Protecting Business Assets While Enabling Performance

Slides:



Advertisements
Similar presentations
Module N° 4 – ICAO SSP framework
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
What is GARP®? GARP® is an Acronym for Generally Accepted Recordkeeping Principles ARMA understands that records must be.
Westbrook Technologies from Document Management’s Role in HIPAA.
Tracer Call Center Recording and Quality Assurance.
1 INTERNAL CONTROLS A PRACTICAL GUIDE TO HELP ENSURE FINANCIAL INTEGRITY.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Security Controls – What Works
WHY CHOOSE CEO-PE?  We employ International Association of Privacy Professionals (IAPP) Certified and Health Insurance Portability & Accountability Act.
Developing a Records & Information Retention & Disposition Program:
Internal Control Concepts A Guide for Deans, Directors, and Department Chairs.
SAFA- IFAC Regional SMP Forum
Achieving our mission Presented to Line Staff. INTERNAL CONTROLS What are they?
Elements of Internal Controls Preventing Fraud, Waste, and Abuse in Urban and Rural Transit Systems.
Control environment and control activities. Day II Session III and IV.
An Educational Computer Based Training Program CBTCBT.
HIPAA PRIVACY AND SECURITY AWARENESS.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Presented to President’s Cabinet. INTERNAL CONTROLS are the integration of the activities, plans, attitudes, policies and efforts of the people of an.
GRC - Governance, Risk MANAGEMENT, and Compliance
INTERNAL CONTROL OVER FINANCIAL REPORTING
Chapter 5 Internal Control over Financial Reporting
Internal Control in a Financial Statement Audit
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Make Your Contact Center Smarter: Best Practices Brian Spencer, President.
Protecting Business Assets While Enabling Performance Addressing Risk Management and Customer Retention.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
Enterprise Risk Management Chapter One Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
Fundamentals I: Accounting Information Systems McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
The Right Choice for Call Recording Strategic Value for Call Centers Tracer Call Center Recording and Quality Assurance.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
A Guide for Management. Overview Benefits of entity-level controls Nature of entity-level controls Types of entity-level controls, control objectives,
Presented to Managers. INTERNAL CONTROLS are the integration of the activities, plans, attitudes, policies and efforts of the people of an organization.
Foundations of Information Systems in Business. System ® System  A system is an interrelated set of business procedures used within one business unit.
The Implementation of BPR Pertemuan 9 Matakuliah: M0734-Business Process Reenginering Tahun: 2010.
Accounting and Information Systems: a powerful combination.
WESTERN PA CHAPTER OF THE AMERICAN PAYROLL ASSOCIATION – NOVEMBER 4, 2015 Risk Management for Payroll.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Current risk and compliance priorities for law firms PETER SCOTT CONSULTING.
Unifying Talent Management. Harnessing the Power of Workforce Intelligence in Talent Planning to Drive Business Performance.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
Chapter 6 Internal Control in a Financial Statement Audit McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Auditors’ Dilemma – reporting requirements on Internal Financial Controls under the Companies Act 2013 and Clause 49 of the Listing agreement V. Venkataramanan.
CHAPTER 3 Management Systems. Learning Objectives Describe the basic business activities and tools necessary to implement successful industrial hygiene.
Risk Management Dr. Clive Vlieland-Boddy. Managements Responsibilities Strategy – Hopefully sustainable! Control – Hopefully maximising profits! Risk.
Chapter 1 Market-Oriented Perspectives Underlie Successful Corporate, Business, and Marketing Strategies.
Auditing Concepts.
By: Ms Peterlia Ramutsheli
Steve Barfoot, President Advantage International Registrar, Inc.
Internal Control Principles
Data Minimization Framework
THE INSURANCE INDUSTRY
Introduction to Business (MRK 151)
CHAPTER 3: STRATEGIC PLANNING.
Service Organization Control (SOC)
Strategic Value for Profit Centers
INTRODUCTION TO ISO 9001:2015 FOR IMPLEMENTATION Varinder Kumar CISA, ISO27001 LA, ISO 9001 LA, ITIL, CEH, MEPGP IT, Certificate course in PII & Privacy.
Transforming IT Management
Internal control - the IA perspective
RECORDS AND INFORMATION
Using the EFQM Excellence Model to support the role of a trustee
Chapter 8 Developing an Effective Ethics Program
Internal Controls Policies and Procedures
The Elements of appropriate Internal Controls
Pam Matthews, FHIMSS Director of Business Information Systems Business Information Systems is focused around administrative and financial information.
Of Financial Management Traditional View Modern View Objective of Financial Management Scope of Financial Management Relationship of Finance with other.
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
An overview of Internal Controls Structure & Mechanism
Presentation transcript:

Protecting Business Assets While Enabling Performance Addressing Risk Management and Customer Retention Brian Spencer, President

Risk Management Risk Management is: Mitel Template for 2008 4/7/2019 Risk Management Risk Management is: The identification, analysis and management of the risks threatening the assets of an organization More simply put: Determine what your risks are, then decide on a course of action to deal with those risks If you can’t identify your risks, they can’t be dealt with! 357_787

Risk in an Economic Downturn Mitel Template for 2008 4/7/2019 Risk in an Economic Downturn Risk management awareness at all time high New regulations and tougher enforcement will be a mandate going forward End of the road for deregulation across ALL industries 357_787

Recent Enforcement $2.25M HIPAA Settlement $2.25M FDCPA Settlement http://www.hhs.gov/news/press/2009pres/02/20090218a.html http://www.lvbusinesspress.com/articles/2008/12/01/news/iq_25350820.txt

Focus on Accountability It is no longer good enough to simply acknowledge and/or fix a problem Members of society and government are demanding higher standards of ethics, transparency and accountability Somebody must take responsibility, and ultimately it comes down to the CEO

What can a CEO do? The CEO is responsible because it is the system of processes, technology and oversight that enforce compliance and responsible practices So ensure the necessary systems and processes are in place!

Specific Business Vulnerabilities Medical information ID information Financial information Privacy Depends on industry Healthcare, collections, telesales, finance, utilities and others Regulation Compliance Acceptable service levels Proper transaction handling Customer Retention Hiring Termination Benefits administration Human Resources

It is a Balancing Act Privacy Documentation

Conflicting Requirements Privacy Documentation Retain little or no data Severely restrict access to any retained data Only allow access as needed with complete audit tracking Retain everything Allow access to anyone who may deal with compliance and customers Permit access frequently as integrated customer service process

Proven Management Methods Start with a fundamental understanding of explicit regulations governing your organization Be aware that many regulations affect voice communications and assume fault if no documentation exists

Proven Management Methods Combine with compliance requirements other management tactics based on risk assessment: How sensitive is the data you collect from customers? Can processes be rigid without affecting customer retention? Etc.

Proven Management Methods Document and deploy policies using processes and technology to support the risk management plan For telephone-based communications this is where voice documentation becomes relevant

Voice Documentation The process of creating a media document from a telephone call Record the call into an audio file Embed all available communication data into the file with time context (i.e. internal parties, external parties, transaction data, etc.) Securely store the media file with retention and access tightly defined and logged for auditing

Addressing Risk Concerns Mitel Template for 2008 4/7/2019 Addressing Risk Concerns Voice documentation allows organizations to: Ensure compliance with SOX, HIPAA, TSR and other industry regulations through automatic capture of required communications Balance privacy and compliance documentation by selectively documenting or NOT documenting targeted calls or portions thereof 357_787

Addressing Risk Concerns Mitel Template for 2008 4/7/2019 Addressing Risk Concerns Deploy policy controls to ensure highest levels of privacy and security while enabling documentation review Deliver access via encrypted media streaming so it can be later restricted without loss of control Completely audit for both compliance processes and customer retention policies Control data archiving and retention via age policies Implement and monitor strict communications processes related to regulated information and transactions Rate adherence to process so as to target training and convey compliance levels to upper management 357_787

Customer Retention in a Downturn Mitel Template for 2008 4/7/2019 Customer Retention in a Downturn American consumer confidence is now at a fourteen year low 64 percent of US firms say customer experience plays a critical role in their 2008 strategy, up from 38 percent in 2007 Service now trumps price as the top reason consumers purchase from one company versus their competition 357_787

Addressing Customer Retention Mitel Template for 2008 4/7/2019 Addressing Customer Retention In an economic downturn, businesses change from “growing” to “harvesting” To accomplish this, smart businesses aim to: Grow existing customers Emphasize service for existing customers Optimize IT investments Streamline processes to achieve maximum efficiency 357_787

It Starts with the Customer Do you understand what the customer perceives as a high level of service? Once you do (and you must) how do you deploy initiatives to consistently deliver? What can you do differently to affect delivery? Rank these by magnitude of effect, time to implement, cost to implement

Quality Assurance At some level it is critical to evaluate the use of processes in actual customer communications This requires the act of listening to actual calls either live or historically Otherwise, all the work to modify processes to achieve what your customer wants is wasted, because it won’t happen!

Addressing Customer Retention Mitel Template for 2008 4/7/2019 Addressing Customer Retention Establish performance standards and metrics for customer-driven processes Systematically evaluate employee performance Base training, promotions, and changes on hard data Voice documentation solutions allow organizations to: 357_787

Addressing Customer Retention Mitel Template for 2008 4/7/2019 Addressing Customer Retention Improve operational efficiency through reduced errors and wasteful practices Control training costs by focusing on those demonstrating ability Control personnel costs by retaining top performers while reducing non-performers Voice documentation solutions allow organizations to: 357_787

Final Results Proper balance of addressing privacy risks with compliance and other documentation requirements Complete knowledge and mitigation of compliance risks Aggressive management of customer defect risks with focus on improving retention to maximize results

Thank You