New Study Highlights Anti-Bribery & Corruption Gaps & Risks

by NAVEX Global
Contact

Everyone reading this post should have conducted a corporate risk assessment (CRA) in the past couple years. If not, stop reading and go conduct one now. Seriously, how can you know if your compliance program resources, training, policies and controls address the correct risks if you haven’t identified them through a rigorous CRA process?

If you are still reading, I assume you have conducted a CRA. Now, look at the top right quadrant of your heat map for high likelihood and high magnitude risks. This is where you should be able to find your company’s anti-corruption and bribery (ABC) risks. If you find this ABC risk at the top of your risk ranking, you can probably be confident that you have conducted a meaningful and accurate risk assessment.

Close to that quadrant, you should see third parties—because they are often the culprits when ABC non-compliance happens. For evidence of this, read the 2014 OECD Foreign Bribery Report. This report found that more than 75 percent of the 427 bribery and corruption cases studied involved third parties.

If, however, your CRA is missing either ABC or third-party risks—or if these risks fall below something innocuous like hotline posters in every break room—then it’s time to re-evaluate (or call in a partner like NAVEX Global) unless you are confident that your ABC program mitigation addresses all elements listed in this post.

New Survey Of ABC Risks Reminds Us That Many Gaps Exist

If you are wondering whether concerns about ABC risk are hyperbole or a GRC sales technique, then you probably have not seen the recent KPMG survey. Its findings, based on a survey of 659 risk managers, include several key points:

  • There was a sharp increase, compared with a KPMG survey four years ago, in the proportion of respondents who say they are highly challenged by the issue of ABC.
  • As companies continue to globalize, management of third parties poses the greatest challenge in executing ABC programs.
  • Despite the difficulty of monitoring their business dealings with third parties, more than one third of respondents do not formally identify high-risk third parties. More than half of those respondents with right-to-audit clauses over third parties have not exercised the right.
  • ABC considerations are accorded too low a priority by companies preparing to acquire, or merge with, other corporations across borders.
  • Respondents complain they lack the resources to manage ABC risk.
  • A top-down risk assessment would help companies set priorities, but executives admit that an ABC risk assessment is one of their companies’ top challenges.
  • Data analytics is an increasingly important and cost-effective tool to assess ABC controls. Yet only a quarter of respondents use data analysis to identify violations and, of those that do, less than half continuously monitor data to spot potential violations.

Solutions To Help Minimize ABC and Third-Party Risks

These findings demonstrate the critical need for companies to identify and address ABC risks and the related roles third parties play in these risks. It is often daunting or overwhelming for companies to develop and undertake a program, yet doing nothing is not an acceptable defense. In fact, the U.S. Department of Justice and U.S. Securities and Exchange Commission provided guidance for compliance programs and third parties in 2012 when they jointly published A Resource Guide to the U.S. Foreign Corrupt Practices Act (FCPA Guide).

This FCPA Guide addresses elements of effective compliance programs in the context of the FCPA and issues of bribery and corruption of foreign government officials. The FCPA Guide stated, “In the end, if designed carefully, implemented earnestly, and enforced fairly, a company’s compliance program—no matter how small or large the organization—will allow the company generally to prevent violations, detect those that do occur, and remediate them promptly and appropriately.” The FCPA Guidance goes on to say that, “Assessment of risk is fundamental to developing a strong compliance program.”

So, to address these survey findings and satisfy the SEC and DOJ, what common factors should every compliance program contain and be able to document?

  1. Conduct a robust corporate risk assessment that identifies and implements plans to mitigate, or reduce to acceptable levels, ABC and other top corporate and compliance risks. This process should involve document review, surveys and interviews with SMEs and compliance stakeholders to address the likelihood, magnitude and mitigating controls of various risks. Document the process and regularly update it to adjust for changes in laws, industry regulations, risk tolerance, industry issues, and cultural expectations.
  2. Create or update written policies and procedures to address these risks, particularly the highest risks. The best practice is to have a policy database (such as our policy and procedure management software tool, PolicyTech) to assist in this process. A centralized database should be easily accessible to users, regularly updated and a source for documentation of policy updates, training and investigations.
  3. Identify and address your company’s third-party risks. This is often the most challenging for company compliance programs, large and small. There are often hundreds to tens of thousands of third parties considered or engaged by companies for both routine and critical roles, e.g. agents, distributors, resellers, etc. The FCPA Guidance advises that, “Risk-based due diligence is particularly important with third parties…in assessing the effectiveness of a company’s compliance program.” This due diligence should also extend to third parties engaged by M&A targets. As the acquirer, your company would become the owner of that liability.

Trying to conduct appropriate due diligence is a struggle for resource-challenged companies and even a struggle for bigger companies due to the large numbers of third parties and geographic and language challenges. Even with these challenges, a company cannot defend doing nothing. Every company must have a clear third-party policy and plan and implement them consistently.

Again, the FCPA Guide suggests that every compliance program should address the following guiding principles:

  • As part of risk-based due diligence, understand the qualifications and associates of its third parties. Scrutiny should increase as “red flags” surface.
  • Companies should understand the business rationale for including a third party in the transaction.
  • Companies should undertake some form of ongoing monitoring of third party relationships.
  • The company should inform the third party of the company’s compliance program and commitment to ethical and lawful business practices.

To accomplish this risk-based due diligence and the ongoing monitoring of your third parties, look for a robust Software as a Service (SaaS) solution, such as NAVEX Global’s RiskRate. Automated tools like RiskRate provide due diligence and review of hundreds of databases in search of “red flags.” If red flags are identified, your policy and mitigation process can be used and documented to support the decisions to pursue or terminate the arrangement. For third parties who are engaged, the considerable advantage of RiskRate is that it will continuously monitor the databases for updates and provide real-time notices of changes. This type of data-driven analytics addresses most of the third-party concerns identified in the KPMG survey and the FCPA Guidance.

Conclusion

There is no need to boil the ocean—but you do must turn on the stove. You can’t ignore the challenges because they seem insurmountable. The best way to address many of these concerns is to devise a plan to implement changes in stages—and determine how technology can help you create a significantly stronger program, while making it more efficient and defensible.


 

Written by:

NAVEX Global
Contact
more
less

NAVEX Global on:

Readers' Choice 2017
Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Privacy Policy (Updated: October 8, 2015):
hide

JD Supra provides users with access to its legal industry publishing services (the "Service") through its website (the "Website") as well as through other sources. Our policies with regard to data collection and use of personal information of users of the Service, regardless of the manner in which users access the Service, and visitors to the Website are set forth in this statement ("Policy"). By using the Service, you signify your acceptance of this Policy.

Information Collection and Use by JD Supra

JD Supra collects users' names, companies, titles, e-mail address and industry. JD Supra also tracks the pages that users visit, logs IP addresses and aggregates non-personally identifiable user data and browser type. This data is gathered using cookies and other technologies.

The information and data collected is used to authenticate users and to send notifications relating to the Service, including email alerts to which users have subscribed; to manage the Service and Website, to improve the Service and to customize the user's experience. This information is also provided to the authors of the content to give them insight into their readership and help them to improve their content, so that it is most useful for our users.

JD Supra does not sell, rent or otherwise provide your details to third parties, other than to the authors of the content on JD Supra.

If you prefer not to enable cookies, you may change your browser settings to disable cookies; however, please note that rejecting cookies while visiting the Website may result in certain parts of the Website not operating correctly or as efficiently as if cookies were allowed.

Email Choice/Opt-out

Users who opt in to receive emails may choose to no longer receive e-mail updates and newsletters by selecting the "opt-out of future email" option in the email they receive from JD Supra or in their JD Supra account management screen.

Security

JD Supra takes reasonable precautions to insure that user information is kept private. We restrict access to user information to those individuals who reasonably need access to perform their job functions, such as our third party email service, customer service personnel and technical staff. However, please note that no method of transmitting or storing data is completely secure and we cannot guarantee the security of user information. Unauthorized entry or use, hardware or software failure, and other factors may compromise the security of user information at any time.

If you have reason to believe that your interaction with us is no longer secure, you must immediately notify us of the problem by contacting us at info@jdsupra.com. In the unlikely event that we believe that the security of your user information in our possession or control may have been compromised, we may seek to notify you of that development and, if so, will endeavor to do so as promptly as practicable under the circumstances.

Sharing and Disclosure of Information JD Supra Collects

Except as otherwise described in this privacy statement, JD Supra will not disclose personal information to any third party unless we believe that disclosure is necessary to: (1) comply with applicable laws; (2) respond to governmental inquiries or requests; (3) comply with valid legal process; (4) protect the rights, privacy, safety or property of JD Supra, users of the Service, Website visitors or the public; (5) permit us to pursue available remedies or limit the damages that we may sustain; and (6) enforce our Terms & Conditions of Use.

In the event there is a change in the corporate structure of JD Supra such as, but not limited to, merger, consolidation, sale, liquidation or transfer of substantial assets, JD Supra may, in its sole discretion, transfer, sell or assign information collected on and through the Service to one or more affiliated or unaffiliated third parties.

Links to Other Websites

This Website and the Service may contain links to other websites. The operator of such other websites may collect information about you, including through cookies or other technologies. If you are using the Service through the Website and link to another site, you will leave the Website and this Policy will not apply to your use of and activity on those other sites. We encourage you to read the legal notices posted on those sites, including their privacy policies. We shall have no responsibility or liability for your visitation to, and the data collection and use practices of, such other sites. This Policy applies solely to the information collected in connection with your use of this Website and does not apply to any practices conducted offline or in connection with any other websites.

Changes in Our Privacy Policy

We reserve the right to change this Policy at any time. Please refer to the date at the top of this page to determine when this Policy was last revised. Any changes to our privacy policy will become effective upon posting of the revised policy on the Website. By continuing to use the Service or Website following such changes, you will be deemed to have agreed to such changes. If you do not agree with the terms of this Policy, as it may be amended from time to time, in whole or part, please do not continue using the Service or the Website.

Contacting JD Supra

If you have any questions about this privacy statement, the practices of this site, your dealings with this Web site, or if you would like to change any of the information you have provided to us, please contact us at: info@jdsupra.com.

- hide
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.