SlideShare a Scribd company logo
Outsourcing Strategy Risks
Outsourcing strategy is the process of determining whether or not to outsource and, if so, what
to outsource.
Outsourcing Selection Risks
Outsourcing selection is the process of finding and evaluating potential outsourcing partners.
Outsourcing Implementation Risks
Outsourcing implementation is where the relationship between outsourcing partners is defined
and established.
Outsourcing Management Risks
Outsourcing management is the monitoring and evolution of the ongoing relationship.
Future Trends in Outsourcing
The Supply Chain Consortium will examine more of the risks of outsourcing within specific
levels of the supply chain in the future. Already, the consortium has administered surveys to its
member companies on the outsourcing of transportation and distribution center (DC) operations.
Among the findings:
The use of service providers to perform operational functions presents various risks to financial
institutions. Some risks are inherent to the outsourced activity itself, whereas others are
introduced with the involvement of a service provider. If not managed effectively, the use of
service providers may expose financial institutions to risks that can result in regulatory action,
financial loss, litigation, and loss of reputation. Financial institutions should consider the
following risks before entering into and while managing outsourcing arrangements.
• Compliance risks arise when the services, products, or activities of a service provider fail to
comply with applicable U.S. laws and regulations.
• Concentration risks arise when outsourced services or products are provided by a limited
number of service providers or are concentrated in limited geographic locations.
• Reputational risks arise when actions or poor performance of a service provider causes the
public to form a negative opinion about a financial institution.
Country risks arise when a financial institution engages a foreign-based service provider,
exposing the institution to possible economic, social, and political conditions and events from the
country where the provider is located.
• Operational risks arise when a service provider exposes a financial institution to losses due to
inadequate or failed internal processes or systems or from external events and human error.
• Legal risks arise when a service provider exposes a financial institution to legal expenses and
possible lawsuits.
who should be held liable for any breaches that occur
The use of service providers does not relieve a financial institution's board of directors and
senior management of their responsibility to ensure that outsourced activities are conducted in a
safe-and-sound manner and in compliance with applicable laws and regulations. Policies
governing the use of service providers should be established and approved by the board of
directors, or an executive committee of the board. These policies should establish a service
provider risk management program that addresses risk assessments and due diligence, standards
for contract provisions and considerations, ongoing monitoring of service providers, and
business continuity and contingency planning. Senior management is responsible for ensuring
that board-approved policies for the use of service providers are appropriately executed. This
includes overseeing the development and implementation of an appropriate risk management and
reporting framework that includes elements described in this guidance. Senior management is
also responsible for regularly reporting to the board of directors on adherence to policies
governing outsourcing arrangements.
course(s) of action that should be taken to mitigate the risks-
A financial institution's service provider risk management program should be riskfocused and
provide oversight and controls commensurate with the level of risk presented by the outsourcing
arrangements in which the financial institution is engaged. It should focus on outsourced
activities that have a substantial impact on a financial institution's financial condition; are
critical to the institution's ongoing operations; involve sensitive customer information or new
bank products or services; or pose material compliance risk. The depth and formality of the
service provider risk management program will depend on the criticality, complexity, and
number of material business activities being outsourced. Acommunity banking organization may
have critical business activities being outsourced, but the number may be few and to highly
reputable service providers. Therefore, the risk management program may be simpler and use
less elements and considerations. For those financial institutions that may use hundreds or
thousands of service providers for numerous business activities that have material risk, the
financial institution may find that they need to use many more elements and considerations of a
service provider risk management program to manage the higher level of risk and reliance on
service providers. While the activities necessary to implement an effective service provider risk
management program can vary based on the scope and nature of a financial institution's
outsourced activities, effective programs usually include the following core elements:
A. Risk assessments;
B. Due diligence and selection of service providers;
C. Contract provisions and considerations;
D. Incentive compensation review;
E. Oversight and monitoring of service providers; and
F. Business continuity and contingency plans.
Solution
Outsourcing Strategy Risks
Outsourcing strategy is the process of determining whether or not to outsource and, if so, what
to outsource.
Outsourcing Selection Risks
Outsourcing selection is the process of finding and evaluating potential outsourcing partners.
Outsourcing Implementation Risks
Outsourcing implementation is where the relationship between outsourcing partners is defined
and established.
Outsourcing Management Risks
Outsourcing management is the monitoring and evolution of the ongoing relationship.
Future Trends in Outsourcing
The Supply Chain Consortium will examine more of the risks of outsourcing within specific
levels of the supply chain in the future. Already, the consortium has administered surveys to its
member companies on the outsourcing of transportation and distribution center (DC) operations.
Among the findings:
The use of service providers to perform operational functions presents various risks to financial
institutions. Some risks are inherent to the outsourced activity itself, whereas others are
introduced with the involvement of a service provider. If not managed effectively, the use of
service providers may expose financial institutions to risks that can result in regulatory action,
financial loss, litigation, and loss of reputation. Financial institutions should consider the
following risks before entering into and while managing outsourcing arrangements.
• Compliance risks arise when the services, products, or activities of a service provider fail to
comply with applicable U.S. laws and regulations.
• Concentration risks arise when outsourced services or products are provided by a limited
number of service providers or are concentrated in limited geographic locations.
• Reputational risks arise when actions or poor performance of a service provider causes the
public to form a negative opinion about a financial institution.
Country risks arise when a financial institution engages a foreign-based service provider,
exposing the institution to possible economic, social, and political conditions and events from the
country where the provider is located.
• Operational risks arise when a service provider exposes a financial institution to losses due to
inadequate or failed internal processes or systems or from external events and human error.
• Legal risks arise when a service provider exposes a financial institution to legal expenses and
possible lawsuits.
who should be held liable for any breaches that occur
The use of service providers does not relieve a financial institution's board of directors and
senior management of their responsibility to ensure that outsourced activities are conducted in a
safe-and-sound manner and in compliance with applicable laws and regulations. Policies
governing the use of service providers should be established and approved by the board of
directors, or an executive committee of the board. These policies should establish a service
provider risk management program that addresses risk assessments and due diligence, standards
for contract provisions and considerations, ongoing monitoring of service providers, and
business continuity and contingency planning. Senior management is responsible for ensuring
that board-approved policies for the use of service providers are appropriately executed. This
includes overseeing the development and implementation of an appropriate risk management and
reporting framework that includes elements described in this guidance. Senior management is
also responsible for regularly reporting to the board of directors on adherence to policies
governing outsourcing arrangements.
course(s) of action that should be taken to mitigate the risks-
A financial institution's service provider risk management program should be riskfocused and
provide oversight and controls commensurate with the level of risk presented by the outsourcing
arrangements in which the financial institution is engaged. It should focus on outsourced
activities that have a substantial impact on a financial institution's financial condition; are
critical to the institution's ongoing operations; involve sensitive customer information or new
bank products or services; or pose material compliance risk. The depth and formality of the
service provider risk management program will depend on the criticality, complexity, and
number of material business activities being outsourced. Acommunity banking organization may
have critical business activities being outsourced, but the number may be few and to highly
reputable service providers. Therefore, the risk management program may be simpler and use
less elements and considerations. For those financial institutions that may use hundreds or
thousands of service providers for numerous business activities that have material risk, the
financial institution may find that they need to use many more elements and considerations of a
service provider risk management program to manage the higher level of risk and reliance on
service providers. While the activities necessary to implement an effective service provider risk
management program can vary based on the scope and nature of a financial institution's
outsourced activities, effective programs usually include the following core elements:
A. Risk assessments;
B. Due diligence and selection of service providers;
C. Contract provisions and considerations;
D. Incentive compensation review;
E. Oversight and monitoring of service providers; and
F. Business continuity and contingency plans.

More Related Content

Similar to Outsourcing Strategy Risks Outsourcing strategy is the process of .pdf

Weaver - Financial Institutions Consulting
Weaver - Financial Institutions ConsultingWeaver - Financial Institutions Consulting
Weaver - Financial Institutions ConsultingAndrew Topa
 
The Insurance Compliance Function - International Standards
The Insurance Compliance Function - International Standards The Insurance Compliance Function - International Standards
The Insurance Compliance Function - International Standards
JasonSchupp1
 
insurance-busines.pdf
insurance-busines.pdfinsurance-busines.pdf
insurance-busines.pdf
yebegashet
 
GP for Regulatory Management Product Sheet
GP for Regulatory Management Product SheetGP for Regulatory Management Product Sheet
GP for Regulatory Management Product SheetMarco Villacorta Olano
 
Crowe-ACAMS AML System Planning
Crowe-ACAMS AML System PlanningCrowe-ACAMS AML System Planning
Crowe-ACAMS AML System PlanningBrett Rosynek
 
Good governance for new bank products
Good governance for new bank productsGood governance for new bank products
Good governance for new bank products
Grant Thornton LLP
 
5. op risk and aml
5. op risk and aml5. op risk and aml
5. op risk and amlcrmbasel
 
Goldman Sachs Investor Presentation Deck Oct 2007.pdf
Goldman Sachs Investor Presentation Deck Oct 2007.pdfGoldman Sachs Investor Presentation Deck Oct 2007.pdf
Goldman Sachs Investor Presentation Deck Oct 2007.pdf
Bryann Alexandros
 
Anti-Money Laundering (AML) Risk Assessment Process
Anti-Money Laundering (AML) Risk Assessment ProcessAnti-Money Laundering (AML) Risk Assessment Process
Anti-Money Laundering (AML) Risk Assessment Process
accenture
 
Treliant_IndustryAdvisory_AML_DFS_Dec2015
Treliant_IndustryAdvisory_AML_DFS_Dec2015Treliant_IndustryAdvisory_AML_DFS_Dec2015
Treliant_IndustryAdvisory_AML_DFS_Dec2015Steven Reback
 
GP_for_Third_Party_Anti-Corruption_product_sheet
GP_for_Third_Party_Anti-Corruption_product_sheetGP_for_Third_Party_Anti-Corruption_product_sheet
GP_for_Third_Party_Anti-Corruption_product_sheetMarco Villacorta Olano
 
Moving operations to managed services provider
Moving operations to managed services providerMoving operations to managed services provider
Moving operations to managed services provider
Sandeep Sharma IIMK Smart City,IoT,Bigdata,Cloud,BI,DW
 
5 steps to a comprehensive aml programme
5 steps to a comprehensive aml programme5 steps to a comprehensive aml programme
5 steps to a comprehensive aml programme
SILO Compliance Systems
 
Head of Credit Risk JD-
Head of Credit Risk JD-Head of Credit Risk JD-
Head of Credit Risk JD-Khairi Melhim
 
Taking the road to advanced approaches and heightened standards in risk manag...
Taking the road to advanced approaches and heightened standards in risk manag...Taking the road to advanced approaches and heightened standards in risk manag...
Taking the road to advanced approaches and heightened standards in risk manag...
Grant Thornton LLP
 
Third Party Due Diligence - Know Your Third Party - EY India
Third Party Due Diligence - Know Your Third Party - EY IndiaThird Party Due Diligence - Know Your Third Party - EY India
Third Party Due Diligence - Know Your Third Party - EY India
Ernst & Young
 
White Paper: A summary of the FSA thematic review
White Paper: A summary of the FSA thematic reviewWhite Paper: A summary of the FSA thematic review
White Paper: A summary of the FSA thematic review
LexisNexis Benelux
 
An industrial approach to risk and control self-assessments
An industrial approach to risk and control self-assessmentsAn industrial approach to risk and control self-assessments
An industrial approach to risk and control self-assessments
Grant Thornton LLP
 
Treliant_IndustryAdvisory NY DFS Final Regulation_September2016
Treliant_IndustryAdvisory NY DFS Final Regulation_September2016Treliant_IndustryAdvisory NY DFS Final Regulation_September2016
Treliant_IndustryAdvisory NY DFS Final Regulation_September2016Steven Reback
 

Similar to Outsourcing Strategy Risks Outsourcing strategy is the process of .pdf (20)

Weaver - Financial Institutions Consulting
Weaver - Financial Institutions ConsultingWeaver - Financial Institutions Consulting
Weaver - Financial Institutions Consulting
 
The Insurance Compliance Function - International Standards
The Insurance Compliance Function - International Standards The Insurance Compliance Function - International Standards
The Insurance Compliance Function - International Standards
 
insurance-busines.pdf
insurance-busines.pdfinsurance-busines.pdf
insurance-busines.pdf
 
GP for Regulatory Management Product Sheet
GP for Regulatory Management Product SheetGP for Regulatory Management Product Sheet
GP for Regulatory Management Product Sheet
 
Crowe-ACAMS AML System Planning
Crowe-ACAMS AML System PlanningCrowe-ACAMS AML System Planning
Crowe-ACAMS AML System Planning
 
Good governance for new bank products
Good governance for new bank productsGood governance for new bank products
Good governance for new bank products
 
5. op risk and aml
5. op risk and aml5. op risk and aml
5. op risk and aml
 
Goldman Sachs Investor Presentation Deck Oct 2007.pdf
Goldman Sachs Investor Presentation Deck Oct 2007.pdfGoldman Sachs Investor Presentation Deck Oct 2007.pdf
Goldman Sachs Investor Presentation Deck Oct 2007.pdf
 
T8 Notes
T8 NotesT8 Notes
T8 Notes
 
Anti-Money Laundering (AML) Risk Assessment Process
Anti-Money Laundering (AML) Risk Assessment ProcessAnti-Money Laundering (AML) Risk Assessment Process
Anti-Money Laundering (AML) Risk Assessment Process
 
Treliant_IndustryAdvisory_AML_DFS_Dec2015
Treliant_IndustryAdvisory_AML_DFS_Dec2015Treliant_IndustryAdvisory_AML_DFS_Dec2015
Treliant_IndustryAdvisory_AML_DFS_Dec2015
 
GP_for_Third_Party_Anti-Corruption_product_sheet
GP_for_Third_Party_Anti-Corruption_product_sheetGP_for_Third_Party_Anti-Corruption_product_sheet
GP_for_Third_Party_Anti-Corruption_product_sheet
 
Moving operations to managed services provider
Moving operations to managed services providerMoving operations to managed services provider
Moving operations to managed services provider
 
5 steps to a comprehensive aml programme
5 steps to a comprehensive aml programme5 steps to a comprehensive aml programme
5 steps to a comprehensive aml programme
 
Head of Credit Risk JD-
Head of Credit Risk JD-Head of Credit Risk JD-
Head of Credit Risk JD-
 
Taking the road to advanced approaches and heightened standards in risk manag...
Taking the road to advanced approaches and heightened standards in risk manag...Taking the road to advanced approaches and heightened standards in risk manag...
Taking the road to advanced approaches and heightened standards in risk manag...
 
Third Party Due Diligence - Know Your Third Party - EY India
Third Party Due Diligence - Know Your Third Party - EY IndiaThird Party Due Diligence - Know Your Third Party - EY India
Third Party Due Diligence - Know Your Third Party - EY India
 
White Paper: A summary of the FSA thematic review
White Paper: A summary of the FSA thematic reviewWhite Paper: A summary of the FSA thematic review
White Paper: A summary of the FSA thematic review
 
An industrial approach to risk and control self-assessments
An industrial approach to risk and control self-assessmentsAn industrial approach to risk and control self-assessments
An industrial approach to risk and control self-assessments
 
Treliant_IndustryAdvisory NY DFS Final Regulation_September2016
Treliant_IndustryAdvisory NY DFS Final Regulation_September2016Treliant_IndustryAdvisory NY DFS Final Regulation_September2016
Treliant_IndustryAdvisory NY DFS Final Regulation_September2016
 

More from aparnaagenciestvm

The separation of substances. .pdf
                     The separation of substances.                    .pdf                     The separation of substances.                    .pdf
The separation of substances. .pdf
aparnaagenciestvm
 
the carbon-carbon bond in alkene is a C=C double .pdf
                     the carbon-carbon bond in alkene is a C=C double .pdf                     the carbon-carbon bond in alkene is a C=C double .pdf
the carbon-carbon bond in alkene is a C=C double .pdf
aparnaagenciestvm
 
PhLi in El2O because Ph reacts with El2O agent t.pdf
                     PhLi in El2O  because Ph reacts with El2O agent t.pdf                     PhLi in El2O  because Ph reacts with El2O agent t.pdf
PhLi in El2O because Ph reacts with El2O agent t.pdf
aparnaagenciestvm
 
pOH = pKb + log ([salt][base]) pKb = -log(1.81.pdf
                     pOH = pKb + log ([salt][base])  pKb = -log(1.81.pdf                     pOH = pKb + log ([salt][base])  pKb = -log(1.81.pdf
pOH = pKb + log ([salt][base]) pKb = -log(1.81.pdf
aparnaagenciestvm
 
i thnk there is something missing in the question.pdf
                     i thnk there is something missing in the question.pdf                     i thnk there is something missing in the question.pdf
i thnk there is something missing in the question.pdf
aparnaagenciestvm
 
Entropy is positive because movement of molecules.pdf
                     Entropy is positive because movement of molecules.pdf                     Entropy is positive because movement of molecules.pdf
Entropy is positive because movement of molecules.pdf
aparnaagenciestvm
 
Device that produces an intense beam of coherent .pdf
                     Device that produces an intense beam of coherent .pdf                     Device that produces an intense beam of coherent .pdf
Device that produces an intense beam of coherent .pdf
aparnaagenciestvm
 
Decompose the Forces into componentsNow you can .pdf
                     Decompose the Forces into componentsNow you can .pdf                     Decompose the Forces into componentsNow you can .pdf
Decompose the Forces into componentsNow you can .pdf
aparnaagenciestvm
 
Turn TakingIn discussion analysis turn-taking is a word for the w.pdf
Turn TakingIn discussion analysis turn-taking is a word for the w.pdfTurn TakingIn discussion analysis turn-taking is a word for the w.pdf
Turn TakingIn discussion analysis turn-taking is a word for the w.pdf
aparnaagenciestvm
 
there exists a postive integer N such thatN log(E) log(1-r),w.pdf
there exists a postive integer N such thatN  log(E) log(1-r),w.pdfthere exists a postive integer N such thatN  log(E) log(1-r),w.pdf
there exists a postive integer N such thatN log(E) log(1-r),w.pdf
aparnaagenciestvm
 
ThecontrapositiveofSolutionThecontrapositiveof.pdf
ThecontrapositiveofSolutionThecontrapositiveof.pdfThecontrapositiveofSolutionThecontrapositiveof.pdf
ThecontrapositiveofSolutionThecontrapositiveof.pdf
aparnaagenciestvm
 
the phosphoric acid will donate a proton to the OH and then it will .pdf
the phosphoric acid will donate a proton to the OH and then it will .pdfthe phosphoric acid will donate a proton to the OH and then it will .pdf
the phosphoric acid will donate a proton to the OH and then it will .pdf
aparnaagenciestvm
 
Technology helps people in implementing privacy in their day today l.pdf
Technology helps people in implementing privacy in their day today l.pdfTechnology helps people in implementing privacy in their day today l.pdf
Technology helps people in implementing privacy in their day today l.pdf
aparnaagenciestvm
 
Solution-Edith file one qualified dependent (one child credit) and.pdf
Solution-Edith file one qualified dependent (one child credit) and.pdfSolution-Edith file one qualified dependent (one child credit) and.pdf
Solution-Edith file one qualified dependent (one child credit) and.pdf
aparnaagenciestvm
 
Role of federal health agencies - ranges from making changes in exis.pdf
Role of federal health agencies - ranges from making changes in exis.pdfRole of federal health agencies - ranges from making changes in exis.pdf
Role of federal health agencies - ranges from making changes in exis.pdf
aparnaagenciestvm
 
plants and algae also have cellulose in their cells. Presence of a c.pdf
plants and algae also have cellulose in their cells. Presence of a c.pdfplants and algae also have cellulose in their cells. Presence of a c.pdf
plants and algae also have cellulose in their cells. Presence of a c.pdf
aparnaagenciestvm
 
Non-constant growth stock valuation Current price (P) = D 1 (1 .pdf
Non-constant growth stock valuation Current price (P) = D 1  (1 .pdfNon-constant growth stock valuation Current price (P) = D 1  (1 .pdf
Non-constant growth stock valuation Current price (P) = D 1 (1 .pdf
aparnaagenciestvm
 
MenuItemvpublic class MenuItem .pdf
MenuItemvpublic class MenuItem .pdfMenuItemvpublic class MenuItem .pdf
MenuItemvpublic class MenuItem .pdf
aparnaagenciestvm
 
latterSolutionlatter.pdf
latterSolutionlatter.pdflatterSolutionlatter.pdf
latterSolutionlatter.pdf
aparnaagenciestvm
 
HBr and HCl are both strong acids, so they completely dissolve in wa.pdf
HBr and HCl are both strong acids, so they completely dissolve in wa.pdfHBr and HCl are both strong acids, so they completely dissolve in wa.pdf
HBr and HCl are both strong acids, so they completely dissolve in wa.pdf
aparnaagenciestvm
 

More from aparnaagenciestvm (20)

The separation of substances. .pdf
                     The separation of substances.                    .pdf                     The separation of substances.                    .pdf
The separation of substances. .pdf
 
the carbon-carbon bond in alkene is a C=C double .pdf
                     the carbon-carbon bond in alkene is a C=C double .pdf                     the carbon-carbon bond in alkene is a C=C double .pdf
the carbon-carbon bond in alkene is a C=C double .pdf
 
PhLi in El2O because Ph reacts with El2O agent t.pdf
                     PhLi in El2O  because Ph reacts with El2O agent t.pdf                     PhLi in El2O  because Ph reacts with El2O agent t.pdf
PhLi in El2O because Ph reacts with El2O agent t.pdf
 
pOH = pKb + log ([salt][base]) pKb = -log(1.81.pdf
                     pOH = pKb + log ([salt][base])  pKb = -log(1.81.pdf                     pOH = pKb + log ([salt][base])  pKb = -log(1.81.pdf
pOH = pKb + log ([salt][base]) pKb = -log(1.81.pdf
 
i thnk there is something missing in the question.pdf
                     i thnk there is something missing in the question.pdf                     i thnk there is something missing in the question.pdf
i thnk there is something missing in the question.pdf
 
Entropy is positive because movement of molecules.pdf
                     Entropy is positive because movement of molecules.pdf                     Entropy is positive because movement of molecules.pdf
Entropy is positive because movement of molecules.pdf
 
Device that produces an intense beam of coherent .pdf
                     Device that produces an intense beam of coherent .pdf                     Device that produces an intense beam of coherent .pdf
Device that produces an intense beam of coherent .pdf
 
Decompose the Forces into componentsNow you can .pdf
                     Decompose the Forces into componentsNow you can .pdf                     Decompose the Forces into componentsNow you can .pdf
Decompose the Forces into componentsNow you can .pdf
 
Turn TakingIn discussion analysis turn-taking is a word for the w.pdf
Turn TakingIn discussion analysis turn-taking is a word for the w.pdfTurn TakingIn discussion analysis turn-taking is a word for the w.pdf
Turn TakingIn discussion analysis turn-taking is a word for the w.pdf
 
there exists a postive integer N such thatN log(E) log(1-r),w.pdf
there exists a postive integer N such thatN  log(E) log(1-r),w.pdfthere exists a postive integer N such thatN  log(E) log(1-r),w.pdf
there exists a postive integer N such thatN log(E) log(1-r),w.pdf
 
ThecontrapositiveofSolutionThecontrapositiveof.pdf
ThecontrapositiveofSolutionThecontrapositiveof.pdfThecontrapositiveofSolutionThecontrapositiveof.pdf
ThecontrapositiveofSolutionThecontrapositiveof.pdf
 
the phosphoric acid will donate a proton to the OH and then it will .pdf
the phosphoric acid will donate a proton to the OH and then it will .pdfthe phosphoric acid will donate a proton to the OH and then it will .pdf
the phosphoric acid will donate a proton to the OH and then it will .pdf
 
Technology helps people in implementing privacy in their day today l.pdf
Technology helps people in implementing privacy in their day today l.pdfTechnology helps people in implementing privacy in their day today l.pdf
Technology helps people in implementing privacy in their day today l.pdf
 
Solution-Edith file one qualified dependent (one child credit) and.pdf
Solution-Edith file one qualified dependent (one child credit) and.pdfSolution-Edith file one qualified dependent (one child credit) and.pdf
Solution-Edith file one qualified dependent (one child credit) and.pdf
 
Role of federal health agencies - ranges from making changes in exis.pdf
Role of federal health agencies - ranges from making changes in exis.pdfRole of federal health agencies - ranges from making changes in exis.pdf
Role of federal health agencies - ranges from making changes in exis.pdf
 
plants and algae also have cellulose in their cells. Presence of a c.pdf
plants and algae also have cellulose in their cells. Presence of a c.pdfplants and algae also have cellulose in their cells. Presence of a c.pdf
plants and algae also have cellulose in their cells. Presence of a c.pdf
 
Non-constant growth stock valuation Current price (P) = D 1 (1 .pdf
Non-constant growth stock valuation Current price (P) = D 1  (1 .pdfNon-constant growth stock valuation Current price (P) = D 1  (1 .pdf
Non-constant growth stock valuation Current price (P) = D 1 (1 .pdf
 
MenuItemvpublic class MenuItem .pdf
MenuItemvpublic class MenuItem .pdfMenuItemvpublic class MenuItem .pdf
MenuItemvpublic class MenuItem .pdf
 
latterSolutionlatter.pdf
latterSolutionlatter.pdflatterSolutionlatter.pdf
latterSolutionlatter.pdf
 
HBr and HCl are both strong acids, so they completely dissolve in wa.pdf
HBr and HCl are both strong acids, so they completely dissolve in wa.pdfHBr and HCl are both strong acids, so they completely dissolve in wa.pdf
HBr and HCl are both strong acids, so they completely dissolve in wa.pdf
 

Recently uploaded

Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 

Recently uploaded (20)

Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 

Outsourcing Strategy Risks Outsourcing strategy is the process of .pdf

  • 1. Outsourcing Strategy Risks Outsourcing strategy is the process of determining whether or not to outsource and, if so, what to outsource. Outsourcing Selection Risks Outsourcing selection is the process of finding and evaluating potential outsourcing partners. Outsourcing Implementation Risks Outsourcing implementation is where the relationship between outsourcing partners is defined and established. Outsourcing Management Risks Outsourcing management is the monitoring and evolution of the ongoing relationship. Future Trends in Outsourcing The Supply Chain Consortium will examine more of the risks of outsourcing within specific levels of the supply chain in the future. Already, the consortium has administered surveys to its member companies on the outsourcing of transportation and distribution center (DC) operations. Among the findings: The use of service providers to perform operational functions presents various risks to financial institutions. Some risks are inherent to the outsourced activity itself, whereas others are introduced with the involvement of a service provider. If not managed effectively, the use of service providers may expose financial institutions to risks that can result in regulatory action, financial loss, litigation, and loss of reputation. Financial institutions should consider the following risks before entering into and while managing outsourcing arrangements. • Compliance risks arise when the services, products, or activities of a service provider fail to comply with applicable U.S. laws and regulations. • Concentration risks arise when outsourced services or products are provided by a limited number of service providers or are concentrated in limited geographic locations. • Reputational risks arise when actions or poor performance of a service provider causes the public to form a negative opinion about a financial institution. Country risks arise when a financial institution engages a foreign-based service provider, exposing the institution to possible economic, social, and political conditions and events from the country where the provider is located. • Operational risks arise when a service provider exposes a financial institution to losses due to inadequate or failed internal processes or systems or from external events and human error. • Legal risks arise when a service provider exposes a financial institution to legal expenses and possible lawsuits. who should be held liable for any breaches that occur
  • 2. The use of service providers does not relieve a financial institution's board of directors and senior management of their responsibility to ensure that outsourced activities are conducted in a safe-and-sound manner and in compliance with applicable laws and regulations. Policies governing the use of service providers should be established and approved by the board of directors, or an executive committee of the board. These policies should establish a service provider risk management program that addresses risk assessments and due diligence, standards for contract provisions and considerations, ongoing monitoring of service providers, and business continuity and contingency planning. Senior management is responsible for ensuring that board-approved policies for the use of service providers are appropriately executed. This includes overseeing the development and implementation of an appropriate risk management and reporting framework that includes elements described in this guidance. Senior management is also responsible for regularly reporting to the board of directors on adherence to policies governing outsourcing arrangements. course(s) of action that should be taken to mitigate the risks- A financial institution's service provider risk management program should be riskfocused and provide oversight and controls commensurate with the level of risk presented by the outsourcing arrangements in which the financial institution is engaged. It should focus on outsourced activities that have a substantial impact on a financial institution's financial condition; are critical to the institution's ongoing operations; involve sensitive customer information or new bank products or services; or pose material compliance risk. The depth and formality of the service provider risk management program will depend on the criticality, complexity, and number of material business activities being outsourced. Acommunity banking organization may have critical business activities being outsourced, but the number may be few and to highly reputable service providers. Therefore, the risk management program may be simpler and use less elements and considerations. For those financial institutions that may use hundreds or thousands of service providers for numerous business activities that have material risk, the financial institution may find that they need to use many more elements and considerations of a service provider risk management program to manage the higher level of risk and reliance on service providers. While the activities necessary to implement an effective service provider risk management program can vary based on the scope and nature of a financial institution's outsourced activities, effective programs usually include the following core elements: A. Risk assessments; B. Due diligence and selection of service providers; C. Contract provisions and considerations; D. Incentive compensation review; E. Oversight and monitoring of service providers; and
  • 3. F. Business continuity and contingency plans. Solution Outsourcing Strategy Risks Outsourcing strategy is the process of determining whether or not to outsource and, if so, what to outsource. Outsourcing Selection Risks Outsourcing selection is the process of finding and evaluating potential outsourcing partners. Outsourcing Implementation Risks Outsourcing implementation is where the relationship between outsourcing partners is defined and established. Outsourcing Management Risks Outsourcing management is the monitoring and evolution of the ongoing relationship. Future Trends in Outsourcing The Supply Chain Consortium will examine more of the risks of outsourcing within specific levels of the supply chain in the future. Already, the consortium has administered surveys to its member companies on the outsourcing of transportation and distribution center (DC) operations. Among the findings: The use of service providers to perform operational functions presents various risks to financial institutions. Some risks are inherent to the outsourced activity itself, whereas others are introduced with the involvement of a service provider. If not managed effectively, the use of service providers may expose financial institutions to risks that can result in regulatory action, financial loss, litigation, and loss of reputation. Financial institutions should consider the following risks before entering into and while managing outsourcing arrangements. • Compliance risks arise when the services, products, or activities of a service provider fail to comply with applicable U.S. laws and regulations. • Concentration risks arise when outsourced services or products are provided by a limited number of service providers or are concentrated in limited geographic locations. • Reputational risks arise when actions or poor performance of a service provider causes the public to form a negative opinion about a financial institution. Country risks arise when a financial institution engages a foreign-based service provider, exposing the institution to possible economic, social, and political conditions and events from the country where the provider is located. • Operational risks arise when a service provider exposes a financial institution to losses due to inadequate or failed internal processes or systems or from external events and human error.
  • 4. • Legal risks arise when a service provider exposes a financial institution to legal expenses and possible lawsuits. who should be held liable for any breaches that occur The use of service providers does not relieve a financial institution's board of directors and senior management of their responsibility to ensure that outsourced activities are conducted in a safe-and-sound manner and in compliance with applicable laws and regulations. Policies governing the use of service providers should be established and approved by the board of directors, or an executive committee of the board. These policies should establish a service provider risk management program that addresses risk assessments and due diligence, standards for contract provisions and considerations, ongoing monitoring of service providers, and business continuity and contingency planning. Senior management is responsible for ensuring that board-approved policies for the use of service providers are appropriately executed. This includes overseeing the development and implementation of an appropriate risk management and reporting framework that includes elements described in this guidance. Senior management is also responsible for regularly reporting to the board of directors on adherence to policies governing outsourcing arrangements. course(s) of action that should be taken to mitigate the risks- A financial institution's service provider risk management program should be riskfocused and provide oversight and controls commensurate with the level of risk presented by the outsourcing arrangements in which the financial institution is engaged. It should focus on outsourced activities that have a substantial impact on a financial institution's financial condition; are critical to the institution's ongoing operations; involve sensitive customer information or new bank products or services; or pose material compliance risk. The depth and formality of the service provider risk management program will depend on the criticality, complexity, and number of material business activities being outsourced. Acommunity banking organization may have critical business activities being outsourced, but the number may be few and to highly reputable service providers. Therefore, the risk management program may be simpler and use less elements and considerations. For those financial institutions that may use hundreds or thousands of service providers for numerous business activities that have material risk, the financial institution may find that they need to use many more elements and considerations of a service provider risk management program to manage the higher level of risk and reliance on service providers. While the activities necessary to implement an effective service provider risk management program can vary based on the scope and nature of a financial institution's outsourced activities, effective programs usually include the following core elements: A. Risk assessments; B. Due diligence and selection of service providers;
  • 5. C. Contract provisions and considerations; D. Incentive compensation review; E. Oversight and monitoring of service providers; and F. Business continuity and contingency plans.