Compliance is Pretty Important, I Guess Florida Gulf Coast ARMA Meeting.

Slides:



Advertisements
Similar presentations
IT Security Policy Framework
Advertisements

Red Flag Rules: What they are? & What you need to do
Big Data - Ethical Data Use Kimberlin Cranford. Ethical Use in the Era of Big Data  Landscape has Changed  Attitudes about Big Data  PII, Anonymous,
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
Privacy Laws & Higher Education. Agenda 1.Five Privacy Laws a.FERPA b.HIPAA c.GLB d.FACTA Disposal Rule e.CAN-SPAM 2.Overview of the Laws a.What does.
© 2014 ACA International. All Rights Reserved. Obtaining Optimum Compliance Performance Foundational Training on ACA’s Professional Practices Management.
Gramm-Leach-Bliley Act for Financial Aid Val Meyers Associate Director Michigan State University.
ROUNDTABLE LEADERSHIP Rob Northwood, Senior Compliance Officer, First Mortgage Co. Billy Parsley, Vice President, BancFirst Bruce Schultz, Senior Vice.
© 2015 Sherman & Howard L.L.C. TO B OR NOT TO B YOD Emily Keimig, Esq
EDiscovery and Records Management. Records Management- Historical Perspective- Paper Historically- Paper was the “Corporate Memory” – a physical entity.
Peter Brudenall & Caroline Evans- Simmons & Simmons Marsh Technology Conference 2005 Zurich, Switzerland. Managing the Security Landscape – Legal and Risk.
Security Controls – What Works
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
1 SAP Security and Controls Use of Security Compliance Tools to Detect and Prevent Security and Controls Violations.
Chapter 4 Internal Control Bus 319 Accounting Information Systems.
IT Security Challenges In Higher Education Steve Schuster Cornell University.
Audit Next Generation Monitoring, Compliance & Reporting
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
Banks and the Privacy of Medical Information 8 th National HIPAA Summit March 8, 2004 Joy Pritts, JD Health Policy Institute Georgetown University
INFORMATION SECURITY REGULATION COMPLIANCE By Insert name dd/mm/yyyy senior leadership training on the primary regulatory requirements,
Managing Risk in Cloud Computing Contracts Henry Ward and Todd Taylor April 30, 2015.
11 – E-Commerce 1. What is Electronic Commerce? 2. What is a contract? 3. Elements of an enforceable contract 4. Standard terms of a contract 5. Form and.
GUIDE TO SMALL BUSINESS RECORDKEEPING. CONTENTS INTRODUCTION BASIC CONSIDERATIONS FURTHER CONSIDERATIONS WHAT TO KEEP & FOR HOW LONG SETTING UP YOUR BOOKKEEPING.
2015 ANNUAL TRAINING By: Denise Goff
1 General Awareness Training Security Awareness Module 1 Overview and Requirements.
THE CLOUD Risks and Benefits from the Business, Legal and Technology Perspective September 11, 2013 KEVIN M. LEVY, ESQ. GUNSTER YOAKLEY.
Identity Protection (Red Flag/PCI Compliance/SSN Remediation) SACUBO Fall Workshop Savannah, GA November 3, 2009.
Information Security & Compliance Financial Services Workshop February 10, 2010.
Sharing Information With Affiliates and Third Parties F. Jay Meyer Vice President & Senior Counsel TD Bank, N.A. Portland, Maine.
Advanced Program in Auditing and Accounting Regulation Module 12 Enhancing Statutory Audit Quality from a Financial Regulator’s Perspective Presenter:
ALEX STEWART INTERNATIONAL’S CODE OF PROFESSIONAL CONDUCT.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
Records Management Benchmarking: Choosing a Standard Presentation by Martin Bradley.
Efficiency and Compliance Voice Documentation for Financial Services.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Connecting the Dots A Practical Approach to Integrating Compliance, Risk and Quality Jody Ann Noon RN, JD Partner Health Care Regulatory Practice.
Cloud Compliance Considerations March 24, 2015 | Jason Smith, CISSP.
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
Bryce K. Earl, Esq. and Thomas G. Grace, Esq Presentation To: Association of Corporate Counsel January 26, 2010 ______________________________ Covenants.
FACTA Medical Chicago Regional Training Conference Indianapolis, Indiana June 14, 2006 David Lafleur, Policy Analyst-Compliance Federal Deposit Insurance.
Energize Your Workflow! ©2006 Merge eMed. All Rights Reserved User Group Meeting “Energize Your Workflow” May 7-9, Security.
Robert J. Scott. Agenda Licensing Models Perpetual vs. Subscription User vs. Device Agreement Types Microsoft Business and Services Agreement Online Subscription.
CIBC Global Services © 2006, Echoworx Corporation Ubiquity of Security Compliance and Content Management Stephen Dodd Director – Enterprise Accounts.
World Bank International Standards and their Measures for Financial Institutions and Non-Financial Businesses and Professions to Prevent Money Laundering.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Chapter 1: Information Security Fundamentals Security+ Guide to Network Security Fundamentals Second Edition.
Chapter 4: Laws, Regulations, and Compliance
An Overview THE AUDIT PROCESS. MAJOR PHASES IN AN AUDIT Client acceptance and retention Establish terms of the engagement Plan the audit Consider internal.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Compliance at the Crossroads: How can the Compliance Profession Move to the Second Generation? A Practical Approach to Integrating Compliance, Risk and.
MAC Internal Audit Dept.
CyberLaw. Assignment Review Cyber LawCyberLaw 6/23/2016 CyberLaw 3 Securing an Organization  This Chat: CyberLaw and Compliance –Forensics –Privacy.
TYLER GROUP
Washington State Auditor’s Office Third Party Receipting Presented to Washington Public Ports Association June 2016 Peg Bodin, CISA.
Bank Policies and Procedures Consultant Bank Audit San Francisco.
Presented by: David Reid, DBA International
An Information Security Management System
PCard Sensitive and Protected Information Procedures
OHIMA 2010.
Regulatory Compliance
Outsource Contracting Law, Policy, & Process
Auditing Cloud Services
E&O Risk Management: Meeting the Challenge of Change

Presented by Harry A. Strausser III Collections Industry Consultant
Institutional Privacy Challenges
Case Study: Vendor Readiness for HIPAA Compliance
Proprietary to McKesson Information Solutions Inc.
Managing Compliance Early: System Development
Presentation transcript:

Compliance is Pretty Important, I Guess Florida Gulf Coast ARMA Meeting

Introduction and Disclaimer I’m Me I’m Not Your Attorney (at least not yet…)

Overview Perspective on Compliance Financial Compliance Elements Areas of Concern Recommendations Q & A

Perspective on Compliance Perfect Compliance Reasonable Standard of Professional Care

Financial Compliance Elements Client/Record Types  Student Records  Bank Records  Auto Loans  Corporate  Explanation of Benefits  Credit Reports  Credit Card Information Laws/Standards  Family Educational Rights and Privacy Act (FERPA)  Gramm-Leach-Bliley (GLBA)  Sarbanes-Oxley (SOX)  HIPAA  Fair and Accurate Credit Transactions Act (FACTA)  Fair Credit Reporting Act (FCRA)  Payment Card Industry Data Security Standard (PCI)

Areas of Concern Access/Transmission  Privacy and Security vs Accessibility Maintenance  Hard Copies  Digital Copies  Data

Recommendations Know Your Clients Know Yourself Know Your Vendors (Kn)Adjust As Needed

Recommendations Know Your Clients

Recommendations Know Yourself  Risk Assessments  Product Specific Issues  Third Party Audits  Controls

Recommendations Know Your Vendors  Subcontractor Agreements  Digital Records Vendors  Software/IT Solutions

Recommendations (Kn)Adjust As Needed Business Associate Agreements Vendor Agreements Internal Policies and Procedures Training

Any Questions?

Mark Hinely Regulatory Compliance Specialist KirkpatrickPrice