SlideShare a Scribd company logo
1 of 23
Download to read offline
1
Risicoanalyse integriteit
‘van kwetsbaar naar weerbaar’
SAINT
Risk Assessment Methodology
Alain Hoekstra
National Integrity
Office
2
Dutch National Integrity Office
Since:
• 2006: Ministry of the Interior and Kingdom Relations
• 2009: ‘independent’ but still subsidized
Philosophy:
• To support all government organizations in such a way that they themselves
can give substance to ethics and integrity policy
How:
• collect & dessiminate integrity related knowledge: publishing reports,
research, formal policy documents -> website
• network function: host various platforms for sharing experiences and best
practices, connecting experts/scholars, anual conferences
• develop & provide ‘ready to use’ instruments to work on integrity
• influencing the strategic policy agenda: conducting research for instance on
the impact of recession on public sector ethics
Clients:
• Integrity officers, management, integrity counsellors
Organisation:
• Small core, extensive but extensive complementary network: independent
advisors, scholars, leading experts -> co-production
Foucs:
• Integrity not (anti) corruption
3
History of National Integrity Office
• 2003-2006: ‘triggers’ for establishment
- impact of building fraud
- policy evaluations: implementation deficit
- changes in Civil Servants Act
- need for assistance and support
• 2006-2008: Official establishment NIO
- within departement Public Sector Management of ministry
• 2009: NIO ‘independent’
- functioning within departemental political/ policy environment
- More distance and independency required by UN convention against
corruption 2003 (art.6)
4
Integrity versus Corruption
Integrity:
- broad: complying with relevant public moral values, norms & standards
- positive: focus on stimulating ethical conduct in the public service (prevention)
- based on: ethics and morality
- bottom-up: awareness raising/ internalisation
(Anti-)corruption:
- narrow: receiving gifts/ advantages for acting in the interest of a specific actor
- negative: avoiding wrongdoing and private gain
- based on law, control and punishment (repression)
- top-down: imposition of rules and guidelines/ enforcement
5
6
Building components ethical organisation
House rules
Foundation & structure
Climate & atmosphereClimate & atmosphere
7
Integrity framework: 7 elements
8
Instruments: some examples
1. Online Quick-scan to check status of integrity policy
2. Model code of conduct
3. SAINT: risk assessement methodology
4. Integrity Cube: dilemma training dvd
5. Guideline for conducting integrity investigation
6. Monitoring implementation
7. Training integrity officers/ guideline for integrity plans
9
Risk Analysis Methodology
• Not focused on detecting wrongdoing of individual employees
• Not about investigating misconduct
• Not aimed at removing/ firing/ prosecuting ‘bad apples’
Instead
• Focused on detecting vulnerable processes and integrity risks
• Organizational system failures (structure, culture, context)
• Aimed at ‘bad barrels’ that can spoil the apples
10
“Discarding bad apples generally won’t solve an
organization’s problem with unethical behavior.
The organization must scrutinize itself to determine if
there’s something rotten inside the organization
that’s spoiling the apples”
Trevino & Nelson (2004). Managing Business ethics:
Straight talk about how to do it right (p.10)
Why?
11
SAINT: pre-assumptions & characteristics
- all public organizations are vulnerable
- eliminating vulnerabilities/ risks/ temptations –> protecting employee
- responsibility of employer
- risks assessments provision in Civil Servants Act (NL)
- internal in stead of external audit
- bottom-up process: making use of employees knowledge & experience
- employees formulate recommendations: enhances support/ implementation
- quick scan of biggest integrity risk areas and how to deal with them
12
SAINT: the system
1. which department/ unit?
2. what are the most vulnerable
processess/ integrity risks?
3. how effective is integrity framework/
measures (hard/ soft/general)?
4. is integrity framework complete/
strong enough considering risks?
5. what do we miss/ can we do better?
13
Vulnerable processes: some examples
Areas dealing
with the public or
with the private
sector
Collecting Taxes, fees, charges, etc.
Contracting Procurement, tenders, orders, assignments, etc.
Paying Subsidies, social benefits, allowances, grants, etc.
Granting/ issuing Permits, passports, driving licenses, identity cards, etc.
Public services Health care, education, garbage collection, etc.
Inspection/
enforcement
Inspections, investigation, prosecution, detention
Areas dealing
with government
property
Information Confidential/ secret information, documents, etc.
Money Cash, budgets, expenses, bonuses, allowances, etc.
Goods Buying/selling government material
Real estate Buying/selling buildings / land
14
SAINT: the system
1. which organisation/ department/ unit?
2. what are the most vulnerable
processess/ integrity risks?
3. how effective is integrity framework/
measures (hard/ soft/general)?
4. is integrity framework complete/
strong enough considering risks?
5. what do we miss/ can we do better?
15
Questionaire: effectiveness control systems
Hard Controls Soft Controls General Controls
Legislation/ regulation Values/ code of ethics Commitment/ vision
Reporting systems/
whistleblowing
procedures
Exemplary behaviour/
role modelling
Integrity policy/ documents/
Seggregation of
functions,
Integrity awareness/
education/ training
Integrity officer/ entity
disclosure of side jobs
acceptance of gift
declaring expenses
purchasing/ contracting
Culture/ openness / Trust
safe/ fairness
Rewarded/
Monitoring/evaluating
Policies/ Risk analysis
16
SAINT: the system
1. which organisation/ department/ unit?
2. what are the most vulnerable
processess/ integrity risks?
3. how effective is integrity framework/
measures (hard/ soft/general)?
4. is integrity framework complete/
strong enough considering risks?
5. what do we miss/ can we do better?
17
Gap analysis
• Level of vulnerabilities compared with level of integrity controls
determines what remains to be done in order the achieve…
• Balance: reducing vulnerability or enhancing controls
Remaining
Vulnerability
18
SAINT: the people
• 14 persons
• carefully selected
• critical but constructive attitude
• knowledge/ experience
• processess/ structures/ systems
• vulnerabilities/ risks
• worked for longer time
• different positions
• combination
- primary process/ workfloor
- management
- staff (HR/ finanace/ legal)
19
SAINT: the setting
• GDR
• Interconnected laptops
• Moderator
• ‘Firing’ questions
- ranking vulnerable processess
- describing specific risks
- evaluating existing measures
- formulating solutions
• Answers directly entered system
• Anonymous
• Equal opportunities
• Input aggregated
• Report
20
SAINT: some advantages
• Fast
• Time efficient
• Cheap
• Peridiotic repetition
• Safe
• Trained/ experienced moderator
• Consistency
• Bottum-up
- Inspiring
- Involvement
- Support implementation
21
SAINT: some limitations
• Suitable for smaller units
• Initial investments required
• Partial Analysis
- most vulnerable processess
- biggest risks
• Quality workshop depends on
quality/ honesty participants
• Report may be confronting for
management
• Management is responsible for/
has to decide on follow-up
22
23
Contact information
Alain Hoekstra
a.hoekstra@integriteitoverheid.nl
0031 (0)622614299

More Related Content

Similar to Risk analysis presentation latvia 2013

Health care charities seminar, November 2018, London
Health care charities seminar, November 2018, LondonHealth care charities seminar, November 2018, London
Health care charities seminar, November 2018, LondonBrowne Jacobson LLP
 
Presentation manage risk
Presentation manage riskPresentation manage risk
Presentation manage riskMichael Curtis
 
Health care charities seminar, November 2018, Manchester
Health care charities seminar, November 2018, ManchesterHealth care charities seminar, November 2018, Manchester
Health care charities seminar, November 2018, ManchesterBrowne Jacobson LLP
 
Setting up an Effective Security and Compliance Office
Setting up an Effective Security and Compliance OfficeSetting up an Effective Security and Compliance Office
Setting up an Effective Security and Compliance OfficeCloud Watchmen Inc.
 
Caveon Webinar Series - Exam Integrity Investigations, An Introduction to th...
Caveon Webinar Series -  Exam Integrity Investigations, An Introduction to th...Caveon Webinar Series -  Exam Integrity Investigations, An Introduction to th...
Caveon Webinar Series - Exam Integrity Investigations, An Introduction to th...Caveon Test Security
 
Equality and diversity in local government
Equality and diversity in local governmentEquality and diversity in local government
Equality and diversity in local governmentEqualitySW_Legacy
 
Performing FO Health Checks to Build an Entrepreneurial, Flexible yet Robust ...
Performing FO Health Checks to Build an Entrepreneurial, Flexible yet Robust ...Performing FO Health Checks to Build an Entrepreneurial, Flexible yet Robust ...
Performing FO Health Checks to Build an Entrepreneurial, Flexible yet Robust ...Investments Network marcus evans
 
Corruption and Fraud Risk Management using ISO 31000
Corruption and Fraud Risk Management using ISO 31000Corruption and Fraud Risk Management using ISO 31000
Corruption and Fraud Risk Management using ISO 31000PECB
 
Doculabs 2014 risk and compliance practice introduction finance
Doculabs 2014   risk and compliance practice introduction financeDoculabs 2014   risk and compliance practice introduction finance
Doculabs 2014 risk and compliance practice introduction financeScott Swanson , CFE, CFCI
 
FERMA Panel Debate - Coordination of Risk Management with Internal Control a...
FERMA Panel Debate -  Coordination of Risk Management with Internal Control a...FERMA Panel Debate -  Coordination of Risk Management with Internal Control a...
FERMA Panel Debate - Coordination of Risk Management with Internal Control a...FERMA
 
Raleigh issa chapter april meeting - managing a security & privacy governan...
Raleigh issa chapter   april meeting - managing a security & privacy governan...Raleigh issa chapter   april meeting - managing a security & privacy governan...
Raleigh issa chapter april meeting - managing a security & privacy governan...Raleigh ISSA
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible DataTom Walker
 
161122 ACW Wnuk Kiev internal anti-corruption system eng
161122 ACW Wnuk Kiev internal anti-corruption system eng161122 ACW Wnuk Kiev internal anti-corruption system eng
161122 ACW Wnuk Kiev internal anti-corruption system engMaciej Wnuk
 
Lessons learned from the Aged Care Royal Commission Interim Report
Lessons learned from the Aged Care Royal Commission Interim Report Lessons learned from the Aged Care Royal Commission Interim Report
Lessons learned from the Aged Care Royal Commission Interim Report JFM LAW
 
اخلاقيات الثاني
اخلاقيات الثانياخلاقيات الثاني
اخلاقيات الثانيBunayan ALdosari
 
Towards data responsibility - how to put ideals into action
Towards data responsibility - how to put ideals into actionTowards data responsibility - how to put ideals into action
Towards data responsibility - how to put ideals into actionMindtrek
 
Information security – risk identification is all
Information security – risk identification is allInformation security – risk identification is all
Information security – risk identification is allPECB
 

Similar to Risk analysis presentation latvia 2013 (20)

Health care charities seminar, November 2018, London
Health care charities seminar, November 2018, LondonHealth care charities seminar, November 2018, London
Health care charities seminar, November 2018, London
 
Presentation manage risk
Presentation manage riskPresentation manage risk
Presentation manage risk
 
Health care charities seminar, November 2018, Manchester
Health care charities seminar, November 2018, ManchesterHealth care charities seminar, November 2018, Manchester
Health care charities seminar, November 2018, Manchester
 
Setting up an Effective Security and Compliance Office
Setting up an Effective Security and Compliance OfficeSetting up an Effective Security and Compliance Office
Setting up an Effective Security and Compliance Office
 
Raising an Effective Watchdog
Raising an Effective WatchdogRaising an Effective Watchdog
Raising an Effective Watchdog
 
Caveon Webinar Series - Exam Integrity Investigations, An Introduction to th...
Caveon Webinar Series -  Exam Integrity Investigations, An Introduction to th...Caveon Webinar Series -  Exam Integrity Investigations, An Introduction to th...
Caveon Webinar Series - Exam Integrity Investigations, An Introduction to th...
 
Equality and diversity in local government
Equality and diversity in local governmentEquality and diversity in local government
Equality and diversity in local government
 
Performing FO Health Checks to Build an Entrepreneurial, Flexible yet Robust ...
Performing FO Health Checks to Build an Entrepreneurial, Flexible yet Robust ...Performing FO Health Checks to Build an Entrepreneurial, Flexible yet Robust ...
Performing FO Health Checks to Build an Entrepreneurial, Flexible yet Robust ...
 
Legislation, compliance and the law of unintended consequences
Legislation, compliance and the law of unintended consequencesLegislation, compliance and the law of unintended consequences
Legislation, compliance and the law of unintended consequences
 
Corruption and Fraud Risk Management using ISO 31000
Corruption and Fraud Risk Management using ISO 31000Corruption and Fraud Risk Management using ISO 31000
Corruption and Fraud Risk Management using ISO 31000
 
Doculabs 2014 risk and compliance practice introduction finance
Doculabs 2014   risk and compliance practice introduction financeDoculabs 2014   risk and compliance practice introduction finance
Doculabs 2014 risk and compliance practice introduction finance
 
FERMA Panel Debate - Coordination of Risk Management with Internal Control a...
FERMA Panel Debate -  Coordination of Risk Management with Internal Control a...FERMA Panel Debate -  Coordination of Risk Management with Internal Control a...
FERMA Panel Debate - Coordination of Risk Management with Internal Control a...
 
Raleigh issa chapter april meeting - managing a security & privacy governan...
Raleigh issa chapter   april meeting - managing a security & privacy governan...Raleigh issa chapter   april meeting - managing a security & privacy governan...
Raleigh issa chapter april meeting - managing a security & privacy governan...
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible Data
 
161122 ACW Wnuk Kiev internal anti-corruption system eng
161122 ACW Wnuk Kiev internal anti-corruption system eng161122 ACW Wnuk Kiev internal anti-corruption system eng
161122 ACW Wnuk Kiev internal anti-corruption system eng
 
Pensions Core Course 2013: Pension Supervision - Global Capital Markets Non-b...
Pensions Core Course 2013: Pension Supervision - Global Capital Markets Non-b...Pensions Core Course 2013: Pension Supervision - Global Capital Markets Non-b...
Pensions Core Course 2013: Pension Supervision - Global Capital Markets Non-b...
 
Lessons learned from the Aged Care Royal Commission Interim Report
Lessons learned from the Aged Care Royal Commission Interim Report Lessons learned from the Aged Care Royal Commission Interim Report
Lessons learned from the Aged Care Royal Commission Interim Report
 
اخلاقيات الثاني
اخلاقيات الثانياخلاقيات الثاني
اخلاقيات الثاني
 
Towards data responsibility - how to put ideals into action
Towards data responsibility - how to put ideals into actionTowards data responsibility - how to put ideals into action
Towards data responsibility - how to put ideals into action
 
Information security – risk identification is all
Information security – risk identification is allInformation security – risk identification is all
Information security – risk identification is all
 

Recently uploaded

KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 DelhiCall Girls in Delhi
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 

Recently uploaded (20)

KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 

Risk analysis presentation latvia 2013

  • 1. 1 Risicoanalyse integriteit ‘van kwetsbaar naar weerbaar’ SAINT Risk Assessment Methodology Alain Hoekstra National Integrity Office
  • 2. 2 Dutch National Integrity Office Since: • 2006: Ministry of the Interior and Kingdom Relations • 2009: ‘independent’ but still subsidized Philosophy: • To support all government organizations in such a way that they themselves can give substance to ethics and integrity policy How: • collect & dessiminate integrity related knowledge: publishing reports, research, formal policy documents -> website • network function: host various platforms for sharing experiences and best practices, connecting experts/scholars, anual conferences • develop & provide ‘ready to use’ instruments to work on integrity • influencing the strategic policy agenda: conducting research for instance on the impact of recession on public sector ethics Clients: • Integrity officers, management, integrity counsellors Organisation: • Small core, extensive but extensive complementary network: independent advisors, scholars, leading experts -> co-production Foucs: • Integrity not (anti) corruption
  • 3. 3 History of National Integrity Office • 2003-2006: ‘triggers’ for establishment - impact of building fraud - policy evaluations: implementation deficit - changes in Civil Servants Act - need for assistance and support • 2006-2008: Official establishment NIO - within departement Public Sector Management of ministry • 2009: NIO ‘independent’ - functioning within departemental political/ policy environment - More distance and independency required by UN convention against corruption 2003 (art.6)
  • 4. 4 Integrity versus Corruption Integrity: - broad: complying with relevant public moral values, norms & standards - positive: focus on stimulating ethical conduct in the public service (prevention) - based on: ethics and morality - bottom-up: awareness raising/ internalisation (Anti-)corruption: - narrow: receiving gifts/ advantages for acting in the interest of a specific actor - negative: avoiding wrongdoing and private gain - based on law, control and punishment (repression) - top-down: imposition of rules and guidelines/ enforcement
  • 5. 5
  • 6. 6 Building components ethical organisation House rules Foundation & structure Climate & atmosphereClimate & atmosphere
  • 8. 8 Instruments: some examples 1. Online Quick-scan to check status of integrity policy 2. Model code of conduct 3. SAINT: risk assessement methodology 4. Integrity Cube: dilemma training dvd 5. Guideline for conducting integrity investigation 6. Monitoring implementation 7. Training integrity officers/ guideline for integrity plans
  • 9. 9 Risk Analysis Methodology • Not focused on detecting wrongdoing of individual employees • Not about investigating misconduct • Not aimed at removing/ firing/ prosecuting ‘bad apples’ Instead • Focused on detecting vulnerable processes and integrity risks • Organizational system failures (structure, culture, context) • Aimed at ‘bad barrels’ that can spoil the apples
  • 10. 10 “Discarding bad apples generally won’t solve an organization’s problem with unethical behavior. The organization must scrutinize itself to determine if there’s something rotten inside the organization that’s spoiling the apples” Trevino & Nelson (2004). Managing Business ethics: Straight talk about how to do it right (p.10) Why?
  • 11. 11 SAINT: pre-assumptions & characteristics - all public organizations are vulnerable - eliminating vulnerabilities/ risks/ temptations –> protecting employee - responsibility of employer - risks assessments provision in Civil Servants Act (NL) - internal in stead of external audit - bottom-up process: making use of employees knowledge & experience - employees formulate recommendations: enhances support/ implementation - quick scan of biggest integrity risk areas and how to deal with them
  • 12. 12 SAINT: the system 1. which department/ unit? 2. what are the most vulnerable processess/ integrity risks? 3. how effective is integrity framework/ measures (hard/ soft/general)? 4. is integrity framework complete/ strong enough considering risks? 5. what do we miss/ can we do better?
  • 13. 13 Vulnerable processes: some examples Areas dealing with the public or with the private sector Collecting Taxes, fees, charges, etc. Contracting Procurement, tenders, orders, assignments, etc. Paying Subsidies, social benefits, allowances, grants, etc. Granting/ issuing Permits, passports, driving licenses, identity cards, etc. Public services Health care, education, garbage collection, etc. Inspection/ enforcement Inspections, investigation, prosecution, detention Areas dealing with government property Information Confidential/ secret information, documents, etc. Money Cash, budgets, expenses, bonuses, allowances, etc. Goods Buying/selling government material Real estate Buying/selling buildings / land
  • 14. 14 SAINT: the system 1. which organisation/ department/ unit? 2. what are the most vulnerable processess/ integrity risks? 3. how effective is integrity framework/ measures (hard/ soft/general)? 4. is integrity framework complete/ strong enough considering risks? 5. what do we miss/ can we do better?
  • 15. 15 Questionaire: effectiveness control systems Hard Controls Soft Controls General Controls Legislation/ regulation Values/ code of ethics Commitment/ vision Reporting systems/ whistleblowing procedures Exemplary behaviour/ role modelling Integrity policy/ documents/ Seggregation of functions, Integrity awareness/ education/ training Integrity officer/ entity disclosure of side jobs acceptance of gift declaring expenses purchasing/ contracting Culture/ openness / Trust safe/ fairness Rewarded/ Monitoring/evaluating Policies/ Risk analysis
  • 16. 16 SAINT: the system 1. which organisation/ department/ unit? 2. what are the most vulnerable processess/ integrity risks? 3. how effective is integrity framework/ measures (hard/ soft/general)? 4. is integrity framework complete/ strong enough considering risks? 5. what do we miss/ can we do better?
  • 17. 17 Gap analysis • Level of vulnerabilities compared with level of integrity controls determines what remains to be done in order the achieve… • Balance: reducing vulnerability or enhancing controls Remaining Vulnerability
  • 18. 18 SAINT: the people • 14 persons • carefully selected • critical but constructive attitude • knowledge/ experience • processess/ structures/ systems • vulnerabilities/ risks • worked for longer time • different positions • combination - primary process/ workfloor - management - staff (HR/ finanace/ legal)
  • 19. 19 SAINT: the setting • GDR • Interconnected laptops • Moderator • ‘Firing’ questions - ranking vulnerable processess - describing specific risks - evaluating existing measures - formulating solutions • Answers directly entered system • Anonymous • Equal opportunities • Input aggregated • Report
  • 20. 20 SAINT: some advantages • Fast • Time efficient • Cheap • Peridiotic repetition • Safe • Trained/ experienced moderator • Consistency • Bottum-up - Inspiring - Involvement - Support implementation
  • 21. 21 SAINT: some limitations • Suitable for smaller units • Initial investments required • Partial Analysis - most vulnerable processess - biggest risks • Quality workshop depends on quality/ honesty participants • Report may be confronting for management • Management is responsible for/ has to decide on follow-up
  • 22. 22