FSA data review stock take. Dean Buckner Financial Services Authority March 2012
|
|
- Agatha Heath
- 5 years ago
- Views:
Transcription
1 FSA data review stock take Dean Buckner Financial Services Authority March 2012
2 Agenda FSA data review process Common themes Next steps
3 FSA data review In three acts Act 1 Review of approx. 25 firms Objective: Determine dependencies in data & Systems work stream. Understand material data flows, agree scope and timing of external review Act 2 Scene 1 Firm s internal audit performs review Scene 2 FSA review of the review Act 3 Selective deep dive
4 Timings Act 1 September 2011 April 2012 Act 2 March 2012 Q Act 3 Q Q3 2013
5 Common themes (Act 1) Data governance operating model Data directory maintenance Data transformation Pervasive use of spreadsheets Data semantics Dependency on IT
6 Data operating model Needs careful design Design of operating model /= policy design Needs a manager! Some firms have appointed permanent managers Others are using the project manager until bau Others are using their existing governance frameworks and applying it to data risk & controls.
7 Other issues with data governance Inconsistent definition of data classification, ownership and responsibility Impact and materiality assessment firms are slowly getting to grips with this and there is no consistent approach.
8 Data directory maintenance Three different approaches. Tight coupling Structured directory, updated automatically Loose coupling Structured directory, semi-automatic update No coupling Freeform, unstructured, updated manually
9 Directory maintenance trade offs Tight coupling Benefit hardly any maintenance, automatic update Cost a pain to build, dependent on IT Loose coupling Benefit relationships can be accurately represented Cost Highly skilled maintenance No coupling Benefit no dependence on IT, flexibility Cost doesn t reflect reality, staff costs may prove prohibitive, possibly error prone FSA will not be prescriptive
10 Data transformation
11 Data is not just moved The idea of data movement is from IT N bytes of data are copied from system A to system B This kind of movement is trivial and uninteresting Typically when data passes from A to B, stuff happens Data sets are joined, merged, mapped Often transformed in exotic and interesting ways Data is operated on
12 Examples of data transformation Extrapolation, interpolation Extraction of key economic features A bond position is turned into a sensitivity calibration of risk factor stress
13 Scope of data transformation All material transformations of data outside the IM Kernel are in scope of the review. This includes Testing to confirm that the implementation (e.g. using spreadsheets, ETL, etc) complies with its design specifications Data Quality checks to ensure that the output of the transformation reflects the input data Where the transformation is functional, and its design involves expert judgment, the design or methodology or functional specification of the transformation is out of scope
14 Data semantics
15 What is semantics Semantics = fancy word for meaning Data records are made up of symbols which have a syntax and a meaning The same term can have a different meaning for different systems Different terms can have the same meaning for different systems
16 Meaning and translation Human dictionaries translate a term in one language into a term in another language with the same meaning omnis in Latin has the same meaning as the English quantifier every So different computer systems need translation or mapping tables
17 Semantic errors Many errors result from changes in the upstream meaning or basis of a term not being appropriately reflected downstream Basis is the hardest data characteristic to document and may well be the most frequent or material cause of error (See war stories below)
18 War story 1 A firm thought that its bodily injury motor claims estimates were not keeping pace with rapid inflation, so changed its claims diary from 12 months to 6 months Claims would be reviewed every six months, ensuring that case reserves were updated for claims inflation more frequently. The effect of reviewing small claims more often led to smaller claims being settled earlier and the surplus in the case estimates being released more quickly. Staff change meant loss of knowledge about the change so reason for distortion of claims data not understood. Result: significant underestimation of claims reserves. So an action that was intended to be prudent resulted in material under-reserving.
19 War story 2 Upstream system was sending credit swap positions using a single column Long position positive, short position negative For the new implementation, the one column was changed to two Amount of position now always positive, new column has B (buy) and S (sold) flag. Downstream system was never notified The first column remained the same, so nothing broke, and no preventative alarm was raised. Result: the downstream system thought all the short positions were really long positions. This led to a material mis-estimation of the firm s exposure.
20 War story 3 Upstream system didn t understand inflation bonds. These pay a fixed coupon plus an inflation factor computed using external data So they were booked as standard bonds, with the coupon adjusted upwards to compensate for the inflation factor This is very common practice for old systems which cannot represent new products without major engineering works. But the downstream system did understand inflation bonds, and assumed the upstream coupon amount was merely the fixed coupon component. So it added on an extra inflation factor which had already been included in the artificially adjusted coupon. Result: more material mis-estimation of exposure.
21 Controls over basis change Genuinely very difficult Getting computer systems to communicate with one another is one of the great unsolved problems of computer science Common methods include Quantitative change analysis Impact assessment Corporate memory Basic reconciliation or reasonableness checks
22 Dependency on IT
23 Impact of major IT implementations Key principle What we review is what you apply for If we review a tactical solution, then that is what you are applying for But what if there is a major strategic solution in the pipeline? Then we still review the tactical, and the strategic solution is model change
24 What is model change Change policy is key what items, systems, transformations related to data are part of the model change policy? change of platform only (same software and methodology)? Change of software only, no methodology change? Change of methodology?
25 Next steps
26 Act 2 Act 2 is marking the completed external reviews as they are returned by the firms Criteria Geographical, legal entity and systems scope should be proportionate [rewrite] Impact of finding should be clear and unequivocal Due dates must be consistent with application process Was there sufficient operational testing (one endto-end flow is probably not enough)
27 Materiality What materiality criteria were used to determine the scope of the audit and to assess impact of a finding / residual risk? Has audit considered: justification for determining materiality thresholds? consistency of materiality assessment with other policies? identification of future risks? possibility of material error caused by aggregation of errors which are not material singly?
28 External review format No precise criteria, except that it must include the FSA schedule at the top (as specified on our website). As per the scoping document, Act 2 results submission should include an executive summary, the FSA schedule, followed by details of each finding. Nice to have: Appendix of detailed findings, cross-referenced from main schedule Detailed findings to include rating, observation, clear articulation of impact and consequence, recommendation and management action plan with precise dates. Mitigating factors?
29 Act 3 Act 3 is optional deep dive following Act 3 is optional deep dive following themes identified by Act 2
30 Questions & Comments
Outstanding issues in Solvency II data management requirements
Outstanding issues in Solvency II data management requirements Dean Buckner 16 May 2013 Agenda Regulatory update Data review update Work in progress Thoughts on Data management framework Data directory
More informationSPREADSHEETS AND SOLVENCY II
SPREADSHEETS AND SOLVENCY II Dean Buckner Financial Services Authority July 2010 Agenda Solvency II is the new framework for insurance regulation in the European Union. It is currently scheduled for late
More informationCertified Information Security Manager (CISM) Course Overview
Certified Information Security Manager (CISM) Course Overview This course teaches students about information security governance, information risk management, information security program development,
More informationEXAM PREPARATION GUIDE
EXAM PREPARATION GUIDE PECB Certified Data Protection Officer The objective of the PECB Certified Data Protection Officer examination is to ensure that the candidate has acquired the knowledge and skills
More informationCERTIFIED FINANCIAL PLANNER BOARD OF STANDARDS, INC. ANONYMOUS CASE HISTORIES NUMBER 30648
CERTIFIED FINANCIAL PLANNER BOARD OF STANDARDS, INC. ANONYMOUS CASE HISTORIES NUMBER 30648 This is a summary of a decision issued following the October 2017 hearings of the Disciplinary and Ethics Commission
More informationHow WhereScape Data Automation Ensures You Are GDPR Compliant
How WhereScape Data Automation Ensures You Are GDPR Compliant This white paper summarizes how WhereScape automation software can help your organization deliver key requirements of the General Data Protection
More informationCOSO Enterprise Risk Management
COSO Enterprise Risk Management COSO Enterprise Risk Management Establishing Effective Governance, Risk, and Compliance Processes Second Edition ROBERT R. MOELLER John Wiley & Sons, Inc. Copyright # 2007,
More informationReference Framework for the FERMA Certification Programme
Brussels, 23/07/2015 Dear Sir/Madam, Subject: Invitation to Tender Reference Framework for the FERMA Certification Programme Background The Federation of European Risk Management Associations (FERMA) brings
More informationWork Breakdown Structure
MossAtre.book Page 491 Sunday, February 9, 2003 7:01 PM APPENDIX Work Breakdown Structure The work breakdown structure in this appendix reflects the contents of the enclosed CD-ROM. TASK_DATA 491 1 Your
More informationEXAM PREPARATION GUIDE
When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 22301 Lead Implementer www.pecb.com The objective of the Certified ISO 22301 Lead Implementer examination is to ensure that the candidate
More informationEXAM PREPARATION GUIDE
When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 31000 Risk Manager www.pecb.com The objective of the PECB Certified ISO 31000 Risk Manager examination is to ensure that the candidate
More informationREPORT 2015/149 INTERNAL AUDIT DIVISION
INTERNAL AUDIT DIVISION REPORT 2015/149 Audit of the information and communications technology operations in the Investment Management Division of the United Nations Joint Staff Pension Fund Overall results
More informationModern Database Architectures Demand Modern Data Security Measures
Forrester Opportunity Snapshot: A Custom Study Commissioned By Imperva January 2018 Modern Database Architectures Demand Modern Data Security Measures GET STARTED Introduction The fast-paced, ever-changing
More informationCode Administration Code of Practice
Code Administration Code of Practice As part of the energy Codes Governance Review Ofgem proposed that a Code of Practice be established to facilitate convergence and transparency in code Modification
More informationEXAM PREPARATION GUIDE
When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO/IEC 27005 Risk Manager www.pecb.com The objective of the PECB Certified ISO/IEC 27005 Risk Manager examination is to ensure that the candidate
More informationBusiness Requirements Document (BRD) Template
Business Requirements Document (BRD) Template Following is a template for a business requirements document (BRD). The document includes many best practices in use today. Don t be limited by the template,
More informationPEFC Certification System Netherlands - Certification Procedures
PCSN SCHEME DOCUMENT PCSN IV Issue 2 10-03-2017 PEFC Certification System Netherlands - Certification Procedures PEFC Netherlands Kokermolen 11 3994 DG Houten The Netherlands Tel: +31 30 693 0040 Fax:
More informationRED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.
RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not
More informationHeads of Internal Audit Webinar. Integrated Assurance. 24 July In partnership with
Heads of Internal Audit Webinar Integrated Assurance 24 July 2013 In partnership with WELCOME TO THE WEBINAR The audio for this webcast will be broadcast via your PC speakers you do not need to dial in.
More informationThis tutorial has been prepared for computer science graduates to help them understand the basic-to-advanced concepts related to data mining.
About the Tutorial Data Mining is defined as the procedure of extracting information from huge sets of data. In other words, we can say that data mining is mining knowledge from data. The tutorial starts
More informationEvaluating Cybersecurity Coverage A Maturity Model. Presented to: ISACA Charlotte Chapter Vision for IT Audit 2020 Symposium
Discussion on: Evaluating Cybersecurity Coverage A Maturity Model Presented to: ISACA Charlotte Chapter Vision for IT Audit 2020 Symposium By: Eric C. Lovell PricewaterhouseCoopers LLP ( PwC ) March 24,
More informationREPORT 2015/010 INTERNAL AUDIT DIVISION
INTERNAL AUDIT DIVISION REPORT 2015/010 Audit of information and communications technology strategic planning, governance and management in the Investment Management Division of the United Nations Joint
More informationCOMPLIANCE BRIEF: VARONIS AND THE US SECURITY AND EXCHANGE COMMISSION S OFFICE OF COMPLIANCE INSPECTIONS AND EXAMINATIONS (SEC OCIE)
COMPLIANCE BRIEF: VARONIS AND THE US SECURITY AND EXCHANGE COMMISSION S OFFICE OF COMPLIANCE INSPECTIONS AND EXAMINATIONS (SEC OCIE) OVERVIEW The SEC s Office of Compliance Inspections and Examinations
More informationEnabling Data Governance Leveraging Critical Data Elements
Adaptive Presentation at DAMA-NYC October 19 th, 2017 Enabling Data Governance Leveraging Critical Data Elements Jeff Goins, President, Jeff.goins@adaptive.com James Cerrato, Chief, Product Evangelist,
More information<< Practice Test Demo - 2PassEasy >> Exam Questions CISM. Certified Information Security Manager. https://www.2passeasy.
Exam Questions CISM Certified Information Security Manager https://www.2passeasy.com/dumps/cism/ 1.Senior management commitment and support for information security can BEST be obtained through presentations
More informationEXAM PREPARATION GUIDE
When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 22000 Lead Implementer www.pecb.com The objective of the Certified ISO 22000 Lead Implementer examination is to ensure that the candidate
More informationAPPROVAL SHEET PROCEDURE INFORMATION SECURITY MANAGEMENT SYSTEM CERTIFICATION. PT. TÜV NORD Indonesia PS - TNI 001 Rev.05
APPROVAL SHEET PROCEDURE INFORMATION SECURITY MANAGEMENT SYSTEM CERTIFICATION PT. TÜV NORD Indonesia PS - TNI 001 Rev.05 Created : 20-06-2016 Checked: 20-06-2016 Approved : 20-06-2016 Indah Lestari Karlina
More informationM&A Cyber Security Due Diligence
M&A Cyber Security Due Diligence Prepared by: Robert Horton, Ollie Whitehouse & Sherief Hammad Contents Page 1 Introduction 3 2 Technical due diligence goals 3 3 Enabling the business through cyber security
More informationRegulating Cyber: the UK s plans for the NIS Directive
Regulating Cyber: the UK s plans for the NIS Directive September 2017 If you are a digital service provider or operate an essential service then new security and breach notification obligations may soon
More informationGUIDELINES ON THE CONTINUING PROFESSIONAL DEVELOPMENT (CPD) HOURS. Appendix I. Guidelines on the Continuing Professional Development (CPD) Hours
Appendix I Guidelines on the Continuing Professional Development (CPD) Hours Table of Contents Document Revision Control... i 1. Introduction... 1 2. Objectives... 1 3. Applicability... 1 4. Definition
More informationGlobal Statement of Business Continuity
Business Continuity Management Version 1.0-2017 Date January 25, 2017 Status Author Business Continuity Management (BCM) Table of Contents 1. Credit Suisse Business Continuity Statement 3 2. BCM Program
More informationRSB Standard for participating operators
Type of document: RSB International Standard Status: Approved for certification Date: 1 March 2011 Version 2.0 RSB Standard for participating operators RSB reference code: RSB-STD-30-001 Published by the
More informationPRIVACY AND ONLINE DATA: CAN WE HAVE BOTH?
PAPER PRIVACY AND ONLINE DATA: CAN WE HAVE BOTH? By Peter Varhol www.actian.com ignificant change has arrived in how computing and storage consumes data concerning individuals. Merchants, data collection
More informationNHS Fife. 2015/16 Audit Computer Service Review Follow Up
NHS Fife 2015/16 Audit Computer Service Review Follow Up Prepared for NHS Fife April 2016 Audit Scotland is a statutory body set up in April 2000 under the Public Finance and Accountability (Scotland)
More informationAchieving regulatory compliance by improving data quality
Achieving regulatory compliance by improving data quality This White Paper outlines some of the techniques used by a Tier 1 global bank to implement a regulatory metrics platform (RegMetrics) to obtain
More informationCybersecurity and Examinations
Tim Segerson, Deputy Director NCUA E&I Cybersecurity and Examinations October 6, 2016 Chicago, IL Connected Devices Declining costs + increased bandwidth + powerful algorithms will spur a new information
More informationOverview. Consolidating SCM Infrastructures - Migrating between Tools -
- Migrating between Tools - Neal R. Firth, SageRight, Inc. An affiliate of Vizim Worldwide, Inc. 1 Overview Introduction Organizational Factors Business and People Product Factors Features and Usage The
More informationEXAM PREPARATION GUIDE
When Recognition Matters EXAM PREPARATION GUIDE PECB Certified Management System Auditor www.pecb.com The objective of the PECB Certified Management System Auditor examination is to ensure that the candidates
More informationData Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016
Data Protection Practical Strategies for Getting it Right Jamie Ross Data Security Day June 8, 2016 Agenda 1) Data protection key drivers and the need for an integrated approach 2) Common challenges data
More informationXcelerated Business Insights (xbi): Going beyond business intelligence to drive information value
KNOWLEDGENT INSIGHTS volume 1 no. 5 October 7, 2011 Xcelerated Business Insights (xbi): Going beyond business intelligence to drive information value Today s growing commercial, operational and regulatory
More informationCalifornia ISO Audit Results for 2011 SSAE 16 & Looking Forward for 2012 December 15, 2011
www.pwc.com California ISO Audit Results for 2011 SSAE 16 & Looking Forward for 2012 December 15, 2011 Agenda SSAE 16 Background Results of Audit Scope of Audit Looking Forward Closing Thoughts Slide 1
More informationTechnical Security Standard
Technical Security Standard Title: Minimum Controls TSS Version: 1.1 Effective Date July 2018 This Standard defines the minimum baseline security controls and Summary: processes required for a given Information
More informationGOAL BASED NEW SHIP CONSTRUCTION STANDARDS. Development of the Interim guidelines for goal-based standards safety level approach SUMMARY
E MARITIME SAFETY COMMITTEE 99th session Agenda item 6 MSC 99/6/1 12 March 2018 Original: ENGLISH GOAL BASED NEW SHIP CONSTRUCTION STANDARDS Development of the Interim guidelines for goal-based standards
More informationThe Data Organization
C V I T F E P A O TM The Data Organization Best Practices Metadata Dictionary Application Architecture Prepared by Rainer Schoenrank January 2017 Table of Contents 1. INTRODUCTION... 3 1.1 PURPOSE OF THE
More informationOUR FINAL ASSURANCE PLAN FOR PR19
OUR FINAL ASSURANCE PLAN FOR PR19 Contents 1 2 3 4 5 6 7 8 Introduction and background Our governance structure for PR19 What information needs assuring? Forms of assurance Our risk assessment process
More informationAgenda. Bibliography
Humor 2 1 Agenda 3 Trusted Digital Repositories (TDR) definition Open Archival Information System (OAIS) its relevance to TDRs Requirements for a TDR Trustworthy Repositories Audit & Certification: Criteria
More informationREPORT 2015/186 INTERNAL AUDIT DIVISION
INTERNAL AUDIT DIVISION REPORT 2015/186 Audit of information and communications technology operations in the Secretariat of the United Nations Joint Staff Pension Fund Overall results relating to the effective
More informationSolvency II Data quality and controls
Solvency II Data quality and controls Presentation by David Roberts 15 July 2011 Regulatory guidance on data quality EIOPA/LLOYD S CEIOPS DOC 37/09 (formerly CP43) paragraphs 3.56 to 3.90 Level 1 text:
More informationITG. Information Security Management System Manual
ITG Information Security Management System Manual This manual describes the ITG Information Security Management system and must be followed closely in order to ensure compliance with the ISO 27001:2005
More informationCOMPLIANCE BRIEF: HOW VARONIS HELPS WITH PCI DSS 3.1
COMPLIANCE BRIEF: HOW VARONIS HELPS WITH OVERVIEW The Payment Card Industry Data Security Standard (PCI-DSS) 3.1 is a set of regulations that govern how firms that process credit card and other similar
More informationAUDIT OF ICT STRATEGY IMPLEMENTATION
APPENDIX A 2 1. Background AUDIT OF ICT STRATEGY IMPLEMENTATION 1.1. This report summarises the findings from the audit of ICT Strategy Implementation. This was a planned audit assignment which was undertaken
More informationMedDRA BEST PRACTICES. Maintenance and Support Services Organization s (MSSO) Recommendations for Implementation and Use of MedDRA
MedDRA BEST PRACTICES Maintenance and Support Services Organization s (MSSO) Recommendations for Implementation and Use of MedDRA Acknowledgements ACKNOWLEDGEMENTS MedDRA trademark is registered by IFPMA
More informationPOLICY FOR THE USE OF THE LIFE CERTIFICATION LOGO AND LIFE CERTIFYING BODIES ACCREDITATION LOGO. Version 2.0 International - English LIFE-IN-MP03-2.
POLICY FOR THE USE OF THE LIFE CERTIFICATION LOGO AND LIFE CERTIFYING BODIES ACCREDITATION LOGO LIFE-IN-MP03- Version International - English (APRIL/2014) LIFE-IN-MP03--English 2 OBJECTIVE The document
More informationFrequently Asked Questions
Frequently Asked Questions What are Alacra Reference Data services? Alacra cross-references and maps multiple data sources together to create one clean, de-duped and consistently formatted file. REFERENCE
More informationAudit Report. Chartered Management Institute (CMI)
Audit Report Chartered Management Institute (CMI) 10 October 2012 Note Restricted or commercially sensitive information gathered during SQA Accreditation monitoring activities is treated in the strictest
More informationTHE CYBERSECURITY LITERACY CONFIDENCE GAP
CONFIDENCE: SECURED WHITE PAPER THE CYBERSECURITY LITERACY CONFIDENCE GAP ADVANCED THREAT PROTECTION, SECURITY AND COMPLIANCE Despite the fact that most organizations are more aware of cybersecurity risks
More informationBest Practices in Data Governance
Best Practices in Data Governance July 22, 2011 Miami Presented by Malcolm Chisholm Ph.D. mchisholm@refdataportal.com Telephone 732-687-9283 Fax 407-264-6809 www.refdataportal.com www.bizrulesengine.com
More informationBuilding Information Modeling and Digital Data Exhibit
Document E203 2013 Building Information Modeling and Digital Data Exhibit This Exhibit dated the day of in the year is incorporated into the agreement (the Agreement ) between the Parties for the following
More informationGetting Started with IT Service Management
Getting Started with IT Service Management SMSG 3rd March 2014 BCS Bristol Branch BCS Service Management Specialist Group The Service Management Specialist Group provides an avenue for developing and promoting
More informationCPA Exam and Licensure Information and FAQs
CPA Exam and Licensure Information and FAQs 1 CPA Exam and Licensure Information and FAQs July 2016 Dr. Gary Colbert, Director of Accounting Programs, University of Colorado Denver 1 Education and experience
More informationMOBILE VOICE SERVICE SCHEDULE
MOBILE VOICE SERVICE SCHEDULE 1. About this document This Service Schedule forms part your Contract. In the event of any inconsistency between this Service Schedule and another clause of your Contract,
More informationWhite Paper: FSA Data Audit
White Paper: SA Data Audit Background In most insurers the internal model will consume information from a wide range of technology platforms. he prohibitive cost of formal integration of these platforms
More informationDirective on Security of Network and Information Systems
European Commission - Fact Sheet Directive on Security of Network and Information Systems Brussels, 6 July 2016 Questions and Answers The European Parliament's plenary adopted today the Directive on Security
More informationTrillium Consulting. Data Governance. Optimizing Business Outcomes through Data and Information Assets
Trillium Consulting Data Governance Optimizing Business Outcomes through Data and Information Assets DAMA Indiana Winter Meeting Indianapolis, Indiana January 20, 2011 Jim Orr, Global Director Enterprise
More informationPlan a Pragmatic Approach to the new EU Data Privacy Regulation
AmChamDenmark event: EU Compliant & Cyber Resistant Plan a Pragmatic Approach to the new EU Data Privacy Regulation Janus Friis Bindslev, Partner Cyber Risk Services, Deloitte 4 February 2016 Agenda General
More informationFIBO Operational Ontologies Briefing for the Object Management Group
FIBO Operational Ontologies Briefing for the Object Management Group March 20, 2013, Reston, VA David Newman Strategic Planning Manager, Senior Vice President, Enterprise Architecture Chair, Semantic Technology
More informationComprehensive Data Quality Improvement through Data Governance An Executive Overview
Comprehensive Data Quality Improvement through Data Governance An Executive Overview Introducing MIKE2.0 An Open Source Methodology for Information Development http://www.openmethodology.org Management
More informationEXAM PREPARATION GUIDE
EXAM PREPARATION GUIDE PECB Certified ISO/IEC 38500 Lead IT Corporate Governance Manager The objective of the PECB Certified ISO/IEC 38500 Lead IT Corporate Governance Manager examination is to ensure
More informationEXAM PREPARATION GUIDE
EXAM PREPARATION GUIDE PECB Certified ISO 50001 Lead Auditor The objective of the PECB Certified ISO 50001 Lead Auditor examination is to ensure that the candidate has the knowledge and skills to plan
More informationMATLAB-Based Policy Simulator
DRAFT MATLAB-Based Policy Simulator Regulatory & Risk Analytics (RRA) Prepared by Seth Aslin Date: October 2013 Presentation Outline Background and context to Project Navigator General project objectives
More informationAnnouncement date: December 1, 2009 New program launch date: May 1, 2010
Overview New Certified Management Accountant (CMA ) Certification Program Announcement date: December 1, 2009 New program launch date: May 1, 2010 Why did ICMA decide to update the curriculum and change
More informationHCS 2012 and the June 2015 Deadline
A Practical Primer on Pesticides Seminar Washington, DC HCS 2012 and the June 2015 Deadline April 24, 2015 David G. Sarvadi Partner Keller and Heckman LLP 1001 G Street NW, Suite 500 West Washington, DC
More informationOCM ACADEMIC SERVICES PROJECT INITIATION DOCUMENT. Project Title: Online Coursework Management
OCM-12-025 ACADEMIC SERVICES PROJECT INITIATION DOCUMENT Project Title: Online Coursework Management Change Record Date Author Version Change Reference March 2012 Sue Milward v1 Initial draft April 2012
More informationCYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME
FACULTY OF LAW DEPARTEMENT: CIVIL LAW MASTER STUDY THEME: CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME Mentor: Prof. Ass. Dr. Xhemajl Ademaj Candidate: Abdurrahim Gashi Pristinë, 2015 Key words List
More informationRequest for Qualifications for Audit Services March 25, 2015
Request for Qualifications for Audit Services March 25, 2015 I. GENERAL INFORMATION A. Purpose This Request for Qualifications (RFQ) is to solicit a CPA firm with which to contract for a financial and
More information-archiving. project roadmap CHAPTER 1. archiving Planning, policies and product selection
INSIDE email archiving Planning, policies and product selection CHAPTER 1 Ready to dive into email archiving? Try this four-phased approach to get your project up and running Email-archiving project roadmap
More informationEXAM PREPARATION GUIDE
When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 14001 Lead Auditor www.pecb.com The objective of the PECB Certified ISO 14001 Lead Auditor examination is to ensure that the candidate
More informationData Protection Policy
Data Protection Policy Addressing the General Data Protection Regulation (GDPR) 2018 [EU] and the Data Protection Act (DPA) 2018 [UK] For information on this Policy or to request Subject Access please
More informationCLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS
CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS Introduction The world of cybersecurity is changing. As all aspects of our lives become increasingly connected, businesses have made
More informationReviewed by ADM(RS) in accordance with the Access to Information Act. Information UNCLASSIFIED.
Assistant Deputy Minister (Review Services) Reviewed by in accordance with the Access to Information Act. Information UNCLASSIFIED. Security Audits: Management Action Plan Follow-up December 2015 1850-3-003
More informationWIRELESS DEVICES: ACCEPTABLE USE AND GUIDELINES
Intermediate School District #917 WIRELESS DEVICES: ACCEPTABLE USE AND GUIDELINES Procedures Manual April 2009 Table of Contents Overview 3 Definitions 3 General Guidelines 4 Eligibility Requirements 5
More informationEXAM PREPARATION GUIDE
EXAM PREPARATION GUIDE PECB Certified ISO/IEC 17025 Lead Auditor The objective of the PECB Certified ISO/IEC 17025 Lead Auditor examination is to ensure that the candidate possesses the needed expertise
More informationEXAM PREPARATION GUIDE
EXAM PREPARATION GUIDE PECB Certified ISO 21500 Lead Project Manager The objective of the PECB Certified ISO 21500 Lead Project Manager examination is to ensure that the candidate has the knowledge and
More informationWHEN THE GOING GETS TOUGH, THE TOUGH GET GOING
WHEN THE GOING GETS TOUGH, THE TOUGH GET GOING OVERCOMING THE CYBER RISK APPETITE CHALLENGE APRIL 2018 AUTHORS Michael Duane, Partner Rico Brandenburg, Principal Matthew Gruber, Engagement Manager The
More informationChapter 10. Administration
Chapter 10 Administration This Page Left Blank Intentionally CTAS User Manual 10-1 Administration: Introduction The Admin section is where you enter your local government s required and optional system
More informationEuropean Risk Management Certification. Candidate Information Guide
European Risk Management Certification Candidate Information Guide Presentation of FERMA Certification 3 Benefits 4 Eligibility criteria 5 Application and fees Examination details Syllabus: FERMA rimap
More informationEarly Intervention Indiana First Steps Indiana First Steps HIPAA Testing Plan
Testing and Certifying HIPAA Compliance with Transaction Sets Contingency Testing Plan... 2 Testing Description... 2 Testing Procedures for Providers/Payees... 3 Testing Protocols... 4 Six Plus One Levels
More informationSAS 70 & SSAE 16: Changes & Impact on Credit Unions. Agenda
SAS 70 & SSAE 16: Changes & Impact on Credit Unions John Mason CISM, CISA, CGEIT, CFE SingerLewak LLP October 19, 2010 Agenda Statement on Auditing Standards (SAS) 70 background Background & purpose Types
More informationUnderstanding Software Engineering
McBreen.book Page 3 Wednesday, August 1, 2001 10:08 PM Chapter 1 Understanding Software Engineering In order to understand software engineering, we first need to look at the projects that were reported
More informationISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006
ISO / IEC 27001:2005 A brief introduction Dimitris Petropoulos Managing Director ENCODE Middle East September 2006 Information Information is an asset which, like other important business assets, has value
More informationGreen Governance Growth
G3 Data Centers Green Governance Growth DELIVER MORE WITH LESS The economic downturn changed the dynamics of the business world. It shifted the measure of success, driving companies to rethink how they
More informationValidation of a CMS Software
Validation of a CMS Software GxP Webinar Paul Daniel Senior Regulatory Compliance Instructor Vaisala, Inc. Practical Webinar Stuff Challenges with your audio connection? Try calling by phone: U.S. & Canada
More informationImportant Information
Important Information Important Information Effective from 13 January 2018 1. Your information 1.1 Who we are We are Coutts & Co, of 440 Strand, London WC2R OQS. We are a member of The Royal Bank of Scotland
More informationSC32 WG2 Metadata Standards Tutorial
SC32 WG2 Metadata Standards Tutorial Metadata Registries and Big Data WG2 N1945 June 9, 2014 Beijing, China WG2 Viewpoint Big Data magnifies the existing challenges and issues of managing and interpreting
More informationTEL2813/IS2820 Security Management
TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management
More informationDATA PROTECTION POLICY THE HOLST GROUP
DATA PROTECTION POLICY THE HOLST GROUP INTRODUCTION The purpose of this document is to provide a concise policy regarding the data protection obligations of The Holst Group. The Holst Group is a data controller
More informationEXIN BCS SIAM Foundation. Sample Exam. Edition
EXIN BCS SIAM Foundation Sample Exam Edition 201704 Copyright EXIN Holding B.V. and BCS, 2017. All rights reserved. EXIN is a registered trademark. SIAM is a registered trademark. ITIL is a registered
More informationCalifornia Independent System Operator Corporation Fifth Replacement Electronic Tariff
Table of Contents 17. Transmission Ownership Rights (TORs)... 2 17.1 TRTC Instructions... 2 17.1.1 Responsibility to Create TRTC Instructions... 2 17.1.2 TOR Scheduling Coordinator Responsibilities...
More informationXBRL US Domain Steering Committee Taxonomy Review
XBRL US Domain Steering Committee Taxonomy Review for XBRL US Work In Process Taxonomy 2016 As Approved by the DSC on September 8, 2016 Prepared by: Scott Theis, DSC Chairman Campbell Pryde Michelle Savage
More informationEXAM PREPARATION GUIDE
EXAM PREPARATION GUIDE PECB Certified ISO/IEC 27005 Risk Manager The objective of the Certified ISO/IEC 27005 Risk Manager examination is to ensure that the candidate has the knowledge and the skills to
More information