The UNIVERSITY of GREENWICH 1 July 2009 L5b Audit and assurance J. E. Spencer-Wood Audit and Assurance Lecture 5b Confidentiality.

Slides:



Advertisements
Similar presentations
Ethics And a little bit about law. Ethics isnt a woolly subject …
Advertisements

Information Governance An Introduction. Information Governance Outline What is Information Governance What initiatives does IG cover.
Data Protection Information Management / Jody McKenzie.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
Privacy, Security and Compliance Concerns for Management and Boards November 15, 2013 Carolyn Heyman-Layne, Esq. 1.
The UNIVERSITY of GREENWICH 1 October 2009 L2c Audit and assurance J. E. Spencer-Wood Auditing and assurance Lecture 2c Eligibility of Registered Auditors.
This is an audio presentation Compliance Program Training for First Tier, Downstream and Related Entities.
Week Duty to keep quiet, not talk about cases By product of Fiduciary Duty 2. Right not to be forced to testify about communications --Statutory.
ACCOUNTING ETHICS Lect. Victor-Octavian Müller, Ph.D.
PwC David Devlin 23 April 2002 Auditor Independence in a Global Market Place.
Cross Border Internal Investigations Roger Best 06 July 2011.
BIT-224 Audit Muhammad Khurshid Khan THE DEMAND FOR AUDITING Why do organizations request an audit? –Agency relationship Evidence supporting a demand.
CORPORATE COMPLIANCE OVERVIEW David Meisels OSB Corporate Counsel Roundtable April 26, 2012.
The strengths and weaknesses of self regulation
International International Standards on Regulating DNFBPs & The way forward Mr Ping-Yiu MA Assistant Secretary for Security 4 March 2010 Narcotics Division,
©PCaW London 20 July 2010.
Compliance Todd Phillips Thousand Cranes. INTERNAL MONITORING AND AUDITING GOAL In order to ensure the efficacy of Thousand Cranes Compliance efforts,
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Implications of the Markets in Financial Instruments Directive (“MIFID”) Richard Thompson.
FRAUD Students name: Professors name: Course: Date:
Eliada Homes Inc. Corporate Compliance. Prevent fraud, abuse and improper activity. Detect any misconduct early. Respond swiftly through appropriate corrective.
Implementation Issues of Sarbanes-Oxley CASE Presentation September 23, 2004 By Denise Farnan.
The UNIVERSITY of GREENWICH 1 September 2009 L7 Audit and assurance J. E. Spencer-Wood Auditing and assurance Lecture 7a Introductory session Directors’
Introduction to Auditing. Introduction The role of audits is critical in the business environment of the early twenty-first century. Important decisions.
Bribery Act Essentials for 2012 CICES 28 February 2012 Barry Vitou & Neil McInnes.
Avoiding Traps in Internal Investigations H. Lee Barfield II Bass, Berry and Sims PLC November 5, 2010.
© Securities Commission, Malaysia 1 What the Audit Oversight Board will do ICAA-MICPA Audit Forum 3 August 2010.
Advanced Program in Auditing and Accounting Regulation Module 12 Enhancing Statutory Audit Quality from a Financial Regulator’s Perspective Presenter:
Code of Ethics for Professional Accountants of HKICPA
The UNIVERSITY of GREENWICH 1 September 2009 L2a Audit and assurance J. E. Spencer-Wood Lecture 2a The basic rights and duties of auditors under English.
The UNIVERSITY of GREENWICH 1 September 2009 L8c Audit and assurance J. E. Spencer-Wood Auditing and assurance Lecture 8c Standards for the Professional.
The UNIVERSITY of GREENWICH 1 September 2009 L3b Audit and assurance J. E. Spencer-Wood Auditing and assurance Lecture 3b Regulatory Accounting Bodies.
Do You Have One?. “I represent the city as an organization and I do not represent you and I cannot guarantee the confidentiality of what you tell me.”
National Crime Recording Standard. How many Crimes are reported in Dorset annually crimes reported in Dorset Approx 40,000 crimes recorded by Police.
The UNIVERSITY of GREENWICH 1 October 2009 L8a Audit and assurance J. E. Spencer-Wood Auditing and assurance Lecture 8a Internal audit.
Unit 5 Midterm Review. What are some of the components of the ABA?
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
The UNIVERSITY of GREENWICH 1 September 2009 L2b Audit and assurance J. E. Spencer-Wood Lecture 2b The auditor and companies legislation – UK campus students:
North Carolina TASC Clinical Series Training Module Two: Confidentiality.
The UNIVERSITY of GREENWICH 1 October 2009 L3c Audit and assurance J. E. Spencer-Wood Auditing and assurance Lecture 3c Auditing standards An example -
Session 7 Compliance failure policy. 1 Contents Part 1: COLP and COFA duties Part 2: What do we have to comply with and why does it matter? Part 3: Compliance.
Session 8 Confidentiality and disclosure. 1 Contents Part 1: Introduction Part 2: The duty of confidentiality Part 3: The duty of disclosure Part 4: Confidentiality.
Internal Audit Considerations for Cybersecurity Risks Posed by Vendors October th, 2015 Chicago IIA Chapter’s 2 nd Annual IIA Chicago IT Hacking.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Page 1 | Confidential and Proprietary Information Responding to Suspected Illegal Acts Dublin, February 2012.
Kingsley Karunaratne, Department of Accounting, University of Sri Jayewardenepura Colombo – Sri Lanka, Practice Management Quality.
Session 12 Information management and security. 1 Contents Part 1: Introduction Part 2: Legal and regulatory responsibilities Part 3: Our Procedures Part.
Professional Conduct, Independence, and Quality Control
FREEDOM OF INFORMATION Getting to grips with the Act.
Internal Controls For Municipalities Vermont State Auditor’s Office – August 2008.
1 Vereniging van Compliance Officers The Compliance Function in Banks Amsterdam, 10 June 2004 Marc Pickeur CBFA CBFA.
Disclaimer This presentation is intended only for use by Tulane University faculty, staff, and students. No copy or use of this presentation should occur.
Arizona City Attorneys Association Conference, May 19, 2016 Update on Ethics Rules for Government Lawyers Geoffrey Sturr Osborn Maledon, P.A.
Recognizing the Client
PROFESSIONAL RESPONSIBILITIES
Securing the Law Firm Myth vs. Reality vs. Practicality:
LATIHAN MID SEMINAR AUDIT hiday.
Privacy & Access to Information
Policy Dialogue on Corporate Governance in China
Third Annual PAC Conference PROFESSIONAL ACCOUNTING FUTURES Non-Compliance with Laws and Regulations (NOCLAR) Kelly Gorman, Vice President, Regulatory.
Paul T. Smith, Esq. Partner, Davis Wright Tremaine LLP
ACCOUNTING ETHICS Conf.univ.dr. Victor-Octavian Müller.
ACCOUNTING ETHICS Conf.univ.dr. Victor-Octavian Müller.
Virginia Sheriffs’ Institute New Sheriff Orientation
ACCOUNTING ETHICS Conf.univ.dr. Victor-Octavian Müller.
ACCOUNTING ETHICS Conf.univ.dr. Victor-Octavian Müller.
ACCOUNTING ETHICS Lect. Victor-Octavian Müller, Ph.D.
INTERNAL CONTROLS AND THE ASSESSMENT OF CONTROL RISK
Student Data Privacy: National Trends and Wyoming’s Role
Matters to be considered Approach and timetable
Presentation transcript:

the UNIVERSITY of GREENWICH 1 July 2009 L5b Audit and assurance J. E. Spencer-Wood Audit and Assurance Lecture 5b Confidentiality

the UNIVERSITY of GREENWICH 2 July 2009 L5b Audit and assurance J. E. Spencer-Wood Confidentiality There is a professional duty not to disclose information about a client (without consent) In the UK the duty of confidentiality is an implied contractual duty In some circumstances fraud must be reported to an appropriate proper (third party) authority in the public interest (fe police, FSA regulatory bodies, HMRC, SE)

the UNIVERSITY of GREENWICH 3 July 2009 L5b Audit and assurance J. E. Spencer-Wood A ‘Chinese Wall’ A physical separation of departments and information within an audit firm To prevent the use of data in non-audit contexts without a client’s permission Common law (UK) - Chinese walls

the UNIVERSITY of GREENWICH 4 July 2009 L5b Audit and assurance J. E. Spencer-Wood Requirements for a valid ‘Chinese Wall’ 1.Physical separation of departments 2.Training about treatment of confidentiality 3.Strict, defined procedures (including recording) when crossing the wall 4.Compliance officers monitoring effectiveness of wall 5.Disciplinary sanctions for breaches (Refer the Prince Jefri case - ) Common law (UK) - Chinese walls

the UNIVERSITY of GREENWICH 5 July 2009 L5b Audit and assurance J. E. Spencer-Wood Further reading House of Lords (1998) Prince Jefri Bolkiah v. K.P.M.G /prince01.htmhttp:// 1218/prince01.htm Kelly, E. (1999) Hong Kong Lawyer