FIRMA National Risk Management Training Conference – Orlando, FL Wednesday April 9, 2008 Third Party / SAS 70 Reports A Regulatory and Standards Update.

Slides:



Advertisements
Similar presentations
OPERATING EFFECTIVELY AT WESD. What is Internal Control? A process designed to provide reasonable assurance the organizations objectives are achieved.
Advertisements

PRESENTATION ON MONDAY 7 TH AUGUST, 2006 BY SUDHIR VARMA FCA; CIA(USA) FOR THE INSTITUTE OF INTERNAL AUDITORS – INDIA, DELHI CHAPTER.
A Consultative Approach to Auditing
Comptroller of the Currency Administrator of National Banks OCC Operations Update Michael D. Drury Asset Management Policy Group Office of the Comptroller.
What’s New at the OCC: CRE Lending Handbook and Third Party Arrangements Presenters: Bull Garber, Jr., Director of Governmental and External Relations,
U.S. Department of Veterans Affairs Veterans Health Administration Supportive Services for Veteran Families (SSVF) Program SSVF Grantee Uniform Monitoring.
1 Outsourcing & Vendor Management Fiduciary & Investment Risk Management Association 21 st National Training Conference April 18, 2007 Frederick Yorke,
How JCPenney is Managing Corporate Risk
Meeting with IESBA CPAB Update Glenn Fagan and Kam Grewal April 7, 2014.
1 Vendor Evaluation: Selecting for Success Dana McCormick Wells Fargo Home Mortgage Delivery Services Baltimore PCC Education Seminar April 27, 2007.
Performing a Fiduciary Review of Trust Administration FIRMA April 2009 Independent Fiduciary Services ® Independent Fiduciary Services, Inc.  th.
E B a n k i n g Information Security Guidelines ABA’s Technology Risk Management – A Strategic Approach Telephone/Webcast Briefing June 17, 2002.
Institute of Municipal Finance Officers & Related Professions
Directors’ College 2007 Protecting Your Customers’ Privacy A Directors’ Guide to GLBA By David Abbott, FDIC IT Examiner.
First Practice - Information Security Management System Implementation and ISO Certification.
NAIC Review of ERM & Internal Controls David Altmaier Florida Office of Insurance Regulation.
Report on Internal Audit and Investigation activities
Vendor Management Frequent regulatory findings:
Copyright © 2014 Lender Performance Group, LLC. All rights reserved. Managing risks associated with third-party relationships, in other words Vendor Management.
Guidance for Managing Third-Party Risk Chicago Region Regulatory Conference Call December 8, 2010.
E XAMINATION AND E NFORCEMENT I SSUES : B EYOND T HE P ILLARS The AMLA Third Annual Full Day BSA/AML Conference October 4, 2013 Presented by: John M. Geiringer.
1 Oversight of New Product Development FIRMA Conference Phoenix April 17, 2007 Presented by George Lencyk.
IA Clinic. การเตรียมการตรวจสอบ แผนการ ตรวจสอบ แผนการ ปฏิบัติงาน ตรวจสอบ หารือ หน่วยรับตรวจ รายงานผล การตรวจสอบ ติดตามผล การตรวจสอบ ผลการประเมินความเสี่ยง.
Elements of Internal Controls Preventing Fraud, Waste, and Abuse in Urban and Rural Transit Systems.
Vendor Risk: Effective Management is Essential
Dr. Mohamed A. Hamada Lecturer of Accounting Information Systems 1-1 Lecture 1 Introduction to Managerial Accounting.
Internal Auditing and Outsourcing
Revisions to the FFIEC BSA/AML Examination Manual and Federal Reserve Board BSA/AML Examination Findings and Issues Timothy P. Leary Senior Special AML.
1.  The views expressed are those of the speaker and do not necessarily reflect the views of the Federal Reserve Board of Governors, or the Federal Reserve.
DAA and GEP Orlando Audit & Compliance or Audit vs. Compliance.
1 6c: IA/PF - The Compliance Program and Modern Technology (Part 1 - Workshop) October 22, 2014 Mitch Kraskin - CEO, Compliance Science, Inc. Peter Mafteiu.
Do You Need An Audit Committee, Finance Committee, or a Joint Municipal/Education Committee?
Outsourcing Louis P. Piergeti VP, IIROC March 29, 2011.
PROXY VOTING Presented by Jeffrey S. Kropschot, VP and CCO A.G. Edwards Trust Company FSB FIDUCIARY AND INVESTMENT RISK MANAGEMENT ASSOCIATION 2008 NATIONAL.
Fiduciary & Investment Risk Management Association
Portfolio Committee Presentation Government printing Works Audit and Compliance 07 May 2013 Presented by: Chief Executive Officer.
PRESENTATION IOD, PROGRAMME ON : “ MASTER CLASS FOR DIRECTORS ” SESSION ON : “ DUTIES, RESPONSIBILITIES & LIABILITIES OF DIRECTORSHIP ” Wednesday, March.
1 Regulator Panel FIRMA 25 th Annual Risk Management Training Conference April 19, 2011.
The views expressed in this presentation do not necessarily reflect those of the Federal Reserve Bank of New York or the Federal Reserve System Association.
Winston & Strawn LLP © 2007 CHICAGO GENEVA LONDON LOS ANGELES MOSCOW NEW YORK PARIS SAN FRANCISCO WASHINGTON, D.C. Institute of International Bankers Seminar.
Practice Management Quality Control
Manage Your Risk Utilizing Collaborative Partnerships to analyze, simplify, compare & strategize.
The Audit as a Management Tool Vermont State Auditor’s Office – April 2009.
BSA PROGRAM REQUIREMENTS.  Written, approved by the board of directors, and noted in the board minutes.  Based on the risk assessment  Fully implemented.
MANAGING THIRD-PARTY RISK New York Region Regulatory Conference Call March 3, 2011.
May 14, 2014 Presented by Ken Shim. Background April CFPB issued Bulletin Federal Reserve, OCC and FDIC issued similar guidance on vendor.
Risk Management & Corporate Governance 1. What is Risk?  Risk arises from uncertainty; but all uncertainties do not carry risk.  Possibility of an unfavorable.
Proprietary & Confidential © 2011 Fidelity National Information Services, Inc. and its subsidiaries. Risk Assessments Scott Yoshimura, Risk Management.
Supervision SICOR Securities, Inc.. Why? NASD 3110 requires the firm to “…establish and maintain a system to supervise the activities of each registered.
Division of Risk Management State of Florida Loss Prevention Program.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
Update on Recommendations from KPMG, Management Partners, and Task Force City Council Meeting November 16,
Cyber Risk Management Solutions Fall 2015 Thomas Compliance Associates, Inc
Is Vendor Management The New Risk Management? Douglas DeGrote.
Governance, Risk and Ethics. 2 Section A: Governance and responsibility Section B: Internal control and review Section C: Identifying and assessing risk.
Board Financial Oversight Governing Board Online Training Module.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
ACCA/PAB/ICAJ/ICAC Practice Monitoring Reviews OVERVIEW OF FINDINGS 19 July 2014.
Vendor Management by Banks: How Law Firms Are Affected Peter Swire Huang Professor of Law and Ethics Scheller College of Business Georgia Institute of.
BASIC CONTROL PROCESS ESTABLISHMENT OF STANDARDS
What Is Vendor Management And Why Is It Important To You?
Compliance Management Systems
Investment Outsourcing
Optimizing Your Regulatory Compliance Program
Independent Guide, Trusted Partner
Corporate Governance for Mutuals
Trading Supervision Obligations
Staying Ahead of the Compliance & Risk Management Curve
Enterprise Content Management (ECM) Project
The Role of the Academic Senate President and Effective Leadership
Presentation transcript:

FIRMA National Risk Management Training Conference – Orlando, FL Wednesday April 9, 2008 Third Party / SAS 70 Reports A Regulatory and Standards Update Francis P. Thomas The Glenmede Trust Co., N.A.

Background If you use an outside service organization to accomplish a task, you need to know something about that organization’s control structure. If clients hire your firm to make investment decisions for them, (especially employee benefit clients) they want to know about your controls.

Regulatory References FFIEC Outsourcing Technology Services IT Exam Handbook June 2004 FFIEC Supervision of Technology Service Providers Handbook March 2003 OCC Bulletin “Third Party Relationships” OCC Advisory Letter AL “Third Party Risk”

Board and Management Responsibilities Ensuring each outsourcing relationship supports the institution’s overall requirements and strategic plans Ensuring the institution has sufficient expertise to oversee and manage the relationship Evaluating prospective providers based on the scope and criticality of oursourced services

Board and Management Responsibilities (continued) Tailoring the enterprise-wide, service provider monitoring program based on initial and ongoing risk assessments of outsourced services; and Notifying the primary regulator regarding outsourced relationships when required (OTS needs 30 day notice before establishing a relationship with a foreign service provider)

Risk Management approach to Vendor Management Inventory all vendors – establish database to record information Establish initial due diligence criteria Identify “significant” vendors Establish annual due diligence criteria for significant vendors Vendor Management Com. oversight

What is a significant vendor? Someone with access to client or employee NPI High business impact if product or service not available from vendor High business impact due to vendor interaction with clients/prospects High business impact if vendor fails

Vendor Management Committee Duties Oversee the establishment of all practices and procedures Review exceptions to the program and recommend or implement responses Report up in the committee structure and escalate any security concerns Report any risk concerns to the Risk Management Committee

Using a vendor SAS-70 What type of report is supplied (Type I/A or Type II/B – with testing results)? Is the product or service you purchase specifically addressed in the report? Go to results and look for disclosures about the controls over your product or service. Are they acceptable?

Using a vendor SAS-70 cont. If control weaknesses were identified, do they have a management response. Are the situations deemed significant to you? If significant, do you have an action plan to discuss with the vendor? If vendor is unwilling to address your concerns, can you modify or exit the contract? If you are locked in, what alternate controls can be used?

Does your SAS-70 give away too much information? Don’t give flowcharts on how data moves and is controlled. Don’t identify the actual systems you use. Say “trust accounting system” or “trade order entry system” Don’t identify your strategic partners by name (telecommunications vendor, name brand routers and switches, etc.)

Questions / comments Thank you for attending this session and we hope you take home some good information to implement in your shops! Thank you for attending this session and we hope you take home some good information to implement in your shops! Have a safe trip home. Have a safe trip home.