Dale Skivington Executive Director, Global Compliance; Chief Privacy Officer October 2014 Compliance by Design Overview • Based on Privacy by Design, the governance model is about organizations taking responsibility & holding themselves accountable & building protections into their products & services design work streams. • At Dell we plan to use this model across the compliance portfolio to provide effective governance & controls to ensure we meet these responsibilities. • Our plan is to provide the framework to strategically move the needle to the highest maturity level for each component of the programs. 2 Dell Compliance Governance Framework Audit Committee Global Risk and Compliance Council (GRCC) GC CFO SVP, HR (2) SVP, BU* VP, Sec VP, Audit CAO CCO * 2 Yr. Rotating Member CPO/ Exec Dir. Complianc e 3 Global Compliance Forum • Leader, Product Compliance • Leader, Trade Compliance • Leader, EH&S • Leader, Information Security Compliance • Leader, Dell Financial Services Compliance • Leader, Anti-trust Compliance • Leader, Labor & Employment Compliance • Leader, HIPAA Compliance • Leader Privacy • Leader Anti-Corruption • Etc. Compliance Program Maturity Model Policy Governance Risk management 1 Ad hoc 2 Initial 3 Formal 4 Validated 5 Monitored None written Limited distribution & understanding Formal but may be inconsistent Globally consistent & enforceable Regularly reviewed & updated None established Discrete, informal, & limited Corporate oversight & exec level Management involvement at all levels Scorecard reporting Incomplete & inconsistent Risk assessment, not management Risk assessment & management Cross-functional, executive validation Component of ERM Subject to self-assessment & audit Exception reporting & resolution Procedures & controls None written Limited coverage Consistent & global 3rd party management No standards Some standards May be inconsistent Consistent, cross-functional coordination Proactive monitoring & self-assessment Independent external audits Compliance & monitoring None established Informal & limited Audit-driven, remedial actions endorsed Analytics technology; cross-functional Accountability-drive n, extends beyond enterprise Incident management Ad hoc & inconsistent Some consistency Little analysis Root cause analysis, global standards Issue tracking Technology in place Effectiveness & efficiency metrics None General, infrequent, single media Custom-tailored, recurring, multi-media Role-specific awareness; 3rd parties Ongoing awareness Training & awareness 4 Controls are Key to a Mature Program Anti-Corruption Globally Consistent Key Controls • Contract Clauses • Third Party Vetting • Rebate Management • Payable/Disbursem ent Controls • Deal Governance Review • Third Party Training 5 Privacy Globally Consistent Key Controls • Secure Workplace Assessments • Privacy Impact Assessments • Annual Payment Card Industry (PCI) Assessment • Information Privacy Security Addendum (IPSA) Examples of Privacy Controls with Required Regional Variations • Data Subject Access • Breach/Incident Requirement • International Data Transfer • Customer Preference Management • Online Behavioral Marketing OBA • Online Cookie Program • Healthcare /HIPAA Microscope vs. Telescope . Standard requirements drives common controls; allowing for streamlined resource usage and greater customer protection.
© Copyright 2024