SlideShare a Scribd company logo
1 of 3
Unintended Consequences of Risk Reporting
By: Geary W. Sikich and Joop Remmé
Copyright© Geary W. Sikich, Joop Remme 2016. World rights reserved. Published with permission of the authors.
Introduction
In thisarticle we positthree questions. The firstquestionis:“Isit a social responsibility of companies
thatthey undertakea comprehensiveriskassessment?” The secondquestion:“Doesthenotion of
conscienceand its application to the generation and useof risk information and information in general,
create an obligation forthe organization to disclosethe resultsof the comprehensiveriskassessment?”
The third question“Howdo thepeoplein the organization communicatetheinformation fromthe
comprehensiveriskassessmentto stakeholdersand yetpreservesecurity and protectthe organization?”
The three questionsmay,atfirst,appearsimple andstraightforward. However,aswe dissecteach,we
findthatthere is significantcomplexityintertwinedinthese questions. While thisarticledoesnot
attemptto provide arigidframeworkorhard and fastanswerstothe above questions,itisourintentto
setin motiona dialogue regardingCorporate Social Responsibility(CSR) anditsrelationshipwith
Governance RiskandCompliance (GRC) activities/obligationsthatforma social contract betweenthe
organizationanditsstakeholders.
1) Is it a social responsibilityofcompaniesthat theyundertake a comprehensive riskassessment?
Whenone asks “Is it a social responsibility of companiesthatthey undertakea comprehensiverisk
assessment?”;we beginto view the organization asa livingentity. Organizationsall have cultural traits
that identifyanddifferentiate themfromotherorganizations. Organizational culturedefinesthe
behaviorsandaspirationsof those whobelongtothe organization. Itcreatesa contextof
responsibilities,obligations,goalsandobjectives thatpertainbothtohow the membersof the
organizationtreateachotherand to how the outside worldcanbe expectedtobe treatedbythem.
While the organization’s goalsandobjectivesmaychange overtime tomeetstrategicinitiatives,
responsibilitiesandobligationsoftenprovide astable platformforoptimizingoperational effectiveness
once theyare solidifiedinthe culture. AsdevelopedbyTrompenaars,aculture can bestbe seenasa
social structure forproblem solving. Thatbringsusto risk. What if the effortstosolve jointproblems
fail? That isa riskthat maynot have beenadequatelyaddressedbytraditionalriskmanagement.
Doesthisquestionthen assume apositive effectfrom conductingcomprehensiverisk assessments?
Doesthe organization’s management,andriskmanagementfunction,learnfromthe riskassessment
processand therebychange organizational behaviors? Tophrase thisintermsof culture,dothe
cultivatedbehaviorswithinthe organizationadapt? Or,isthe comprehensiveriskassessmentprocess
merelyapaperexercise designedto meetregulatoryrequirements?
Realizingthe full range of responsibilities,commitments, learningandapplyingthe resultsof a
comprehensive riskassessmentcreatesanorganizational “conscience”;arecordof resultsthat
effectivelyobligesthe organizationtoact.
We can focusthison responsibilitiesthathave todowithdata; in thisdayand age the life bloodof
businessprocessesandrelationships. Forexample,take EuropeanUnion(EU) privacyconcernsanddata
protection. Whendealingwithnon-EUcompanies,consultancies,etc.,ariskisposedby these non-EU
organizationshavingdataontheirEU clientswithnone of thatinformationbeingprotectedunderEU
Unintended Consequences of Risk Reporting
By: Geary W. Sikich and Joop Remmé
Copyright© Geary W. Sikich, Joop Remme 2016. World rights reserved. Published with permission of the authors.
regulation. Thiscanconstitute toomuchof a riskfor the EU client,suchthat theywill refrainfrom
engagingnon-EUcompanies/suppliers.
2) Does the notionof conscience and its applicationto the generationand use of risk informationand
informationin general,oblige the organization to disclose the resultsof the comprehensive risk
assessment?
Part of conscience isthe responsibilitytorealize whatyoudid. Thisrealizationis requiredforthe
disclosure of riskassessmentresultsdictatedbyregulations, butalsoforthe developmentof
responsible andproductive engagement(communications, interfaces,etc.) withall stakeholders. Inthe
example citedinquestion#1,regardingEU data privacyconcerns;whatwouldthe organization learn
fromthat realization? Howwouldriskassessmentinformationbe communicated,retainedand
protected? Intermsof culture,thismeansthatan organization mustfosterawarenessamongstits
membersof the organization’s impactsonstakeholders. Thisdoesnottake awaythe responsibilityof
leaders,whoshouldshowsuchawarenessmore thanothers,butitrather helps tobuildleadershipona
sharedsense of responsibility.
Thinkaboutpsychopaths. Accordingtorecentresearch,a psychopathdoeshave a conscience;he/she
justdoesnot letthatconscience interfere with hisorheractions,makingbehaviorspossible that
“normal”people wouldnottypicallyshow. If sucha psychopathicmentalitycomestocharacterize the
culture of an organization,itconstitutesaformidable risk. Youcould saythat if an organizationisnot
able to learnfromwhatit has done,itcannotbe fullyregardedasa responsible organization.
3) And, once accomplished,howdo the people inthe organization communicate the information to
stakeholdersand yet preserve security and protect the organization?
What isthe value of informationforeachstakeholderrelationship? Itisa real quandarythat
organizations mustdeal with - howmuchinformationtostakeholdersistoomuchand whatare the
compliance requirementsthat,if unmetoronlypartiallymet,couldcause stakeholderlawsuits,actions,
etc.that are detrimental tothe organization. A fine line thathasto be carefullynavigated. Here again,
thinkof the example citedinquestion#1,regardingEU data privacyand security. Where should the risk
assessmentinformation(reports,etc.)repository (datastorage) be located,andwhattype of protection
shouldbe usedtosecure the data? What is the riskof hackingto the organization? How can data be
communicatedwithoutraising“redflags”forregulators,etc.? How can the sharingof data with
stakeholderbe restrictedwithoutdamagingthe relationshipsamongstthe stakeholders?
Thisquestionmightbe mainlyabouttrust. Let’sassume,atleast,thatthreatsto securityof information
mainlycome frominefficiencies,orevenill will,amongststakeholders. However,withthe rise of cyber-
crime (hacking,ransomware,etc.),preservingsecuritypartlydependsonpreservingthe goodwill of all
those concerned withprotectingthe security of the organization. Italsoassumes thatidentifiedrisks
(positive and/ornegative) will be addressedbyacorrespondingprogram of “riskbuffering”tocreate
“riskparity”.
The communicationprocessisnolongeronce anddone;it isnow a constantdialogue toensure the
accuracy and freshnessof the information(data). Withregardtoriskdata, the challenge istoprotect
Unintended Consequences of Risk Reporting
By: Geary W. Sikich and Joop Remmé
Copyright© Geary W. Sikich, Joop Remme 2016. World rights reserved. Published with permission of the authors.
the data from inadvertentdisclosure and/ormaliciousdisclosure,eitherfrominternal orexternal
sources.
ConcludingThoughts
In thisarticle we have posited three complex questionsthatorganizationsmustaddressfromthe
standpointof Governance,RiskandCompliance;aswell asfroma Corporate Social Responsibility
perspective asrelatestothe social contractwithstakeholders. Ourdiscussionisnotmeant tobe all
encompassing,nortosetstrict guidelines/prescriptionsforcoursesof action. Ratheritisthe intentthat
the readersbegintoknowand betterunderstandthe commitmentsthe organizationmakesin
establishingeffectiveCSRandGRC initiatives.
We encourage commentsanddiscussiononall the pointsmade herein. The goal isto expandthe
dialogue andtoheightenorganizational awarenessof riskinitsconstantlychangingforms.
About the Authors
Geary Sikich – Management Advisor, Author and Speaker
Contact Information:E-mail: G.Sikich@att.net or gsikich@logicalmanagement.com / www.logicalmanagement.com.
Telephone: 1- 219-922-7718.
Joop Remmé Ph.D. – lecturer, researcher, consultant
Contact information: remme@corporate-responsibility-future.eu/ www-corporate-responsibility-future.eu

More Related Content

Viewers also liked

小倉第一病院見学会20140823
小倉第一病院見学会20140823小倉第一病院見学会20140823
小倉第一病院見学会20140823秀敏 中村
 
Mendiagnosis jaringan smkdt
Mendiagnosis jaringan smkdtMendiagnosis jaringan smkdt
Mendiagnosis jaringan smkdtajran
 
Displays for learning
Displays for learningDisplays for learning
Displays for learningacjmitchell
 
Goodyear police department interview questions
Goodyear police department interview questionsGoodyear police department interview questions
Goodyear police department interview questionsselinasimpson709
 
A scanner darkly
A scanner darklyA scanner darkly
A scanner darklyjackwintour
 
NAVIXY A2 – A-GPS трекер в OBDII порт
NAVIXY A2 – A-GPS трекер в OBDII портNAVIXY A2 – A-GPS трекер в OBDII порт
NAVIXY A2 – A-GPS трекер в OBDII портRusLink
 
Waco police department interview questions
Waco police department interview questionsWaco police department interview questions
Waco police department interview questionsselinasimpson119
 
2.sillon copia
2.sillon copia2.sillon copia
2.sillon copialupitay
 
Caminata por el autismo 2014 | Milagro Huaman Lu
Caminata por el autismo 2014 | Milagro Huaman LuCaminata por el autismo 2014 | Milagro Huaman Lu
Caminata por el autismo 2014 | Milagro Huaman LuMilagro Huaman Lu
 
Ci350 unit plan unrevised
Ci350 unit plan unrevisedCi350 unit plan unrevised
Ci350 unit plan unrevisedwgwill22
 
Introduction to Pactify - a web based cooperation platform
Introduction to Pactify - a web based cooperation platformIntroduction to Pactify - a web based cooperation platform
Introduction to Pactify - a web based cooperation platformBart Vanderhaegen
 

Viewers also liked (14)

小倉第一病院見学会20140823
小倉第一病院見学会20140823小倉第一病院見学会20140823
小倉第一病院見学会20140823
 
Mendiagnosis jaringan smkdt
Mendiagnosis jaringan smkdtMendiagnosis jaringan smkdt
Mendiagnosis jaringan smkdt
 
Displays for learning
Displays for learningDisplays for learning
Displays for learning
 
Goodyear police department interview questions
Goodyear police department interview questionsGoodyear police department interview questions
Goodyear police department interview questions
 
Betacam sp bvw50
Betacam sp bvw50Betacam sp bvw50
Betacam sp bvw50
 
A scanner darkly
A scanner darklyA scanner darkly
A scanner darkly
 
NAVIXY A2 – A-GPS трекер в OBDII порт
NAVIXY A2 – A-GPS трекер в OBDII портNAVIXY A2 – A-GPS трекер в OBDII порт
NAVIXY A2 – A-GPS трекер в OBDII порт
 
Vocabulary
VocabularyVocabulary
Vocabulary
 
Waco police department interview questions
Waco police department interview questionsWaco police department interview questions
Waco police department interview questions
 
2.sillon copia
2.sillon copia2.sillon copia
2.sillon copia
 
Karaoke
KaraokeKaraoke
Karaoke
 
Caminata por el autismo 2014 | Milagro Huaman Lu
Caminata por el autismo 2014 | Milagro Huaman LuCaminata por el autismo 2014 | Milagro Huaman Lu
Caminata por el autismo 2014 | Milagro Huaman Lu
 
Ci350 unit plan unrevised
Ci350 unit plan unrevisedCi350 unit plan unrevised
Ci350 unit plan unrevised
 
Introduction to Pactify - a web based cooperation platform
Introduction to Pactify - a web based cooperation platformIntroduction to Pactify - a web based cooperation platform
Introduction to Pactify - a web based cooperation platform
 

Similar to Unintended Risk Reporting Consequences

Under cyber attack: EY's Global information security survey 2013
Under cyber attack: EY's Global information security survey 2013Under cyber attack: EY's Global information security survey 2013
Under cyber attack: EY's Global information security survey 2013EY
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportFERMA
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technohoney690131
 
Peter Giblin - Tone at the Top
Peter Giblin - Tone at the TopPeter Giblin - Tone at the Top
Peter Giblin - Tone at the TopPeter Giblin
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadwaiforchi Wagiteerhh
 
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NISTHIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NISTDavid Sweigert
 
Classmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docxClassmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docxbartholomeocoombs
 
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...Future Agenda
 
ZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info RiskZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info RiskJohn Loveland
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationApril Dillard
 
Why Is Security A Shared Responsibility.pdf
Why Is Security A Shared Responsibility.pdfWhy Is Security A Shared Responsibility.pdf
Why Is Security A Shared Responsibility.pdfCiente
 
Ace emerging-risks-barometer-2013
Ace emerging-risks-barometer-2013Ace emerging-risks-barometer-2013
Ace emerging-risks-barometer-2013Factor-X
 
Brunswick Intelligence - Building reputational resilience to cyber attack
Brunswick Intelligence - Building reputational resilience to cyber attackBrunswick Intelligence - Building reputational resilience to cyber attack
Brunswick Intelligence - Building reputational resilience to cyber attackBrunswick Group
 
Raised Line Paper (Pack Of 50) - Assistive Technology
Raised Line Paper (Pack Of 50) - Assistive TechnologyRaised Line Paper (Pack Of 50) - Assistive Technology
Raised Line Paper (Pack Of 50) - Assistive TechnologyMelissa Grant
 
Ferma perspectives #2 - Cyber Risk Governance 09.10.2018
Ferma perspectives #2 - Cyber Risk Governance 09.10.2018Ferma perspectives #2 - Cyber Risk Governance 09.10.2018
Ferma perspectives #2 - Cyber Risk Governance 09.10.2018FERMA
 
[Salterbaxter Directions] Human Rights - The Time is Now
[Salterbaxter Directions] Human Rights - The Time is Now[Salterbaxter Directions] Human Rights - The Time is Now
[Salterbaxter Directions] Human Rights - The Time is NowMSL
 
Survey of accountability, trust, consent, tracking, security and privacy mech...
Survey of accountability, trust, consent, tracking, security and privacy mech...Survey of accountability, trust, consent, tracking, security and privacy mech...
Survey of accountability, trust, consent, tracking, security and privacy mech...Karlos Svoboda
 

Similar to Unintended Risk Reporting Consequences (20)

Under cyber attack: EY's Global information security survey 2013
Under cyber attack: EY's Global information security survey 2013Under cyber attack: EY's Global information security survey 2013
Under cyber attack: EY's Global information security survey 2013
 
Ey giss-under-cyber-attack
Ey giss-under-cyber-attackEy giss-under-cyber-attack
Ey giss-under-cyber-attack
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
 
Peter Giblin - Tone at the Top
Peter Giblin - Tone at the TopPeter Giblin - Tone at the Top
Peter Giblin - Tone at the Top
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
 
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NISTHIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
 
Classmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docxClassmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docx
 
The meaning of security in the 21st century
The meaning of security in the 21st centuryThe meaning of security in the 21st century
The meaning of security in the 21st century
 
7350_RiskWatch-Summer2015-Maligec
7350_RiskWatch-Summer2015-Maligec7350_RiskWatch-Summer2015-Maligec
7350_RiskWatch-Summer2015-Maligec
 
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
 
ZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info RiskZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info Risk
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every Organization
 
Why Is Security A Shared Responsibility.pdf
Why Is Security A Shared Responsibility.pdfWhy Is Security A Shared Responsibility.pdf
Why Is Security A Shared Responsibility.pdf
 
Ace emerging-risks-barometer-2013
Ace emerging-risks-barometer-2013Ace emerging-risks-barometer-2013
Ace emerging-risks-barometer-2013
 
Brunswick Intelligence - Building reputational resilience to cyber attack
Brunswick Intelligence - Building reputational resilience to cyber attackBrunswick Intelligence - Building reputational resilience to cyber attack
Brunswick Intelligence - Building reputational resilience to cyber attack
 
Raised Line Paper (Pack Of 50) - Assistive Technology
Raised Line Paper (Pack Of 50) - Assistive TechnologyRaised Line Paper (Pack Of 50) - Assistive Technology
Raised Line Paper (Pack Of 50) - Assistive Technology
 
Ferma perspectives #2 - Cyber Risk Governance 09.10.2018
Ferma perspectives #2 - Cyber Risk Governance 09.10.2018Ferma perspectives #2 - Cyber Risk Governance 09.10.2018
Ferma perspectives #2 - Cyber Risk Governance 09.10.2018
 
[Salterbaxter Directions] Human Rights - The Time is Now
[Salterbaxter Directions] Human Rights - The Time is Now[Salterbaxter Directions] Human Rights - The Time is Now
[Salterbaxter Directions] Human Rights - The Time is Now
 
Survey of accountability, trust, consent, tracking, security and privacy mech...
Survey of accountability, trust, consent, tracking, security and privacy mech...Survey of accountability, trust, consent, tracking, security and privacy mech...
Survey of accountability, trust, consent, tracking, security and privacy mech...
 

Unintended Risk Reporting Consequences

  • 1. Unintended Consequences of Risk Reporting By: Geary W. Sikich and Joop Remmé Copyright© Geary W. Sikich, Joop Remme 2016. World rights reserved. Published with permission of the authors. Introduction In thisarticle we positthree questions. The firstquestionis:“Isit a social responsibility of companies thatthey undertakea comprehensiveriskassessment?” The secondquestion:“Doesthenotion of conscienceand its application to the generation and useof risk information and information in general, create an obligation forthe organization to disclosethe resultsof the comprehensiveriskassessment?” The third question“Howdo thepeoplein the organization communicatetheinformation fromthe comprehensiveriskassessmentto stakeholdersand yetpreservesecurity and protectthe organization?” The three questionsmay,atfirst,appearsimple andstraightforward. However,aswe dissecteach,we findthatthere is significantcomplexityintertwinedinthese questions. While thisarticledoesnot attemptto provide arigidframeworkorhard and fastanswerstothe above questions,itisourintentto setin motiona dialogue regardingCorporate Social Responsibility(CSR) anditsrelationshipwith Governance RiskandCompliance (GRC) activities/obligationsthatforma social contract betweenthe organizationanditsstakeholders. 1) Is it a social responsibilityofcompaniesthat theyundertake a comprehensive riskassessment? Whenone asks “Is it a social responsibility of companiesthatthey undertakea comprehensiverisk assessment?”;we beginto view the organization asa livingentity. Organizationsall have cultural traits that identifyanddifferentiate themfromotherorganizations. Organizational culturedefinesthe behaviorsandaspirationsof those whobelongtothe organization. Itcreatesa contextof responsibilities,obligations,goalsandobjectives thatpertainbothtohow the membersof the organizationtreateachotherand to how the outside worldcanbe expectedtobe treatedbythem. While the organization’s goalsandobjectivesmaychange overtime tomeetstrategicinitiatives, responsibilitiesandobligationsoftenprovide astable platformforoptimizingoperational effectiveness once theyare solidifiedinthe culture. AsdevelopedbyTrompenaars,aculture can bestbe seenasa social structure forproblem solving. Thatbringsusto risk. What if the effortstosolve jointproblems fail? That isa riskthat maynot have beenadequatelyaddressedbytraditionalriskmanagement. Doesthisquestionthen assume apositive effectfrom conductingcomprehensiverisk assessments? Doesthe organization’s management,andriskmanagementfunction,learnfromthe riskassessment processand therebychange organizational behaviors? Tophrase thisintermsof culture,dothe cultivatedbehaviorswithinthe organizationadapt? Or,isthe comprehensiveriskassessmentprocess merelyapaperexercise designedto meetregulatoryrequirements? Realizingthe full range of responsibilities,commitments, learningandapplyingthe resultsof a comprehensive riskassessmentcreatesanorganizational “conscience”;arecordof resultsthat effectivelyobligesthe organizationtoact. We can focusthison responsibilitiesthathave todowithdata; in thisdayand age the life bloodof businessprocessesandrelationships. Forexample,take EuropeanUnion(EU) privacyconcernsanddata protection. Whendealingwithnon-EUcompanies,consultancies,etc.,ariskisposedby these non-EU organizationshavingdataontheirEU clientswithnone of thatinformationbeingprotectedunderEU
  • 2. Unintended Consequences of Risk Reporting By: Geary W. Sikich and Joop Remmé Copyright© Geary W. Sikich, Joop Remme 2016. World rights reserved. Published with permission of the authors. regulation. Thiscanconstitute toomuchof a riskfor the EU client,suchthat theywill refrainfrom engagingnon-EUcompanies/suppliers. 2) Does the notionof conscience and its applicationto the generationand use of risk informationand informationin general,oblige the organization to disclose the resultsof the comprehensive risk assessment? Part of conscience isthe responsibilitytorealize whatyoudid. Thisrealizationis requiredforthe disclosure of riskassessmentresultsdictatedbyregulations, butalsoforthe developmentof responsible andproductive engagement(communications, interfaces,etc.) withall stakeholders. Inthe example citedinquestion#1,regardingEU data privacyconcerns;whatwouldthe organization learn fromthat realization? Howwouldriskassessmentinformationbe communicated,retainedand protected? Intermsof culture,thismeansthatan organization mustfosterawarenessamongstits membersof the organization’s impactsonstakeholders. Thisdoesnottake awaythe responsibilityof leaders,whoshouldshowsuchawarenessmore thanothers,butitrather helps tobuildleadershipona sharedsense of responsibility. Thinkaboutpsychopaths. Accordingtorecentresearch,a psychopathdoeshave a conscience;he/she justdoesnot letthatconscience interfere with hisorheractions,makingbehaviorspossible that “normal”people wouldnottypicallyshow. If sucha psychopathicmentalitycomestocharacterize the culture of an organization,itconstitutesaformidable risk. Youcould saythat if an organizationisnot able to learnfromwhatit has done,itcannotbe fullyregardedasa responsible organization. 3) And, once accomplished,howdo the people inthe organization communicate the information to stakeholdersand yet preserve security and protect the organization? What isthe value of informationforeachstakeholderrelationship? Itisa real quandarythat organizations mustdeal with - howmuchinformationtostakeholdersistoomuchand whatare the compliance requirementsthat,if unmetoronlypartiallymet,couldcause stakeholderlawsuits,actions, etc.that are detrimental tothe organization. A fine line thathasto be carefullynavigated. Here again, thinkof the example citedinquestion#1,regardingEU data privacyand security. Where should the risk assessmentinformation(reports,etc.)repository (datastorage) be located,andwhattype of protection shouldbe usedtosecure the data? What is the riskof hackingto the organization? How can data be communicatedwithoutraising“redflags”forregulators,etc.? How can the sharingof data with stakeholderbe restrictedwithoutdamagingthe relationshipsamongstthe stakeholders? Thisquestionmightbe mainlyabouttrust. Let’sassume,atleast,thatthreatsto securityof information mainlycome frominefficiencies,orevenill will,amongststakeholders. However,withthe rise of cyber- crime (hacking,ransomware,etc.),preservingsecuritypartlydependsonpreservingthe goodwill of all those concerned withprotectingthe security of the organization. Italsoassumes thatidentifiedrisks (positive and/ornegative) will be addressedbyacorrespondingprogram of “riskbuffering”tocreate “riskparity”. The communicationprocessisnolongeronce anddone;it isnow a constantdialogue toensure the accuracy and freshnessof the information(data). Withregardtoriskdata, the challenge istoprotect
  • 3. Unintended Consequences of Risk Reporting By: Geary W. Sikich and Joop Remmé Copyright© Geary W. Sikich, Joop Remme 2016. World rights reserved. Published with permission of the authors. the data from inadvertentdisclosure and/ormaliciousdisclosure,eitherfrominternal orexternal sources. ConcludingThoughts In thisarticle we have posited three complex questionsthatorganizationsmustaddressfromthe standpointof Governance,RiskandCompliance;aswell asfroma Corporate Social Responsibility perspective asrelatestothe social contractwithstakeholders. Ourdiscussionisnotmeant tobe all encompassing,nortosetstrict guidelines/prescriptionsforcoursesof action. Ratheritisthe intentthat the readersbegintoknowand betterunderstandthe commitmentsthe organizationmakesin establishingeffectiveCSRandGRC initiatives. We encourage commentsanddiscussiononall the pointsmade herein. The goal isto expandthe dialogue andtoheightenorganizational awarenessof riskinitsconstantlychangingforms. About the Authors Geary Sikich – Management Advisor, Author and Speaker Contact Information:E-mail: G.Sikich@att.net or gsikich@logicalmanagement.com / www.logicalmanagement.com. Telephone: 1- 219-922-7718. Joop Remmé Ph.D. – lecturer, researcher, consultant Contact information: remme@corporate-responsibility-future.eu/ www-corporate-responsibility-future.eu