communications empowerment = more business
productivity
• Preparation for MiFID II
Email, Bloomberg IM, Chatter, Corporate Twitter
page, Corporate Facebook page, SLACK
17
Best Practices
Implement reasonable policies and procedures
STEP 2. Staff training
STEP 3. Technology for enforcement of retention/policy
Search Policies
Cases Admin
STEP 1
STEP 2
STEP 3
18
Step 1: Implement polices & procedures
• Extend policies to encompass more
than email
• Policies need to address…
• Regularly review and add up-to-
date regulatory guidance to your
policies
19
Step 2: Training
• Understand and document training
• Identify and deputise your SMEs
• Pre-approval vs. supervision/post-
review on social
20
Step 3: Retention & enforcement technology
21
MichaelSam
Matt
Eric
Jane• Broad range of content types
and versions across email, IM,
social, mobile, files and web
• Cloud-based or on-prem?
• Policy-driven compliance and
supervision
• Immutable retention
Comprehensive Archive Platform
• Ease the burden of monitoring
content across multiple channels
• Enable powerful search and case
management
• Implement retention policies so
content is stored as long as needed
• Apply legal holds to support
investigations or discovery events
A comprehensive archiving solution will…
22
• Enforce your firm’s established
policies
• Automatically flag risky content
• Help you quickly take action and
remediate policy violations
• Provide an audit trail of all actions
taken incl. corrective actions
A comprehensive archiving solution will…
23
Resources for your journey
Read at:
www.smarsh.com/whitepap
ers/uk-fca-social-media-
guidance-best-practices-for-
recordkeeping/
Read at:
www.smarsh.com/whitepap
ers/uk-preparing-for-MiFID-
II-and-MiFIR-recordkeeping
24
Questions?
Thank you
Regulatory landscape
MIFID II Directive: firms must be in a position
to archive, supervise and disclose all their
electronic communications, including
telephone calls (fixed and mobile), from any
device, personal and business.
Financial Conduct Authority
Final Guidance 15/4 Social Media & Customer
communications
European Commission
JANUARY 3rd 2018 MARCH 2015
• Recordkeeping Minimum 5 years
• All-inclusive Not just communications that
conclude in a trade, but all
intended to conclude in a trade
• Recordkeeping Social media platforms
themselves not sanctioned
• Expansive Rules Governing supervision and
retention of social media
communications
Increasing Governance Challenges
• Variety Communications data generated by variety of apps, sources
and devices
• Volume Integration/API complexity
• Authenticity Maintaining context e.g. social media is commonly multifaceted;
Twitter post contain link to YouTube video
• Complexity Public social media archiving encompasses three different
approaches Portal Access, Proxy, API
Public social content: Facebook, LinkedIn, Twitter.
Business social content: Google Talk, Microsoft Yammer,
Salesforce Chatter. Websites. Text messages.
Messaging content types beyond email gaining regulatory scrutiny
The Challenges IT Challenges
Supported
content types
Email VideoSocial WebMobile Audio Files
Search Policies
Cases Admin
Core Platform Features
IM
22

More Related Content

What's hot

Solving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial ServicesSolving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial Services
Echoworx
 
2016 cost of data breach study brasil
2016 cost of data breach study   brasil2016 cost of data breach study   brasil
2016 cost of data breach study brasil
João Rufino de Sales
 
ACEDS-ACFCS Cybersecurity Webcast
ACEDS-ACFCS Cybersecurity WebcastACEDS-ACFCS Cybersecurity Webcast
ACEDS-ACFCS Cybersecurity Webcast
Logikcull.com
 
Anti-Bribery Forensics and Compliance on a Multi-National Scale: Challenges a...
Anti-Bribery Forensics and Compliance on a Multi-National Scale: Challenges a...Anti-Bribery Forensics and Compliance on a Multi-National Scale: Challenges a...
Anti-Bribery Forensics and Compliance on a Multi-National Scale: Challenges a...
PECB
 
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
BDO_Consulting
 
Web and Social Media Archiving: A Growing Necessity For the Financial Industry
Web and Social Media Archiving: A Growing Necessity For the Financial IndustryWeb and Social Media Archiving: A Growing Necessity For the Financial Industry
Web and Social Media Archiving: A Growing Necessity For the Financial Industry
PageFreezer
 
Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Adriana Sanford
 
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSAUS Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
TrustArc
 
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance ServiceTBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance Servicegorsline
 
Emerging Privacy Themes That Will Impact Your Company
Emerging Privacy Themes That Will Impact Your CompanyEmerging Privacy Themes That Will Impact Your Company
Emerging Privacy Themes That Will Impact Your Company
IAB Canada
 
Driving Payments Security and Efficiency During COVID 19
Driving Payments Security and Efficiency During COVID 19 Driving Payments Security and Efficiency During COVID 19
Driving Payments Security and Efficiency During COVID 19
Kyriba Corporation
 
(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice
MyCase Legal Case and Practice Management Software
 
Edward Claughton Records Management
Edward Claughton Records ManagementEdward Claughton Records Management
Edward Claughton Records Management
Edward Claughton
 
KPMG Publish and Be Damned Cyber Vulnerability Index 2012
KPMG Publish and Be Damned Cyber Vulnerability Index 2012KPMG Publish and Be Damned Cyber Vulnerability Index 2012
KPMG Publish and Be Damned Cyber Vulnerability Index 2012Charmaine Servado
 
Verizon DBIR 2021
Verizon DBIR 2021Verizon DBIR 2021
Verizon DBIR 2021
SOCRadar Inc
 
Ethics for Lawyers, Accountants, and CTFAs - May 2018
Ethics for Lawyers, Accountants, and CTFAs - May 2018Ethics for Lawyers, Accountants, and CTFAs - May 2018
Ethics for Lawyers, Accountants, and CTFAs - May 2018
Downey Law Group LLC
 
Verizon's DBIR-A look into each industry
Verizon's DBIR-A look into each industryVerizon's DBIR-A look into each industry
Verizon's DBIR-A look into each industry
SOCRadar Inc
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data Breach
Jon Gatrell
 
The Evolution of Data Privacy: 3 Things You Need To Consider
The Evolution of Data Privacy:  3 Things You Need To ConsiderThe Evolution of Data Privacy:  3 Things You Need To Consider
The Evolution of Data Privacy: 3 Things You Need To Consider
Symantec
 

What's hot (20)

Solving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial ServicesSolving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial Services
 
2016 cost of data breach study brasil
2016 cost of data breach study   brasil2016 cost of data breach study   brasil
2016 cost of data breach study brasil
 
Cyber Facts and Prevention Presentation Gianino
Cyber Facts and Prevention Presentation GianinoCyber Facts and Prevention Presentation Gianino
Cyber Facts and Prevention Presentation Gianino
 
ACEDS-ACFCS Cybersecurity Webcast
ACEDS-ACFCS Cybersecurity WebcastACEDS-ACFCS Cybersecurity Webcast
ACEDS-ACFCS Cybersecurity Webcast
 
Anti-Bribery Forensics and Compliance on a Multi-National Scale: Challenges a...
Anti-Bribery Forensics and Compliance on a Multi-National Scale: Challenges a...Anti-Bribery Forensics and Compliance on a Multi-National Scale: Challenges a...
Anti-Bribery Forensics and Compliance on a Multi-National Scale: Challenges a...
 
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
 
Web and Social Media Archiving: A Growing Necessity For the Financial Industry
Web and Social Media Archiving: A Growing Necessity For the Financial IndustryWeb and Social Media Archiving: A Growing Necessity For the Financial Industry
Web and Social Media Archiving: A Growing Necessity For the Financial Industry
 
Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014
 
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSAUS Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
 
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance ServiceTBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
 
Emerging Privacy Themes That Will Impact Your Company
Emerging Privacy Themes That Will Impact Your CompanyEmerging Privacy Themes That Will Impact Your Company
Emerging Privacy Themes That Will Impact Your Company
 
Driving Payments Security and Efficiency During COVID 19
Driving Payments Security and Efficiency During COVID 19 Driving Payments Security and Efficiency During COVID 19
Driving Payments Security and Efficiency During COVID 19
 
(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice
 
Edward Claughton Records Management
Edward Claughton Records ManagementEdward Claughton Records Management
Edward Claughton Records Management
 
KPMG Publish and Be Damned Cyber Vulnerability Index 2012
KPMG Publish and Be Damned Cyber Vulnerability Index 2012KPMG Publish and Be Damned Cyber Vulnerability Index 2012
KPMG Publish and Be Damned Cyber Vulnerability Index 2012
 
Verizon DBIR 2021
Verizon DBIR 2021Verizon DBIR 2021
Verizon DBIR 2021
 
Ethics for Lawyers, Accountants, and CTFAs - May 2018
Ethics for Lawyers, Accountants, and CTFAs - May 2018Ethics for Lawyers, Accountants, and CTFAs - May 2018
Ethics for Lawyers, Accountants, and CTFAs - May 2018
 
Verizon's DBIR-A look into each industry
Verizon's DBIR-A look into each industryVerizon's DBIR-A look into each industry
Verizon's DBIR-A look into each industry
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data Breach
 
The Evolution of Data Privacy: 3 Things You Need To Consider
The Evolution of Data Privacy:  3 Things You Need To ConsiderThe Evolution of Data Privacy:  3 Things You Need To Consider
The Evolution of Data Privacy: 3 Things You Need To Consider
 

Viewers also liked

Buenas practicas en la Industria de la Construcción
Buenas practicas en la Industria de la ConstrucciónBuenas practicas en la Industria de la Construcción
Buenas practicas en la Industria de la Construcción
Jose Luis Hernandez
 
Wastek Teknologi (1)
Wastek Teknologi (1)Wastek Teknologi (1)
Wastek Teknologi (1)
Tedi Eka
 
Health in America and the World
Health in America and the WorldHealth in America and the World
Health in America and the WorldJohn Grant
 
Новогодний шар из текстиля
Новогодний шар из текстиляНовогодний шар из текстиля
Новогодний шар из текстиля
Olga-st
 
Ch 41 erosion and sediment control plans
Ch 41   erosion and sediment control plansCh 41   erosion and sediment control plans
Ch 41 erosion and sediment control plans
Fuad Chiwa
 
5.03 ppt safe clean envrionment
5.03 ppt safe clean envrionment5.03 ppt safe clean envrionment
5.03 ppt safe clean envrionmentmelodiekernahan
 
Dear Mr. Kilmer
Dear Mr. KilmerDear Mr. Kilmer
Dear Mr. Kilmer
Sharuliza Saad
 
Professional Pilot November 2016
Professional Pilot November 2016Professional Pilot November 2016
Professional Pilot November 2016Alain Mussely
 
Ulasalle
UlasalleUlasalle
Ulasalle
Druiko
 
Charpy
CharpyCharpy
Charpy
ingorroc
 
Jms using j boss
Jms using j bossJms using j boss
Jms using j boss
Skillwise Group
 
Ch6project analysis
Ch6project analysisCh6project analysis
Ch6project analysis
Nisarg Shah
 
Silabus bhs inggris wajib kls 11
Silabus bhs inggris wajib kls 11Silabus bhs inggris wajib kls 11
Silabus bhs inggris wajib kls 11
SMA Negeri 9 KERINCI
 
Massa Udara dan Siklontropis
Massa Udara dan SiklontropisMassa Udara dan Siklontropis
Massa Udara dan Siklontropis
Tedi Eka
 
Wordpress 2
Wordpress 2Wordpress 2
Wordpress 2
José Mascate
 
Detection of and Response to Online Users' Emotion
Detection of and Response to Online Users' EmotionDetection of and Response to Online Users' Emotion
Detection of and Response to Online Users' Emotion
Beverly Park Woolf
 
Hukum Keluarga dalam Tafsir Adhwa' al-Bayan
Hukum Keluarga dalam Tafsir Adhwa' al-BayanHukum Keluarga dalam Tafsir Adhwa' al-Bayan
Hukum Keluarga dalam Tafsir Adhwa' al-BayanMuhammad Nashiruddin
 
Mukjizat Nabi Muhammad SAW dan Penafian Terhadap Dakwaan Orientalis
Mukjizat Nabi Muhammad SAW dan Penafian Terhadap Dakwaan OrientalisMukjizat Nabi Muhammad SAW dan Penafian Terhadap Dakwaan Orientalis
Mukjizat Nabi Muhammad SAW dan Penafian Terhadap Dakwaan Orientalis
Ezad Azraai Jamsari
 
Colecionando Arte e Cultura
Colecionando Arte e CulturaColecionando Arte e Cultura
Colecionando Arte e Cultura
David Cardoso
 

Viewers also liked (20)

Buenas practicas en la Industria de la Construcción
Buenas practicas en la Industria de la ConstrucciónBuenas practicas en la Industria de la Construcción
Buenas practicas en la Industria de la Construcción
 
Wastek Teknologi (1)
Wastek Teknologi (1)Wastek Teknologi (1)
Wastek Teknologi (1)
 
Health in America and the World
Health in America and the WorldHealth in America and the World
Health in America and the World
 
Новогодний шар из текстиля
Новогодний шар из текстиляНовогодний шар из текстиля
Новогодний шар из текстиля
 
Ch 41 erosion and sediment control plans
Ch 41   erosion and sediment control plansCh 41   erosion and sediment control plans
Ch 41 erosion and sediment control plans
 
5.03 ppt safe clean envrionment
5.03 ppt safe clean envrionment5.03 ppt safe clean envrionment
5.03 ppt safe clean envrionment
 
Dear Mr. Kilmer
Dear Mr. KilmerDear Mr. Kilmer
Dear Mr. Kilmer
 
Professional Pilot November 2016
Professional Pilot November 2016Professional Pilot November 2016
Professional Pilot November 2016
 
Ulasalle
UlasalleUlasalle
Ulasalle
 
Charpy
CharpyCharpy
Charpy
 
Jms using j boss
Jms using j bossJms using j boss
Jms using j boss
 
Ch6project analysis
Ch6project analysisCh6project analysis
Ch6project analysis
 
Silabus bhs inggris wajib kls 11
Silabus bhs inggris wajib kls 11Silabus bhs inggris wajib kls 11
Silabus bhs inggris wajib kls 11
 
Massa Udara dan Siklontropis
Massa Udara dan SiklontropisMassa Udara dan Siklontropis
Massa Udara dan Siklontropis
 
Wordpress 2
Wordpress 2Wordpress 2
Wordpress 2
 
Detection of and Response to Online Users' Emotion
Detection of and Response to Online Users' EmotionDetection of and Response to Online Users' Emotion
Detection of and Response to Online Users' Emotion
 
Ashutosh rubber-pvt-ltd
Ashutosh rubber-pvt-ltdAshutosh rubber-pvt-ltd
Ashutosh rubber-pvt-ltd
 
Hukum Keluarga dalam Tafsir Adhwa' al-Bayan
Hukum Keluarga dalam Tafsir Adhwa' al-BayanHukum Keluarga dalam Tafsir Adhwa' al-Bayan
Hukum Keluarga dalam Tafsir Adhwa' al-Bayan
 
Mukjizat Nabi Muhammad SAW dan Penafian Terhadap Dakwaan Orientalis
Mukjizat Nabi Muhammad SAW dan Penafian Terhadap Dakwaan OrientalisMukjizat Nabi Muhammad SAW dan Penafian Terhadap Dakwaan Orientalis
Mukjizat Nabi Muhammad SAW dan Penafian Terhadap Dakwaan Orientalis
 
Colecionando Arte e Cultura
Colecionando Arte e CulturaColecionando Arte e Cultura
Colecionando Arte e Cultura
 

Similar to Navigating the expanding compliance perimeter smarsh 2016_notes_20 04 16_video

Smarsh social media in investment banking
Smarsh social media in investment bankingSmarsh social media in investment banking
Smarsh social media in investment banking
Smarsh
 
The Fund Industry Goes Social Webinar
The Fund Industry Goes Social WebinarThe Fund Industry Goes Social Webinar
The Fund Industry Goes Social Webinar
NICSA
 
Social media risks guide
Social media risks guideSocial media risks guide
Social media risks guide
AstalapulosListestos
 
Tim Willoughby - Presentation to Innovation Masters 2016
Tim Willoughby - Presentation to Innovation Masters 2016Tim Willoughby - Presentation to Innovation Masters 2016
Tim Willoughby - Presentation to Innovation Masters 2016
Tim Willoughby
 
Advanced Solutions For Website Compliance
Advanced Solutions For Website ComplianceAdvanced Solutions For Website Compliance
Advanced Solutions For Website Compliance
ADA Site Compliance
 
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
Business Development Institute
 
Government Policy Needs in a Web 2.0 World
Government Policy Needs in a Web 2.0 WorldGovernment Policy Needs in a Web 2.0 World
Government Policy Needs in a Web 2.0 World
Franciel
 
Webinar - 8 ways to align IT to your business
Webinar - 8 ways to align IT to your businessWebinar - 8 ways to align IT to your business
Webinar - 8 ways to align IT to your business
ManageEngine
 
Mobility innovation and unknowns
Mobility innovation and unknownsMobility innovation and unknowns
Mobility innovation and unknowns
Lisa Marie Martinez
 
Conference Paper at International Conference on Enterprise Information System...
Conference Paper at International Conference on Enterprise Information System...Conference Paper at International Conference on Enterprise Information System...
Conference Paper at International Conference on Enterprise Information System...
Malaysia University of Science and Technology (MUST)
 
Presentation on the Proposed Technology-related Revisions to the Code
Presentation on the Proposed Technology-related Revisions to the CodePresentation on the Proposed Technology-related Revisions to the Code
Presentation on the Proposed Technology-related Revisions to the Code
International Federation of Accountants
 
David Chung, ING Presentation - BDI 2/23/12 Social Media in Wealth Management...
David Chung, ING Presentation - BDI 2/23/12 Social Media in Wealth Management...David Chung, ING Presentation - BDI 2/23/12 Social Media in Wealth Management...
David Chung, ING Presentation - BDI 2/23/12 Social Media in Wealth Management...
Business Development Institute
 
Leading Change in Financial Services
Leading Change in Financial ServicesLeading Change in Financial Services
Leading Change in Financial Services
NICSA
 
Secure and Compliant Data Management in FinTech Applications
Secure and Compliant Data Management in FinTech ApplicationsSecure and Compliant Data Management in FinTech Applications
Secure and Compliant Data Management in FinTech Applications
Lionel Briand
 
eDem&eGov 2013
eDem&eGov 2013eDem&eGov 2013
eDem&eGov 2013
Denys A. Flores, PhD
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
Jim Kaplan CIA CFE
 
S2P1_Vijay_Mauree_V2.pptx
S2P1_Vijay_Mauree_V2.pptxS2P1_Vijay_Mauree_V2.pptx
S2P1_Vijay_Mauree_V2.pptx
dikshitapusam
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
The Role of Information and Communication Technologies (57)
The Role of Information and Communication Technologies (57)The Role of Information and Communication Technologies (57)
The Role of Information and Communication Technologies (57)
Arab Federation for Digital Economy
 
GDPR - The road to implementation - Colin Day
GDPR - The road to implementation - Colin DayGDPR - The road to implementation - Colin Day
GDPR - The road to implementation - Colin Day
B2B Marketing Forum
 

Similar to Navigating the expanding compliance perimeter smarsh 2016_notes_20 04 16_video (20)

Smarsh social media in investment banking
Smarsh social media in investment bankingSmarsh social media in investment banking
Smarsh social media in investment banking
 
The Fund Industry Goes Social Webinar
The Fund Industry Goes Social WebinarThe Fund Industry Goes Social Webinar
The Fund Industry Goes Social Webinar
 
Social media risks guide
Social media risks guideSocial media risks guide
Social media risks guide
 
Tim Willoughby - Presentation to Innovation Masters 2016
Tim Willoughby - Presentation to Innovation Masters 2016Tim Willoughby - Presentation to Innovation Masters 2016
Tim Willoughby - Presentation to Innovation Masters 2016
 
Advanced Solutions For Website Compliance
Advanced Solutions For Website ComplianceAdvanced Solutions For Website Compliance
Advanced Solutions For Website Compliance
 
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
 
Government Policy Needs in a Web 2.0 World
Government Policy Needs in a Web 2.0 WorldGovernment Policy Needs in a Web 2.0 World
Government Policy Needs in a Web 2.0 World
 
Webinar - 8 ways to align IT to your business
Webinar - 8 ways to align IT to your businessWebinar - 8 ways to align IT to your business
Webinar - 8 ways to align IT to your business
 
Mobility innovation and unknowns
Mobility innovation and unknownsMobility innovation and unknowns
Mobility innovation and unknowns
 
Conference Paper at International Conference on Enterprise Information System...
Conference Paper at International Conference on Enterprise Information System...Conference Paper at International Conference on Enterprise Information System...
Conference Paper at International Conference on Enterprise Information System...
 
Presentation on the Proposed Technology-related Revisions to the Code
Presentation on the Proposed Technology-related Revisions to the CodePresentation on the Proposed Technology-related Revisions to the Code
Presentation on the Proposed Technology-related Revisions to the Code
 
David Chung, ING Presentation - BDI 2/23/12 Social Media in Wealth Management...
David Chung, ING Presentation - BDI 2/23/12 Social Media in Wealth Management...David Chung, ING Presentation - BDI 2/23/12 Social Media in Wealth Management...
David Chung, ING Presentation - BDI 2/23/12 Social Media in Wealth Management...
 
Leading Change in Financial Services
Leading Change in Financial ServicesLeading Change in Financial Services
Leading Change in Financial Services
 
Secure and Compliant Data Management in FinTech Applications
Secure and Compliant Data Management in FinTech ApplicationsSecure and Compliant Data Management in FinTech Applications
Secure and Compliant Data Management in FinTech Applications
 
eDem&eGov 2013
eDem&eGov 2013eDem&eGov 2013
eDem&eGov 2013
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
 
S2P1_Vijay_Mauree_V2.pptx
S2P1_Vijay_Mauree_V2.pptxS2P1_Vijay_Mauree_V2.pptx
S2P1_Vijay_Mauree_V2.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
The Role of Information and Communication Technologies (57)
The Role of Information and Communication Technologies (57)The Role of Information and Communication Technologies (57)
The Role of Information and Communication Technologies (57)
 
GDPR - The road to implementation - Colin Day
GDPR - The road to implementation - Colin DayGDPR - The road to implementation - Colin Day
GDPR - The road to implementation - Colin Day
 

More from Smarsh

Social Media Policy Essentials for Lenders and Brokers
Social Media Policy Essentials for Lenders and BrokersSocial Media Policy Essentials for Lenders and Brokers
Social Media Policy Essentials for Lenders and Brokers
Smarsh
 
Social Media and Mortgage Regulation: What's Next?
Social Media and Mortgage Regulation: What's Next?Social Media and Mortgage Regulation: What's Next?
Social Media and Mortgage Regulation: What's Next?
Smarsh
 
Solving Compliance Issues for Office365/Exchange Online Environments
Solving Compliance Issues for Office365/Exchange Online EnvironmentsSolving Compliance Issues for Office365/Exchange Online Environments
Solving Compliance Issues for Office365/Exchange Online Environments
Smarsh
 
Social Media for Lenders Webinar featuring Lee Negroni
Social Media for Lenders Webinar featuring Lee NegroniSocial Media for Lenders Webinar featuring Lee Negroni
Social Media for Lenders Webinar featuring Lee Negroni
Smarsh
 
The Regulatory Landscape: Recordkeeping, Advertising, and Social Media
The Regulatory Landscape: Recordkeeping, Advertising, and Social MediaThe Regulatory Landscape: Recordkeeping, Advertising, and Social Media
The Regulatory Landscape: Recordkeeping, Advertising, and Social Media
Smarsh
 
ValMark Chooses Smarsh to Archive for Compliance and E-Discovery
ValMark Chooses Smarsh to Archive for Compliance and E-DiscoveryValMark Chooses Smarsh to Archive for Compliance and E-Discovery
ValMark Chooses Smarsh to Archive for Compliance and E-Discovery
Smarsh
 
Financial Advisor's Guide To Social Media Policy and Strategy
Financial Advisor's Guide To Social Media Policy and StrategyFinancial Advisor's Guide To Social Media Policy and Strategy
Financial Advisor's Guide To Social Media Policy and StrategySmarsh
 
The Social Advisor : Social Media Secrets for Savvy Advisors
The Social Advisor : Social Media Secrets for Savvy AdvisorsThe Social Advisor : Social Media Secrets for Savvy Advisors
The Social Advisor : Social Media Secrets for Savvy Advisors
Smarsh
 
Successful Social Media for Mortgage Lenders: Engage With Your Audience While...
Successful Social Media for Mortgage Lenders: Engage With Your Audience While...Successful Social Media for Mortgage Lenders: Engage With Your Audience While...
Successful Social Media for Mortgage Lenders: Engage With Your Audience While...
Smarsh
 
Social Media for Advisors: Use Storytelling to Create Content
Social Media for Advisors: Use Storytelling to Create ContentSocial Media for Advisors: Use Storytelling to Create Content
Social Media for Advisors: Use Storytelling to Create Content
Smarsh
 
Social Media for Advisors: Is Anyone Listening?
Social Media for Advisors: Is Anyone Listening?Social Media for Advisors: Is Anyone Listening?
Social Media for Advisors: Is Anyone Listening?
Smarsh
 
Heron Financial Grows Business with Social Media
Heron Financial Grows Business with Social Media Heron Financial Grows Business with Social Media
Heron Financial Grows Business with Social Media
Smarsh
 
Social Media for Advisors: Understand your Audience Understand your Platform
Social Media for Advisors: Understand your Audience Understand your PlatformSocial Media for Advisors: Understand your Audience Understand your Platform
Social Media for Advisors: Understand your Audience Understand your Platform
Smarsh
 
3 Ways to Accelerate Social Selling for Regulated Organizations
3 Ways to Accelerate Social Selling for Regulated Organizations3 Ways to Accelerate Social Selling for Regulated Organizations
3 Ways to Accelerate Social Selling for Regulated Organizations
Smarsh
 
Value proposition and social media voice
Value proposition and social media voiceValue proposition and social media voice
Value proposition and social media voice
Smarsh
 
Smarsh Presents The Real Business Value of Social Media
Smarsh Presents The Real Business Value of Social MediaSmarsh Presents The Real Business Value of Social Media
Smarsh Presents The Real Business Value of Social Media
Smarsh
 
Smarsh Archiving for Financial Services: Retaining and supervising electronic...
Smarsh Archiving for Financial Services: Retaining and supervising electronic...Smarsh Archiving for Financial Services: Retaining and supervising electronic...
Smarsh Archiving for Financial Services: Retaining and supervising electronic...
Smarsh
 
Managing Digital Communications in a Big Data World Presented by Smarsh VP, R...
Managing Digital Communications in a Big Data World Presented by Smarsh VP, R...Managing Digital Communications in a Big Data World Presented by Smarsh VP, R...
Managing Digital Communications in a Big Data World Presented by Smarsh VP, R...
Smarsh
 
Enterprise Social: Fad or Foundational?
Enterprise Social: Fad or Foundational? Enterprise Social: Fad or Foundational?
Enterprise Social: Fad or Foundational?
Smarsh
 
RIA Roadshow - Electronic Communications Compliance for Investment Advisors
RIA Roadshow - Electronic Communications Compliance for Investment AdvisorsRIA Roadshow - Electronic Communications Compliance for Investment Advisors
RIA Roadshow - Electronic Communications Compliance for Investment Advisors
Smarsh
 

More from Smarsh (20)

Social Media Policy Essentials for Lenders and Brokers
Social Media Policy Essentials for Lenders and BrokersSocial Media Policy Essentials for Lenders and Brokers
Social Media Policy Essentials for Lenders and Brokers
 
Social Media and Mortgage Regulation: What's Next?
Social Media and Mortgage Regulation: What's Next?Social Media and Mortgage Regulation: What's Next?
Social Media and Mortgage Regulation: What's Next?
 
Solving Compliance Issues for Office365/Exchange Online Environments
Solving Compliance Issues for Office365/Exchange Online EnvironmentsSolving Compliance Issues for Office365/Exchange Online Environments
Solving Compliance Issues for Office365/Exchange Online Environments
 
Social Media for Lenders Webinar featuring Lee Negroni
Social Media for Lenders Webinar featuring Lee NegroniSocial Media for Lenders Webinar featuring Lee Negroni
Social Media for Lenders Webinar featuring Lee Negroni
 
The Regulatory Landscape: Recordkeeping, Advertising, and Social Media
The Regulatory Landscape: Recordkeeping, Advertising, and Social MediaThe Regulatory Landscape: Recordkeeping, Advertising, and Social Media
The Regulatory Landscape: Recordkeeping, Advertising, and Social Media
 
ValMark Chooses Smarsh to Archive for Compliance and E-Discovery
ValMark Chooses Smarsh to Archive for Compliance and E-DiscoveryValMark Chooses Smarsh to Archive for Compliance and E-Discovery
ValMark Chooses Smarsh to Archive for Compliance and E-Discovery
 
Financial Advisor's Guide To Social Media Policy and Strategy
Financial Advisor's Guide To Social Media Policy and StrategyFinancial Advisor's Guide To Social Media Policy and Strategy
Financial Advisor's Guide To Social Media Policy and Strategy
 
The Social Advisor : Social Media Secrets for Savvy Advisors
The Social Advisor : Social Media Secrets for Savvy AdvisorsThe Social Advisor : Social Media Secrets for Savvy Advisors
The Social Advisor : Social Media Secrets for Savvy Advisors
 
Successful Social Media for Mortgage Lenders: Engage With Your Audience While...
Successful Social Media for Mortgage Lenders: Engage With Your Audience While...Successful Social Media for Mortgage Lenders: Engage With Your Audience While...
Successful Social Media for Mortgage Lenders: Engage With Your Audience While...
 
Social Media for Advisors: Use Storytelling to Create Content
Social Media for Advisors: Use Storytelling to Create ContentSocial Media for Advisors: Use Storytelling to Create Content
Social Media for Advisors: Use Storytelling to Create Content
 
Social Media for Advisors: Is Anyone Listening?
Social Media for Advisors: Is Anyone Listening?Social Media for Advisors: Is Anyone Listening?
Social Media for Advisors: Is Anyone Listening?
 
Heron Financial Grows Business with Social Media
Heron Financial Grows Business with Social Media Heron Financial Grows Business with Social Media
Heron Financial Grows Business with Social Media
 
Social Media for Advisors: Understand your Audience Understand your Platform
Social Media for Advisors: Understand your Audience Understand your PlatformSocial Media for Advisors: Understand your Audience Understand your Platform
Social Media for Advisors: Understand your Audience Understand your Platform
 
3 Ways to Accelerate Social Selling for Regulated Organizations
3 Ways to Accelerate Social Selling for Regulated Organizations3 Ways to Accelerate Social Selling for Regulated Organizations
3 Ways to Accelerate Social Selling for Regulated Organizations
 
Value proposition and social media voice
Value proposition and social media voiceValue proposition and social media voice
Value proposition and social media voice
 
Smarsh Presents The Real Business Value of Social Media
Smarsh Presents The Real Business Value of Social MediaSmarsh Presents The Real Business Value of Social Media
Smarsh Presents The Real Business Value of Social Media
 
Smarsh Archiving for Financial Services: Retaining and supervising electronic...
Smarsh Archiving for Financial Services: Retaining and supervising electronic...Smarsh Archiving for Financial Services: Retaining and supervising electronic...
Smarsh Archiving for Financial Services: Retaining and supervising electronic...
 
Managing Digital Communications in a Big Data World Presented by Smarsh VP, R...
Managing Digital Communications in a Big Data World Presented by Smarsh VP, R...Managing Digital Communications in a Big Data World Presented by Smarsh VP, R...
Managing Digital Communications in a Big Data World Presented by Smarsh VP, R...
 
Enterprise Social: Fad or Foundational?
Enterprise Social: Fad or Foundational? Enterprise Social: Fad or Foundational?
Enterprise Social: Fad or Foundational?
 
RIA Roadshow - Electronic Communications Compliance for Investment Advisors
RIA Roadshow - Electronic Communications Compliance for Investment AdvisorsRIA Roadshow - Electronic Communications Compliance for Investment Advisors
RIA Roadshow - Electronic Communications Compliance for Investment Advisors
 

Recently uploaded

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 

Navigating the expanding compliance perimeter smarsh 2016_notes_20 04 16_video

  • 1. Navigating the expanding e-communications compliance perimeter Ken Anderson Vice President, Marketing
  • 2. Today’s discussion items Technology & compliance at a crossroads The landscape: How are firms managing? The path forward 2
  • 3. Every 60 seconds on the Web Compare 2013 to 2015: • Email • WordPress • Twitter 3 www.smartinsights.com +12% +48% +51%
  • 4. Proliferation of content in regulated industries 2000 2016 The diversity and complexity of electronic communications being used continues to grow year over year 4 EMAIL IM SOCIAL WEB MOBILE FILES VIDEOS VOICE/AUDIO
  • 5. Regulatory oversight, today and tomorrow 5 • FCA Final Guidance 15/4 Social Media & Customer Communications (2015) • The Markets in Financial Instruments (MiFID) II (Jan. 2018)
  • 6. Expanded governance & intensified scrutiny • Records of all electronic communications and telephone calls (fixed and mobile) retained for minimum of 5 years. • Includes not just communications that conclude in a trade, but all those calls and communications that are intended to conclude in a trade. • Electronic communications and telephone calls on both privately owned and firm issued equipment need to be retained, for both permanent and contracting staff. Source: MiFID II Directive 2014/65/EU Article 16 (7) 7
  • 7. You need to be prepared to produce records: • Email • Phone call logs/recordings • Instant message platforms • Website content • Mobile/text messaging • Enterprise & personal social platforms • Collaboration tools/files The time of maximum need 69% 39% 36% 36% 25% 25% 0% 20% 40% 60% 80% Most Common Electronic Message Types Requested During Last Regulatory Examination Source: 2015 UK Compliance Survey 7
  • 9. How are firms managing? The 2015 Electronic Communications Compliance Survey Report 9
  • 10. Allowance of social channels has grown in financial firms… Source: Smarsh Annual Compliance Surveys (US FinServ orgs) But a significant compliance gap exists. of US firms that permit social do not have retention/ supervision in place. 39% 10 Compliance beyond email
  • 11. UK compliance gaps Graphic mage (with white background) goes here UK firms recognise value of social media, allowing use for business communication of UK firms that permit social do not have retention/ supervision in place. 73% 11 • LinkedIn • Twitter • Mobile ~60% 60% 56%
  • 12. Some observations on US vs. UK 12 "...a member firm's obligations to supervise electronic communications are based on the content and audience of the message, rather than the electronic form of the communication. Consequently...FINRA expects a firm to have supervisory policies and procedures to monitor all electronic communications technology used by the firm and its associated persons to conduct the firm's business. To that end, a firm should consider, prior to implementing new or different methods of communication, the impact on the firm's supervisory system, particularly any updates or changes to the firm's supervisory policies and procedures that might be necessary.” FINRA Notice to Members 07-59, Dec. 2007
  • 13. Timeline of US social regulatory scrutiny 13 Jan. 2010 Aug. 2011 FINRA Regulatory Notice 10-06 Guidance on Blogs and Social Networking Websites Jan. 2012 FINRA Regulatory Notice 11-39 Social Media Websites and the use of Personal Devices for Business Communications SEC National Examination Risk Alert Investment Adviser Use of Social Media July 2011 FINRA Quarterly Report of Disciplinary Cases : “…former rep of a Texas firm is serving a one-year suspension for a series of violations, including failure to inform her firm's principal that she had a Twitter account and sending more than 30 tweets about securities.”
  • 15. Challenge: Bringing order to the chaos 15
  • 16. The good news: you can… use the latest digital marketing apps and channels AND stay compliant. 16
  • 17. Stakeholder alignment in action The Challenge • Social organisation with an active adviser community • FCA FG15/4 social media compliance • Key driver: “Compliant business enablement” • More communications empowerment = more business productivity • Preparation for MiFID II Email, Bloomberg IM, Chatter, Corporate Twitter page, Corporate Facebook page, SLACK 17
  • 18. Best Practices Implement reasonable policies and procedures STEP 2. Staff training STEP 3. Technology for enforcement of retention/policy Search Policies Cases Admin STEP 1 STEP 2 STEP 3 18
  • 19. Step 1: Implement polices & procedures • Extend policies to encompass more than email • Policies need to address… • Regularly review and add up-to- date regulatory guidance to your policies 19
  • 20. Step 2: Training • Understand and document training • Identify and deputise your SMEs • Pre-approval vs. supervision/post- review on social 20
  • 21. Step 3: Retention & enforcement technology 21 MichaelSam Matt Eric Jane• Broad range of content types and versions across email, IM, social, mobile, files and web • Cloud-based or on-prem? • Policy-driven compliance and supervision • Immutable retention Comprehensive Archive Platform
  • 22. • Ease the burden of monitoring content across multiple channels • Enable powerful search and case management • Implement retention policies so content is stored as long as needed • Apply legal holds to support investigations or discovery events A comprehensive archiving solution will… 22
  • 23. • Enforce your firm’s established policies • Automatically flag risky content • Help you quickly take action and remediate policy violations • Provide an audit trail of all actions taken incl. corrective actions A comprehensive archiving solution will… 23
  • 24. Resources for your journey Read at: www.smarsh.com/whitepap ers/uk-fca-social-media- guidance-best-practices-for- recordkeeping/ Read at: www.smarsh.com/whitepap ers/uk-preparing-for-MiFID- II-and-MiFIR-recordkeeping 24
  • 27. Regulatory landscape MIFID II Directive: firms must be in a position to archive, supervise and disclose all their electronic communications, including telephone calls (fixed and mobile), from any device, personal and business. Financial Conduct Authority Final Guidance 15/4 Social Media & Customer communications European Commission JANUARY 3rd 2018 MARCH 2015 • Recordkeeping Minimum 5 years • All-inclusive Not just communications that conclude in a trade, but all intended to conclude in a trade • Recordkeeping Social media platforms themselves not sanctioned • Expansive Rules Governing supervision and retention of social media communications
  • 28. Increasing Governance Challenges • Variety Communications data generated by variety of apps, sources and devices • Volume Integration/API complexity • Authenticity Maintaining context e.g. social media is commonly multifaceted; Twitter post contain link to YouTube video • Complexity Public social media archiving encompasses three different approaches Portal Access, Proxy, API Public social content: Facebook, LinkedIn, Twitter. Business social content: Google Talk, Microsoft Yammer, Salesforce Chatter. Websites. Text messages. Messaging content types beyond email gaining regulatory scrutiny The Challenges IT Challenges
  • 29. Supported content types Email VideoSocial WebMobile Audio Files Search Policies Cases Admin Core Platform Features IM 22