SlideShare a Scribd company logo
The Challenge of Anti Corruption
In the Eastern Europe:
From Antiquity to the Modern Era
Natalia Ivanova & Igor Knazev
2
Is Singapore’s GDP much or little?
It is estimated that Russia alone suffers annual losses
equal to GDP of Singapore, $310 Bn or 1/5 of its own GDP.
3
Meet Sergey
He was born free.
Died in custody aged just
37 after serving 358 days
in a Moscow’s jail.
4
Top 5 Facts About Corruption
5
¾ of Countries Are Below 5
6
EU’s Losses Alone Account For
KUWAIT’s GDP
€120 billion
lost annually
in EU alone
7
½ Of The Workers Across EME & Africa
Consider Corruption A Means of Survival
8
Developing Countries Lose $1.26 Trillion
Annually
Equals to GDP of SWITZERLAND and Saudi Arabia
combined
9
Fewer than half of
respondents knew that
their company’s policy
contains guidance on
gifts or hospitality, and
less than a quarter
knew of policies on
political contributions
10
The Russians Would Put Private Interest
Over The Interest of the Community
Historically. Why?
Mongol-tatarian Yoke imposed in 1242.
Even after the Russian prince would absorb
much of their principles: arbitrary despotic
violence and the total absence of concern
for the welfare of the subject.
Harsh weather conditions and severe winter
Besieged Mentality for centuries:
Russia has been a subject for invasions
for centuries...
11
The Management System Favours
Vulnerability of the Individual
12
Core Values Count
Duality in
the Russian
personality
13
International Anti-corruption Law And
Statistics
14
International Anti-corruption Law
● Domestic bribery (private-to-public and public-to-private)
● Corruption of foreign public officials
● Facilitation payments
● Compliance programs
● Regulators with jurisdiction to prosecute corruption
The main topics in the anti-corruption legislation:
15
Brief Overview of the International Anti-
Corruption Law
• United Nations Convention against Corruption ( October, 2003);
• Council of Europe Convention on Criminal Responsibility for corruption
(January, 1999);
• Organization for Economic Cooperation and Development Convention on
Combating Bribery of Foreign Officials in International Business
Transactions (November, 1997);
• USA Foreign Corrupt Practices Act (December, 1977)
• United Kingdom Bribery act (April, 2010)
16
Ease of Doing Business Index
17
Doing Business Rating Favours Odious
Governments to manipulate with data
Total: 190 positions
Russia - 35 rank
Belarus - 38 rank
18
Corruption Perception Index Sheds More
Light on the Corruption
Total: 180 positions
Russia - 135 rank
Belarus - 68 rank
19
Global Corruption Barometer Index
20
What do people think about corruption
21
Today’s Challenges In the “Russian World”
22
No global standard to design, implement or evaluate an
organization's anti-bribery management system
ISO 37001. Why now?
No shortage of guidance related to anti-
bribery programs and controls; seen as
confusing to some
Majority of guidance seen as U.S. and
Europe-centric
Create a "common language" to help
decrease the time, money and resources
on developing the "right" anti-bribery
program and controls, as well as
evaluating the anti-bribery programs of
other companies
23
ISO 37001 History of The Standard
2011
BS 10500
was
published
2016
In January ISO
37001 reaches
voting stage
1988
Prevention of
corruption act
1977
Foreign
Corrupt
Practices Act
2002
Sarbanes
Oxley Act was
passedEstablishment of
Transparency
International
1993
UK Bribery
Act
2010
2016
Publication of
ISO
37001:2016
2015
Publication of
ISO 37001
draft
24
8.2. Due Diligence 8.3 Financial Controls 8.4 Non-financial Controls
8.5 Implementation of
Anti-bribery controls
by controlled
organizations
8.6. Anti-bribery
Commitments
8.7. Gifts, Hospitality,
Donations and other
Benefits
8.8. Managing inadequacy
of anti-bribery
Controls
8.9 Raising Concerns
8.10 Investigating and
Dealing with Bribery
ISO 37001 assumes a lot of power to
harness the corruption challenge.
But is it enough?
8.1 Operational Planning
and Control
25
ISO 37001. What is important in the
implementation?
● The anti-bribery program can exist within a larger compliance program
● The language used is important
● The anti-bribery risk assessment serves as the foundation for the program's
scope and objectives
● Policies, procedures and controls should be "reasonable and proportionate"
to the bribery risks the organization faces
● Organizations must implement anti-bribery controls where there is "more
than a low risk of bribery"
● Emphasis on continual improvement
26
Key components of ISO 37001
● Conducting a risk assessment.
● Setting up a compliance function to monitor effectiveness of the program.
● Communication of the policy to all relevant personnel and business
associates (meaning, related parties/distributors, etc.)
● Training of personnel and business associates.
● Verifying their compliance.
● Monitoring high-risk payments and benefits to ensure they do not connote a
corrupt intent.
● Implementing controls throughout the business to prevent bribery risk.
● Instituting “whistleblowing” procedures.
● Setting up a formal process for investigating and dealing with any allegations
of potential or suspected bribery.
27
ISO 37001 Implementation Challenges in
EACU
• Сhecking all close relatives with a special check for property (savings in
banks, securities prices, etc.).
• Rotation of civil servants every 5 years
• The abolition of the presumption of innocence on corruption
• Reducing the amount of money in cash and switching to electronic payments
• Combining the fight against corruption and creating economic prerequisites
for eliminating the causes of corruption
28
Any Questions?

More Related Content

What's hot

SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best PracticesSEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
Kroll
 
ICT ICA3
ICT ICA3ICT ICA3
Cybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected AgeCybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected Age
dlblumen
 
TRU Snacks Webinar Series - Navigating Cybersecurity Risk in the Age of COVID-19
TRU Snacks Webinar Series - Navigating Cybersecurity Risk in the Age of COVID-19TRU Snacks Webinar Series - Navigating Cybersecurity Risk in the Age of COVID-19
TRU Snacks Webinar Series - Navigating Cybersecurity Risk in the Age of COVID-19
Citrin Cooperman
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119
David Doughty
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Report
accenture
 
Baretzky & Associates Presentation.
Baretzky & Associates Presentation.Baretzky & Associates Presentation.
Baretzky & Associates Presentation.
Ricardo Bn. Baretzky
 
Anti Corruption - Ignorance is no longer bliss
Anti Corruption  - Ignorance is no longer blissAnti Corruption  - Ignorance is no longer bliss
Anti Corruption - Ignorance is no longer bliss
SandyBoucher
 
Infographic Economic Impact of Cybercrime
Infographic Economic Impact of CybercrimeInfographic Economic Impact of Cybercrime
Infographic Economic Impact of Cybercrime
Jeferson Propheta
 
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Benjamin Ang
 
NYS DFS CyberSecurity Regulations
NYS DFS CyberSecurity RegulationsNYS DFS CyberSecurity Regulations
NYS DFS CyberSecurity Regulations
Jon Bosco
 
Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)
Benjamin Ang
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Business Days
 
Lessons learned from the SingHealth Data Breach COI Report
Lessons learned from the SingHealth Data Breach COI ReportLessons learned from the SingHealth Data Breach COI Report
Lessons learned from the SingHealth Data Breach COI Report
Benjamin Ang
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
Chinatu Uzuegbu
 
CyberSecurity: Protecting Law Firms - Vanderburg - JurInnov
CyberSecurity: Protecting Law Firms - Vanderburg - JurInnovCyberSecurity: Protecting Law Firms - Vanderburg - JurInnov
CyberSecurity: Protecting Law Firms - Vanderburg - JurInnov
Eric Vanderburg
 
State of Compliance 2013
State of Compliance 2013State of Compliance 2013
State of Compliance 2013Stephen Selby
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategies
Benjamin Ang
 
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security Strategy
Benjamin Ang
 
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Kroll
 

What's hot (20)

SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best PracticesSEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
 
ICT ICA3
ICT ICA3ICT ICA3
ICT ICA3
 
Cybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected AgeCybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected Age
 
TRU Snacks Webinar Series - Navigating Cybersecurity Risk in the Age of COVID-19
TRU Snacks Webinar Series - Navigating Cybersecurity Risk in the Age of COVID-19TRU Snacks Webinar Series - Navigating Cybersecurity Risk in the Age of COVID-19
TRU Snacks Webinar Series - Navigating Cybersecurity Risk in the Age of COVID-19
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Report
 
Baretzky & Associates Presentation.
Baretzky & Associates Presentation.Baretzky & Associates Presentation.
Baretzky & Associates Presentation.
 
Anti Corruption - Ignorance is no longer bliss
Anti Corruption  - Ignorance is no longer blissAnti Corruption  - Ignorance is no longer bliss
Anti Corruption - Ignorance is no longer bliss
 
Infographic Economic Impact of Cybercrime
Infographic Economic Impact of CybercrimeInfographic Economic Impact of Cybercrime
Infographic Economic Impact of Cybercrime
 
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
 
NYS DFS CyberSecurity Regulations
NYS DFS CyberSecurity RegulationsNYS DFS CyberSecurity Regulations
NYS DFS CyberSecurity Regulations
 
Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020
 
Lessons learned from the SingHealth Data Breach COI Report
Lessons learned from the SingHealth Data Breach COI ReportLessons learned from the SingHealth Data Breach COI Report
Lessons learned from the SingHealth Data Breach COI Report
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
 
CyberSecurity: Protecting Law Firms - Vanderburg - JurInnov
CyberSecurity: Protecting Law Firms - Vanderburg - JurInnovCyberSecurity: Protecting Law Firms - Vanderburg - JurInnov
CyberSecurity: Protecting Law Firms - Vanderburg - JurInnov
 
State of Compliance 2013
State of Compliance 2013State of Compliance 2013
State of Compliance 2013
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategies
 
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security Strategy
 
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
 

Similar to The Challenge of Anti Corruption in the Eastern Europe

Transparency_international_Nigeria
Transparency_international_NigeriaTransparency_international_Nigeria
Transparency_international_Nigeria
statisense
 
Enhancing Integrity for Business Development in the Middle East and North Africa
Enhancing Integrity for Business Development in the Middle East and North AfricaEnhancing Integrity for Business Development in the Middle East and North Africa
Enhancing Integrity for Business Development in the Middle East and North Africa
OECDglobal
 
The world bank gorvernance lite
The world bank gorvernance liteThe world bank gorvernance lite
The world bank gorvernance lite
Manish Halai
 
02.11.2015 the business principles for countering bribery an introduction
02.11.2015 the business principles for countering bribery  an introduction02.11.2015 the business principles for countering bribery  an introduction
02.11.2015 the business principles for countering bribery an introduction
The Business Council of Mongolia
 
Putting an end to corruption
Putting an end to corruptionPutting an end to corruption
Putting an end to corruption
OECD Governance
 
Investment On The Organization for Economic Cooperation and Development (OECD)
Investment On The Organization for Economic Cooperation and Development (OECD) Investment On The Organization for Economic Cooperation and Development (OECD)
Investment On The Organization for Economic Cooperation and Development (OECD)
AswinRahulCL
 
Managing bribery and corruption risks in the construction and infrastructure ...
Managing bribery and corruption risks in the construction and infrastructure ...Managing bribery and corruption risks in the construction and infrastructure ...
Managing bribery and corruption risks in the construction and infrastructure ...EY
 
Escaping the-low-growth-trap-effective-fiscal-initiatives-avoiding-trade-pitf...
Escaping the-low-growth-trap-effective-fiscal-initiatives-avoiding-trade-pitf...Escaping the-low-growth-trap-effective-fiscal-initiatives-avoiding-trade-pitf...
Escaping the-low-growth-trap-effective-fiscal-initiatives-avoiding-trade-pitf...
OECD, Economics Department
 
anti corruption.ppsx
anti corruption.ppsxanti corruption.ppsx
anti corruption.ppsx
AniketMishra85101
 
OECD Integrity Forum, Paris, 25-26 March 2015 - Agenda
OECD Integrity Forum, Paris, 25-26 March 2015 - AgendaOECD Integrity Forum, Paris, 25-26 March 2015 - Agenda
OECD Integrity Forum, Paris, 25-26 March 2015 - Agenda
OECD Governance
 
Transparency International organization
Transparency International organizationTransparency International organization
Transparency International organization
Yousuf Razzaq
 
Research posters - 2017 OECD Global Anti-Corruption & Integrity Forum
Research posters - 2017 OECD Global Anti-Corruption & Integrity ForumResearch posters - 2017 OECD Global Anti-Corruption & Integrity Forum
Research posters - 2017 OECD Global Anti-Corruption & Integrity Forum
OECD Governance
 
4 Globalization Sustainable Development and Social Responsibility.pptx
4 Globalization Sustainable Development and Social Responsibility.pptx4 Globalization Sustainable Development and Social Responsibility.pptx
4 Globalization Sustainable Development and Social Responsibility.pptx
Harish Augad
 
Overseas investment case study : Saint-Gobain in Iran
Overseas investment case study : Saint-Gobain in Iran Overseas investment case study : Saint-Gobain in Iran
Overseas investment case study : Saint-Gobain in Iran
Gerry L. H.
 
Всемирный обзор экономических преступлений за 2016 год
Всемирный обзор экономических преступлений за 2016 годВсемирный обзор экономических преступлений за 2016 год
Всемирный обзор экономических преступлений за 2016 год
PwC Russia
 
Fighting Private Sector Corruption And Fraud[1]
Fighting Private Sector Corruption And Fraud[1]Fighting Private Sector Corruption And Fraud[1]
Fighting Private Sector Corruption And Fraud[1]
Alphons Ranner
 
Session 1. Intro to IFFs Waridah Makena 2022.pptx
Session 1. Intro to IFFs Waridah Makena 2022.pptxSession 1. Intro to IFFs Waridah Makena 2022.pptx
Session 1. Intro to IFFs Waridah Makena 2022.pptx
Waridah Makena
 
Sustainability and Disruptions
Sustainability and DisruptionsSustainability and Disruptions
Sustainability and Disruptions
SDGsPlus
 
Global economic crime and fraude survey 2018
Global economic crime and fraude survey 2018Global economic crime and fraude survey 2018
Global economic crime and fraude survey 2018
Paperjam_redaction
 

Similar to The Challenge of Anti Corruption in the Eastern Europe (20)

Transparency_international_Nigeria
Transparency_international_NigeriaTransparency_international_Nigeria
Transparency_international_Nigeria
 
Enhancing Integrity for Business Development in the Middle East and North Africa
Enhancing Integrity for Business Development in the Middle East and North AfricaEnhancing Integrity for Business Development in the Middle East and North Africa
Enhancing Integrity for Business Development in the Middle East and North Africa
 
The world bank gorvernance lite
The world bank gorvernance liteThe world bank gorvernance lite
The world bank gorvernance lite
 
02.11.2015 the business principles for countering bribery an introduction
02.11.2015 the business principles for countering bribery  an introduction02.11.2015 the business principles for countering bribery  an introduction
02.11.2015 the business principles for countering bribery an introduction
 
Putting an end to corruption
Putting an end to corruptionPutting an end to corruption
Putting an end to corruption
 
Investment On The Organization for Economic Cooperation and Development (OECD)
Investment On The Organization for Economic Cooperation and Development (OECD) Investment On The Organization for Economic Cooperation and Development (OECD)
Investment On The Organization for Economic Cooperation and Development (OECD)
 
Managing bribery and corruption risks in the construction and infrastructure ...
Managing bribery and corruption risks in the construction and infrastructure ...Managing bribery and corruption risks in the construction and infrastructure ...
Managing bribery and corruption risks in the construction and infrastructure ...
 
This one !
This one !This one !
This one !
 
Escaping the-low-growth-trap-effective-fiscal-initiatives-avoiding-trade-pitf...
Escaping the-low-growth-trap-effective-fiscal-initiatives-avoiding-trade-pitf...Escaping the-low-growth-trap-effective-fiscal-initiatives-avoiding-trade-pitf...
Escaping the-low-growth-trap-effective-fiscal-initiatives-avoiding-trade-pitf...
 
anti corruption.ppsx
anti corruption.ppsxanti corruption.ppsx
anti corruption.ppsx
 
OECD Integrity Forum, Paris, 25-26 March 2015 - Agenda
OECD Integrity Forum, Paris, 25-26 March 2015 - AgendaOECD Integrity Forum, Paris, 25-26 March 2015 - Agenda
OECD Integrity Forum, Paris, 25-26 March 2015 - Agenda
 
Transparency International organization
Transparency International organizationTransparency International organization
Transparency International organization
 
Research posters - 2017 OECD Global Anti-Corruption & Integrity Forum
Research posters - 2017 OECD Global Anti-Corruption & Integrity ForumResearch posters - 2017 OECD Global Anti-Corruption & Integrity Forum
Research posters - 2017 OECD Global Anti-Corruption & Integrity Forum
 
4 Globalization Sustainable Development and Social Responsibility.pptx
4 Globalization Sustainable Development and Social Responsibility.pptx4 Globalization Sustainable Development and Social Responsibility.pptx
4 Globalization Sustainable Development and Social Responsibility.pptx
 
Overseas investment case study : Saint-Gobain in Iran
Overseas investment case study : Saint-Gobain in Iran Overseas investment case study : Saint-Gobain in Iran
Overseas investment case study : Saint-Gobain in Iran
 
Всемирный обзор экономических преступлений за 2016 год
Всемирный обзор экономических преступлений за 2016 годВсемирный обзор экономических преступлений за 2016 год
Всемирный обзор экономических преступлений за 2016 год
 
Fighting Private Sector Corruption And Fraud[1]
Fighting Private Sector Corruption And Fraud[1]Fighting Private Sector Corruption And Fraud[1]
Fighting Private Sector Corruption And Fraud[1]
 
Session 1. Intro to IFFs Waridah Makena 2022.pptx
Session 1. Intro to IFFs Waridah Makena 2022.pptxSession 1. Intro to IFFs Waridah Makena 2022.pptx
Session 1. Intro to IFFs Waridah Makena 2022.pptx
 
Sustainability and Disruptions
Sustainability and DisruptionsSustainability and Disruptions
Sustainability and Disruptions
 
Global economic crime and fraude survey 2018
Global economic crime and fraude survey 2018Global economic crime and fraude survey 2018
Global economic crime and fraude survey 2018
 

More from PECB

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
PECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
PECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
PECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
PECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
PECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
PECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
PECB
 

More from PECB (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 

Recently uploaded

Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 

Recently uploaded (20)

Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 

The Challenge of Anti Corruption in the Eastern Europe

  • 1. The Challenge of Anti Corruption In the Eastern Europe: From Antiquity to the Modern Era Natalia Ivanova & Igor Knazev
  • 2. 2 Is Singapore’s GDP much or little? It is estimated that Russia alone suffers annual losses equal to GDP of Singapore, $310 Bn or 1/5 of its own GDP.
  • 3. 3 Meet Sergey He was born free. Died in custody aged just 37 after serving 358 days in a Moscow’s jail.
  • 4. 4 Top 5 Facts About Corruption
  • 5. 5 ¾ of Countries Are Below 5
  • 6. 6 EU’s Losses Alone Account For KUWAIT’s GDP €120 billion lost annually in EU alone
  • 7. 7 ½ Of The Workers Across EME & Africa Consider Corruption A Means of Survival
  • 8. 8 Developing Countries Lose $1.26 Trillion Annually Equals to GDP of SWITZERLAND and Saudi Arabia combined
  • 9. 9 Fewer than half of respondents knew that their company’s policy contains guidance on gifts or hospitality, and less than a quarter knew of policies on political contributions
  • 10. 10 The Russians Would Put Private Interest Over The Interest of the Community Historically. Why? Mongol-tatarian Yoke imposed in 1242. Even after the Russian prince would absorb much of their principles: arbitrary despotic violence and the total absence of concern for the welfare of the subject. Harsh weather conditions and severe winter Besieged Mentality for centuries: Russia has been a subject for invasions for centuries...
  • 11. 11 The Management System Favours Vulnerability of the Individual
  • 12. 12 Core Values Count Duality in the Russian personality
  • 14. 14 International Anti-corruption Law ● Domestic bribery (private-to-public and public-to-private) ● Corruption of foreign public officials ● Facilitation payments ● Compliance programs ● Regulators with jurisdiction to prosecute corruption The main topics in the anti-corruption legislation:
  • 15. 15 Brief Overview of the International Anti- Corruption Law • United Nations Convention against Corruption ( October, 2003); • Council of Europe Convention on Criminal Responsibility for corruption (January, 1999); • Organization for Economic Cooperation and Development Convention on Combating Bribery of Foreign Officials in International Business Transactions (November, 1997); • USA Foreign Corrupt Practices Act (December, 1977) • United Kingdom Bribery act (April, 2010)
  • 16. 16 Ease of Doing Business Index
  • 17. 17 Doing Business Rating Favours Odious Governments to manipulate with data Total: 190 positions Russia - 35 rank Belarus - 38 rank
  • 18. 18 Corruption Perception Index Sheds More Light on the Corruption Total: 180 positions Russia - 135 rank Belarus - 68 rank
  • 20. 20 What do people think about corruption
  • 21. 21 Today’s Challenges In the “Russian World”
  • 22. 22 No global standard to design, implement or evaluate an organization's anti-bribery management system ISO 37001. Why now? No shortage of guidance related to anti- bribery programs and controls; seen as confusing to some Majority of guidance seen as U.S. and Europe-centric Create a "common language" to help decrease the time, money and resources on developing the "right" anti-bribery program and controls, as well as evaluating the anti-bribery programs of other companies
  • 23. 23 ISO 37001 History of The Standard 2011 BS 10500 was published 2016 In January ISO 37001 reaches voting stage 1988 Prevention of corruption act 1977 Foreign Corrupt Practices Act 2002 Sarbanes Oxley Act was passedEstablishment of Transparency International 1993 UK Bribery Act 2010 2016 Publication of ISO 37001:2016 2015 Publication of ISO 37001 draft
  • 24. 24 8.2. Due Diligence 8.3 Financial Controls 8.4 Non-financial Controls 8.5 Implementation of Anti-bribery controls by controlled organizations 8.6. Anti-bribery Commitments 8.7. Gifts, Hospitality, Donations and other Benefits 8.8. Managing inadequacy of anti-bribery Controls 8.9 Raising Concerns 8.10 Investigating and Dealing with Bribery ISO 37001 assumes a lot of power to harness the corruption challenge. But is it enough? 8.1 Operational Planning and Control
  • 25. 25 ISO 37001. What is important in the implementation? ● The anti-bribery program can exist within a larger compliance program ● The language used is important ● The anti-bribery risk assessment serves as the foundation for the program's scope and objectives ● Policies, procedures and controls should be "reasonable and proportionate" to the bribery risks the organization faces ● Organizations must implement anti-bribery controls where there is "more than a low risk of bribery" ● Emphasis on continual improvement
  • 26. 26 Key components of ISO 37001 ● Conducting a risk assessment. ● Setting up a compliance function to monitor effectiveness of the program. ● Communication of the policy to all relevant personnel and business associates (meaning, related parties/distributors, etc.) ● Training of personnel and business associates. ● Verifying their compliance. ● Monitoring high-risk payments and benefits to ensure they do not connote a corrupt intent. ● Implementing controls throughout the business to prevent bribery risk. ● Instituting “whistleblowing” procedures. ● Setting up a formal process for investigating and dealing with any allegations of potential or suspected bribery.
  • 27. 27 ISO 37001 Implementation Challenges in EACU • Сhecking all close relatives with a special check for property (savings in banks, securities prices, etc.). • Rotation of civil servants every 5 years • The abolition of the presumption of innocence on corruption • Reducing the amount of money in cash and switching to electronic payments • Combining the fight against corruption and creating economic prerequisites for eliminating the causes of corruption

Editor's Notes

  1. 1977 A United States federal law which addresses accounting transparency requirements and bribery of foreign officials. The anti-bribery provision of FCPA also applies to foreign firms and persons that cause any act such as corrupt payments within the territory of the U.S. 1988 Enables a more effective prevention of bribery and corruption. It addresses to different fields where bribery and corruption may occur, such as public services of a country. 1993 The first global movement standing for anti-corruption purposes. The vision of this movement is to stop corruption, promote transparency, accountability and integrity at levels of security. 2002 This act protects investors from the possibility of fraudulent accounting activities by corporations. Its establishment may be considered as a response of accounting scandals that happened in the early 2000s.