We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byKeagan Mule
Modified over 2 years ago
1 WHEN THE REGULATOR COMES KNOCKING – 5 MYTHS © Copyright Ellen Bessner Ellen Bessner Email: email@example.com@babinbessnerspry.com Tel: 647-725-2606
© Copyright Ellen Bessner2 BOARD ASKS IN-HOUSE: WHAT TO DO?
INTRODUCTION: ARE YOU PREPARED? © Copyright Ellen Bessner 3 Where is highest risk? Risk changing? Compliance risk plan? Assess Risk/ Heat Map
INTRODUCTION: ARE YOU PREPARED? © Copyright Ellen Bessner 4 Reputational Criminal Civil Regulatory Internal controls/governance Potential Risks
INTRODUCTION: ARE YOU PREPARED? © Copyright Ellen Bessner 5 Privacy Employment Client Issues Regulatory Infractions Corruption of Foreign Public Officials Potential Risks
MYTH #1 : EARLY IDENTIFICATION OF ISSUE? PRACTICE OSTRICH PHENOMENON © Copyright Ellen Bessner 6
7 Assess Seriousness of Risk Know the RegulatorS Build Team/PlanDevelop Protocols BETTER OPTION: USE EARLY DETECTION
© Copyright Ellen Bessner8 Collection of Information Develop Contingency Plans and Possible Responses E & O; D & O Coverage [Understand Limits] BETTER…USE EARLY DETECTION
MYTH #2: “WE CAN JUST FIX THE PROBLEM” © Copyright Ellen Bessner9
BETTER THAN QUICK FIX… © Copyright Ellen Bessner10 CONVINCE BOARD TO CONSIDER LONG TERM SOLUTION Develop Plan for long term to be perceived as good corporate citizen Short terms stock pain for ultimate stock gain (survival of the company) Change problem into Opportunity (Maple Leaf Foods Michael McCain, won leadership/CEO prizes for his handling of Listeria crisis)
BETTER THAN QUICK FIX… © Copyright Ellen Bessner11 MAY NEED TO SPEND ON OUTSIDE EXPERTISE Forensics or independent accountants review books and calculate damagesLawyer to complement the internal knowledge and expertiseWho will liaise with regulatorsStrategize with PR team
MYTH #3: FIND A TARGET TO BLAME © Copyright Ellen Bessner12
BETTER… © Copyright Ellen Bessner13 Conduct thorough investigation and become informed (ex. Lead paint in toys – know your suppliers; Tylenol drug tampering causing death; what went wrong? Change packaging) Don’t make sloppy mistakes (wrong scapegoat) Can you enter into settlement with employee to go quietly and take blame with script? Can company prove this was the cause?
MYTH #4: PREMATURE ADMISSIONS © Copyright Ellen Bessner14
BETTER… © Copyright Ellen Bessner15 BREATH AND SAY NOTHING If surprised, keep them in meeting room until contact necessary counsel with specific industry experience Check warrant and other documents Do not be overly compliant- give them ONLY what they ask for (ensure legally entitled)
MYTH #5: DENY EVERYTHING! © Copyright Ellen Bessner16
BETTER… © Copyright Ellen Bessner17 DO NOT DENY OR ADMIT Do not compromise company’s position- destroy documents (Conrad Black/Panasonic-Executive 1 Year in Prison; Company $4.5M) Keep copy of what is given and get receipt for originals
BETTER… © Copyright Ellen Bessner18 DO NOT DENY OR ADMIT Do not alert third parties who might also be investigated Accompany investigator and take detailed notes
BETTER: HAVE DUCKS IN A ROW © Copyright Ellen Bessner19
CONCLUSION Assess vulnerabilities – Risk Heat Map Be prepared with PLAN and TEAM Review/adjust plan and team Respond quickly Get ahead of the regulator (usually easy) Continue to review and update policies – top down Goal: Mitigate risks, especially reputational © Copyright Ellen Bessner20
MY PARTING NOTE: Terry Flynn professor of crisis management at McMaster University: “… There are two courts that an organization operates within. One is the court of law and the other one is the court of public opinion and sometimes you might win it in the court of law but lose it in the court of public opinion and therefore, not have any customers at the end of the day to sell your products to.” Ellen Bessner: “Wouldn’t you like to win in both – court of law and public opinion?” © Copyright Ellen Bessner21
THANK YOU © Copyright Ellen Bessner 22 Ellen Bessner Email: firstname.lastname@example.org@babinbessnerspry.com Tel: 647-725-2606
Section 12.2 You and the Legal System Back to Table of Contents.
Management & tactics for in-house counsel operating in the ‘Zone of Insolvency’ IBA Corporate Counsel Forum October 6, Madrid E. Leigh Dance, President,
New EU General Data Protection Regulation Conference 2016 Managing a Data Breach Prevention-Detection-Mitigation By Gerard Joyce Dun Laoghaire Feb 24 th.
Are you ready for a recall? Medical Device Regulatory, Reimbursement and Compliance Congress March 28, 2007 Willie R. Bryant, Jr. Consultant Stericycle,
Session 5 Anti-Money Laundering & Financial Crime Conducting or Supporting the Investigation Process Presented by ERM Institute Monday, 24 February 2014.
Internal Investigations: A primer Bob Cooper May 30, 2007.
Outsourcing Policy & Procedures An Overview for Staff Prepared by MSM Compliance Services Pty Ltd.
HOW TO AVOID COMMON DATA BREACH PITFALLS IAPP Privacy Academy 2014.
Building a Compliance Risk Monitoring Program HCCA Compliance Institute New OrleansApril 19, 2005 Lois Dehls Cornell, Esq. Assistant Vice President, Deputy.
The Third Annual Medical Device Regulatory, Reimbursement and Compliance Congress 1 How to Implement a Private Payer Reimbursement Strategy Barbara Grenell.
What Keeps Your Board Up at Night? Sylvia Kerrigan, Exec. VP, General Counsel & Secretary – Marathon Oil Sean Gorman, Partner – Bracewell & Giuliani.
Criminal Investigation Internal Revenue Service Internal Revenue Service Criminal Investigation (Accountants with Guns) Andrew T. Hromoko, Jr. Special.
Department of Innovation & Technology City of Boston Five Key Ways to Be a Successful Project Manager March 2014.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Marlan S. Bustos 26 April 2006 My Internship Experience July 5, 2005–September 29, 2005.
Why are Small and Mid-Size Companies Easy Targets for Hackers, and What can You do to Protect Yourself? 2/11/2015 Asher Dahan.
Q UINCY COLLEGE Paralegal Studies Program Paralegal Studies Program Interviewing & Investigation LAW-123 Introduction to Interviewing and Investigating.
Freshfields Bruckhaus Deringer LLP Global investigations What to advise your board Marius Berenbrok Edward Braham Matthew Herman Melissa Thomas 29 February.
Strategic Communications Training Crisis Communications X State MDA 1.
Copyright© 2010 WeComply, Inc. All rights reserved. 5/7/2015 Careful Communication.
An Introduction to professional services. The professional services The professional services support businesses of all sizes across the economy, providing.
© 2010 The McGraw-Hill Companies, Inc. Managerial Accounting and the Business Environment Chapter 1.
Top 10 Critical Reasons - Why To Get ISO 9001 Certification
© 2011 The Magnes Group Inc. E&O INSURANCE: THINK YOU KNOW IT ALL? THING AGAIN….
Surviving a Privacy Exam Barbara B. Fitch 2 nd VP–Market Conduct & Compliance National Life Insurance Company October 3, 2005.
LLCS Serving the World LLCS international Welcome to the Specialists in Strategic Planning Copyright © LLCS 2011.
WHY CHOOSE CEO-PE? We employ International Association of Privacy Professionals (IAPP) Certified and Health Insurance Portability & Accountability Act.
GENERATING AND PROTECTING BUSINESS IDEAS AS Business Studies Unit 1.
Is Your Background Check Process Compliant?. 2 © Copyright 2015 ADP, LLC. Proprietary and Confidential Information. Agenda Privileged & Confidential.
Navigating a Corporate Crisis © 2012 Fox Rothschild LLP Navigating a Corporate Crisis Pre-Crisis Phase September 20, 2012 Presented by Dori K. Stibolt.
© 2015 Kilpatrick Townsend November 5-6, 2015 Tribal In-House Counsel Association Inaugural Conference Keynote Address Venus McGhee Prince.
Is Vendor Management The New Risk Management? Douglas DeGrote.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
LAW SEMINARS INTERNATIONAL CLOUD COMPUTING: LAW, RISKS AND OPPORTUNITIES Developing Effective Strategies for Compliance With the HITECH Act and HIPAA’s.
Anti Money Laundering (AML) An Overview for Staff Prepared by MSM Compliance Services Pty Ltd.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Equity Housing Group Risk Management. 05 August 2002 © MazarsEquity Housing Group: Risk Management 2 Agenda Introduction: what is Risk Management? The.
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
STRATEGIC PLANNING FOR Post-Clearance Audit (PCA)
Customer Service Charter Introduction About SIMWEN A simulated work environment that will enable the student to complete 8 of the 10 units in Certificate.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
Chapter 2 Modern Private Security
MENTORING THE TRAINEE MARINE ENGINEER A Programme of the Institute of Marine Engineers (I) for Student Members.
Implementing and Auditing Ethics Programs
Overview of ISO Requirements
Chapter 12 Workplace Legal MattersSucceeding in the World of Work You and the Legal System 12.2 SECTION OPENER / CLOSER INSERT BOOK COVER ART Section 12.2.
University of York Planning for Process Review. Using our Vision, Strategy and Medium Term Planning to inform our business and process change agenda..
Welcome to Awras Consultancy Ltd. Portfolio Awras Consultancy Ltd. Portfolio
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
© 2017 SlidePlayer.com Inc. All rights reserved.