2 1.Client protection principles 2.Principle #6 in practice 3.Two components of protecting client data 4.Participant feedback 5.Practitioner lessons and.

Slides:



Advertisements
Similar presentations
2 1.Client protection principles 2.Principle #7 in practice 3.The client perspective 4.Participant feedback 5.Tools for improving practice 6.Conclusion.
Advertisements

2 1.Client protection principles 2.Principle #6 in practice 3.The client perspective 4.Participant feedback 5.Tools for improving practice 6.Conclusion.
Principle #1 – Avoidance of Over- indebtedness A special presentation for YOUR INSTITUTION made possible by the Smart Campaign
Privacy and Information Security Training ( ) VUMC Privacy Website
Internal Controls What Are They And Why Should I Care? 1.
1. As a Florida KidCare community partner families entrust you to not only help them navigate the Florida KidCare system but to keep the information they.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
NAU HIPAA Awareness Training
Sizewise Code of Ethics, Conflict of Interest and Disclosure HR-CECID.
Last update: 2010 Bringing Smart Policies to Life The basics: Consumer protection.
2 1. Client protection principles 2. Principle #1 in practice 3. Causes and effects of over-indebtedness 4. Participant feedback 5. Practitioner lessons.
The AMA Code of Ethics Could Egyptian Marketing Professionals Agree on a List of Rules, Perhaps Similar to This? The IMI Journal. Members of the AMA are.
2 1.Client protection principles 2.Principle #3 in practice 3.How inappropriate practices affect clients and institutions 4.Participant feedback 5.Practitioner.
Principle # 5 – Fair and respectful treatment of clients This presentation is made possible by the Smart Campaign
Principle # 5 – Fair and respectful treatment of clients This presentation is made possible by the Smart Campaign
Principle # 4 – Responsible Pricing This presentation is made possible by the Smart Campaign Principle #4- Responsible Pricing [Introductions.
Office of Inspector General (OIG) Internal Audit
2 1.Introduction to the Smart Campaign 2.The client protection principles 3.Why the Smart Campaign matters now 4.Feedback from participants 5.First steps.
Informed Consent and HIPAA Tim Noe Coordinating Center.
2 1. Client protection principles 2. Principle #1 in practice 3. Participant feedback 4. Tools for improving practice 5. Conclusion and call to action.
Indicator 3.07 Understand the nature of customer relationship management to show its contributions to a company.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
Information Security Information Technology and Computing Services Information Technology and Computing Services
2 1. Client protection principles 2. Principle #2 in practice 3. Participant feedback 4. Tools for improving practice 5. Conclusion and call to action.
Ethical Issues in Information Technology First Annual Conference on Ethics and Technology Chicago, 1996 Mary Malliaris.
1 Conservation Transaction Plug-In (CTP) Tool Overview March 23 & 25, 2010 Tim Pilkowski State Conservation Agronomist Annapolis, MD USDA is an equal opportunity.
© 2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
The Smart Campaign – Evolution of Client Protection Principles Isabelle Barres, Director, the Smart Campaign Center for Financial Inclusion at ACCION April.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Principle #2 – Transparent and Responsible Pricing This presentation is made possible by the Smart Campaign Principle #2- Transparent.
© 2012 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S.
Name Position Organisation Date. What is data integration? Dataset A Dataset B Integrated dataset Education data + EMPLOYMENT data = understanding education.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
2 1.Client protection principles 2.Principle #5 in practice 3.How dissatisfied clients affect the institution 4.Participant feedback 5.Practitioner lessons.
Client Protection Principles: An Investor’s Perspective Ging Ledesma Manager Social Performance Oikocredit 29 November 2010.
CLIENT PROTECTION – ARE WE THERE YET? Sadina Bina, Director EKI Microcredit Foundation Bosnia and Herzegovina.
2 1.Client protection principles 2.The client perspective on transparency 3.Principle #3 in practice 4.Participant feedback 5.Tools for improving practice.
Consumer Protection Regulation for Low Access Environments Smart Campaign Isabelle Barrès.
2 1.Client protection principles 2.Principle #6 in practice 3.The client perspective 4.Participant feedback 5.Tools for improving practice 6.Conclusion.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
EDA Rural Systems, India Social Performance and client protection Ragini B Chaudhary.
2 1.Client protection principles 2.The client perspective on transparency 3.Principle #3 in practice 4.Participant feedback 5.Tools for improving practice.
Principle #4 – Ethical Staff Behavior This presentation is made possible by the Smart Campaign
2 1.Client protection principles 2.Principle #4 in practice 3.Participant feedback 4.Tools for improving practice 5.Conclusion and call to action Agenda.
Dimension 4: Treat Clients Responsibly Today’s speakers: Roshaneh Zafar, Managing Director, Kashf Foundation Yamini Annadanam, Independent Consultant The.
Dimension 4: Treat Clients Responsibly With Gulshan Jumayeva of FINCA Azerbaijan and Leah Wardle of the SPTF.
The MFC/SPTF Awareness Raising Campaign How to present the Universal Standards to your MFI members and Network board Updated August 2013.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
The SPTF Universal Standards for Social Performance Management Presentation for Financial Institutions.
Internal Audit Section. Authorized in Section , Florida Statutes Section , Florida Statutes (F.S.), authorizes the Inspector General to review.
The Premier Source for Microfinance Data and Analysis This presentation is the proprietary and/or confidential information of MIX, and all rights are reserved.
2 1. Client protection principles 2. Principle #2 in practice 3. Participant feedback 4. Tools for improving practice 5. Conclusion and call to action.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.

NATIONAL ACADEMIC DEPOSITORY
Privacy Education Session CMHA-WECB/CCHC Volunteers/Students
Principle #3 – Transparency This presentation is made possible by the Smart Campaign Principle #3- Transparency [Introductions of.
Privacy principles Individual written policies
Privacy of Client Data.
NATIONAL ACADEMIC DEPOSITORY
Chapter 3: IRS and FTC Data Security Rules
Red Flags Rule An Introduction County College of Morris
The new data protection rules
Ethical questions on the use of big data in official statistics
GDPR (General Data Protection Regulation)
 How does GDPR impact your business? Pro Tip: Pro Tip: Pro Tip:
Dr. Sarah Quinton, UREC Chair,
Principle # 4 – Responsible Pricing This presentation is made possible by the Smart Campaign Principle #4- Responsible Pricing [Introductions.
Principle #1 – Appropriate Product Design and Delivery This presentation is made possible by the Smart Campaign   [Introductions of facilitator(s)
Principle #6 – Privacy of Client Data This presentation is made possible by the Smart Campaign Principle #6- Privacy of Client Data.
Presentation transcript:

2 1.Client protection principles 2.Principle #6 in practice 3.Two components of protecting client data 4.Participant feedback 5.Practitioner lessons and good practices 6.Conclusion and call to action Agenda

3 1. Avoidance of over-indebtedness 2. Transparent and responsible pricing 3. Appropriate collections practices 4. Ethical staff behavior 5. Mechanisms for redress of grievances 6. Privacy of client data Client Protection Principles

4 1.Client protection principles 2.Principle #6 in practice 3.Two components of protecting client data 4.Participant feedback 5.Practitioner lessons and good practices 6.Conclusion and call to action Agenda

5 PrivacySecurity Privacy of Client Data: Principle in Practice A financial institution achieves this principle by respecting the privacy of client data and ensuring both the integrity and the security of the data.

6 1.Client protection principles 2.Principle #6 in practice 3.Two components of protecting client data 4.Participant feedback 5.Practitioner lessons and good practices 6.Conclusion and call to action Agenda

7 Privacy Clients know how the institution will use their information. Confidentiality policies govern the processes, use, and distribution of client data to third parties. The institution ensures that client data is correct before sharing it and gives clients the opportunity to correct it. The institution asks for clients’ permission before sharing their data with credit bureaus or using it in marketing materials. A rigorous system of checks prevents the unauthorized use of client data and protects access to accounts. The information technology system is secure, protected by passwords, and several levels of authorized access. The institution offers orientation sessions that show clients how to safeguard their PIN numbers and other sensitive information. Security Two Components to Protecting Client Data

8 The Client Perspective: Can your clients agree with the following?  I know the institution’s policy on sharing my personal and financial information with third parties.  I have been informed that the institution will ask my permission before sharing my information with third parties, and before using my photo in any marketing materials.  I know how to keep my PIN number safe.  The institution has explained to me how they keep my data secure.  The institution asked me before submitting my information to the credit bureau (if applicable).

9 1.Client protection principles 2.Principle #6 in practice 3.Two components of protecting client data 4.Participant feedback 5.Practitioner lessons and good practices 6.Conclusion and call to action Agenda

10 Feedback from Participants Have you been in a situation where the security/privacy of your personal or financial information was compromised? How did you respond to the situation? Is this an issue that your clients care about? If something went wrong and their personal or financial information was compromised, would it affect your business? Have data management practices and systems evolved at your institution since you have worked there? How so? Have you witnessed privacy or security lapses at your institution? How did your institution respond?

11 1.Client protection principles 2.Principle #6 in practice 3.Two components of protecting client data 4.Participant feedback 5.Practitioner lessons and good practices 6.Conclusion and call to action Agenda

12 [Write your points for the presentation here:] Points Lessons from Practitioners

13 A written privacy policy governs the gathering, processing, use, and distribution of client information. Written Privacy Policy Systems, including secure IT systems, are in place and staff are trained to protect the confidentiality, security, accuracy, and integrity of clients’ personal and financial information. Systems Protect Clients Clients know how their information will be used. Staff explains how data will be used and seeks permission for use. Client Knowledge Privacy of Client Data: Indicators of Good Practice

14 Written client consent is required for use of information in promotions, marketing materials, and other public information. Clients are asked for written agreement for sharing personal information with any external parties, including credit bureaus. Written Client Consent The organization offers information, orientation, or educational sessions to clients on how to safeguard information, and access codes or PIN numbers. Client Training Privacy of Client Data: Indicators of Good Practice

15 Good Practice: Using Technology to Protect Data One cooperative in Mexico developed a custom management information system (MIS) to store, update, and, manage member data. A customized MIS allows the cooperative to: Source: Caja Morelia Valladolid Maintain the MIS using their own staff. Establish a clearly defined “user access hierarchy” for staff accessing sensitive data. Change passwords frequently. Use an “internal hacker” whose role is to constantly test the integrity of the system by attempting to break into the system from outside the cooperative.

16 Good Practices to Safeguard Privacy Employees sign a confidentiality agreement at the same time as their employment contract. Clients give written permission before the institution can use their image and/or story in marketing materials. The institution has a periodic program for clients to update their data and incentivizes them to participate.

17 Good Practices to Ensure Security Information about collections can only be accessed by the collections agent, branch manager, and the headquarters Collections Department. Physical copies of client data are secured in branch locations and digital information is in a secure database. The institution uses a power-sharing system: only the branch can change client information, while headquarters can access data from all branches. Institutional information available on the ‘intranet’ cannot be printed or downloaded for use outside the office.

18 Good Practices from Around the World: A UDITING P HYSICAL S ECURITY One MFI requires its Internal Audit department to check the physical security of filing systems at headquarters, branches, and correspondent banking locations. These security audits ensure that client files are stored securely and that only authorized employees can access them. A UDITING P HYSICAL S ECURITY One MFI requires its Internal Audit department to check the physical security of filing systems at headquarters, branches, and correspondent banking locations. These security audits ensure that client files are stored securely and that only authorized employees can access them. M AINTAINING C ORRECT I NFORMATION One MFI assists clients who need to correct/update incorrect personal or financial information. This includes not only helping clients correct the MFI’s record, but also making sure that credit bureaus and government agencies have correct information about the client as well. M AINTAINING C ORRECT I NFORMATION One MFI assists clients who need to correct/update incorrect personal or financial information. This includes not only helping clients correct the MFI’s record, but also making sure that credit bureaus and government agencies have correct information about the client as well.

19 1.Client protection principles 2.Principle #6 in practice 3.Two components of protecting client data 4.Participant feedback 5.Practitioner lessons and good practices 6.Conclusion and call to action Agenda

20 Summary: The Smart Campaign has developed six principles of client protection, one of which is privacy of client data. Financial institutions satisfy this principle by respecting the privacy of client data and ensuring it is both secure and uncompromised. Maintaining the privacy of client data requires implementing adequate safeguards, systems, and policies, but also informing the client about the use of their personal information and obtaining client consent before sharing it with a third party. Conclusion Call to action What “next steps” can your organization take to institutionalize and/or improve systems for maintaining the privacy and security of client data?

21 Join the Campaign and Endorse the Principles of Client Protection Have questions? Want more information? Contact the Smart Campaign Thank you!