<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>The Best Practice Network Guidelines &#124; The Best Practice Network</title>
	<atom:link href="http://www.best-practice.com/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.best-practice.com</link>
	<description>Definition of a best practice. &#039;Best Practices&#039; are rules, standards, regulation relating to compliance, audit, risk management.</description>
	<lastBuildDate>Sat, 14 Sep 2013 10:48:44 +0000</lastBuildDate>
	<generator>http://wordpress.org/?v=2.8.6</generator>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
			<item>
		<title>Your Compliance Management Can Make All the Difference</title>
		<link>http://www.best-practice.com/governance/governance-compliance/your-compliance-management-can-make-all-the-difference/your-compliance-management-can-make-all-the-difference-14092013/</link>
		<comments>http://www.best-practice.com/governance/governance-compliance/your-compliance-management-can-make-all-the-difference/your-compliance-management-can-make-all-the-difference-14092013/#comments</comments>
		<pubDate>Sat, 14 Sep 2013 10:48:44 +0000</pubDate>
		<dc:creator>Matthew S.</dc:creator>
				<category><![CDATA[Your Compliance Management Can Make All the Difference]]></category>

		<guid isPermaLink="false">http://www.best-practice.com/?p=3166</guid>
		<description><![CDATA[Compliance management includes the organization’s processes and policies that have to adhere to applicable rules and regulations. Thus, an effective compliance management can immediately inform the enterprise risk management process of any significant compliance risks. For instance, corruption risk is one of the major issues for multinational corporations.
So in order to be effective, compliance management [...]]]></description>
			<content:encoded><![CDATA[<p>Compliance management includes the organization’s processes and policies that have to adhere to applicable rules and regulations. Thus, an effective compliance management can immediately inform the enterprise risk management process of any significant compliance risks. For instance, corruption risk is one of the major issues for multinational corporations.</p>
<p><img class="alignleft" title="Your Compliance Management Can Make All the Difference" src="http://info.ibs-us.com/Portals/14010/images/compliance%20management%20software.jpg" alt="" width="177" height="177" />So in order to be effective, compliance management needs monitoring, measures and metrics that will offer assurance to the board of directors and the executive management who had established these procedures and policies in hope of fostering compliance management process. Without the effective management of compliance risks, the organization is simply reactive, at best, and can be noncompliant, at worst.</p>
<p>For a majority of companies, complex accountabilities based on compliance have developed in an ad hoc manner over period of time. Since new procedures and policies are developed, they are added into the existing management structure, thus forming quite a few elements of compliance management that have become common in many companies. These include, reduced organization transparency, high audit costs, inefficient communication, redundant queries of risk and process owners, lack of automation, outmoded infrastructure and unstable control environments.</p>
<p>Acknowledging these elements as a status quo does come with a cost, since it can contribute to an inefficient and ineffective control structure.</p>
<p>However, the true cost of compliance comprises of three different elements:</p>
<p>1. The cost of efforts when referring to internal compliance that consist of particularly identifying functions that are embedded into the processes.</p>
<p>2.  The cost of inadvertence throughout all levels of the organization.</p>
<p>3. And the cost of noncompliance, which includes loss of brand equity, loss or revenue, penalties fines and many others.</p>
<p>If the management would undertake a quality perspective on managing compliance with the same zeal it does with improving other core operating processes, cost could substantially be reduced in key area, since confidence is gained knowing that compliance risks are effectively being managed.</p>
<p>There are however, certain key elements of an effective and efficient compliance program that the board and executive management might want to consider such as:</p>
<h3>Board Inadvertence</h3>
<p>A positive understanding of over-sighting particular compliance programs and significant compliance risks by the board or by one of its member can help build an effective tone at the top of the hierarchy.</p>
<h3>Executive Management Oversight</h3>
<p>Management and coordination of the compliance program by an elected senior executive is crucial for an organization that consists of diverse and complex operations.</p>
<h3>Reporting Mechanisms, Policies, Procedures and Standards</h3>
<p>These particular elements need to be kept up-to-date and should be documented as well as should be communicated to employees throughout the organization.</p>
<h3>Due Diligence and Risk Assessment Activities</h3>
<p>The process of risk identification should integrate precise considerations of compliance risks. Appropriate subject oriented experts should be responsible for monitoring changes in the environment as well as identifying amendments required in certain compliance risk area(s), for which they are accountable.</p>
<p>In conclusion, companies need to make sure that their established procedures and policies offer a reasonable assurance that the organization is following the processes according to the laws and regulations and internal policies.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.best-practice.com/governance/governance-compliance/your-compliance-management-can-make-all-the-difference/your-compliance-management-can-make-all-the-difference-14092013/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Compliance Risk: What Would it be Like in the Future?</title>
		<link>http://www.best-practice.com/governance/governance-compliance/compliance-risk-what-would-it-be-like-in-the-future/compliance-risk-what-would-it-be-like-in-the-future-14092013/</link>
		<comments>http://www.best-practice.com/governance/governance-compliance/compliance-risk-what-would-it-be-like-in-the-future/compliance-risk-what-would-it-be-like-in-the-future-14092013/#comments</comments>
		<pubDate>Sat, 14 Sep 2013 10:44:45 +0000</pubDate>
		<dc:creator>Matthew S.</dc:creator>
				<category><![CDATA[Compliance Risk: What Would it be Like in the Future?]]></category>

		<guid isPermaLink="false">http://www.best-practice.com/?p=3163</guid>
		<description><![CDATA[Nowadays many industries are incorporating regulatory and legal compliance into risk assessments. This concept is relatively new, but despite this, it is becoming prevalent in a large number of organizations because of the numerous advantages it offers. If this pace continues, here are some ways in which compliance risk assessment will probably change in the [...]]]></description>
			<content:encoded><![CDATA[<p style="margin-bottom: 0in;" align="JUSTIFY"><span style="font-family: Calibri, serif;"><span style="font-size: x-small;">Nowadays many industries are incorporating regulatory and legal compliance into risk assessments. This concept is relatively new, but despite this, it is becoming prevalent in a large number of organizations because of the numerous advantages it offers. If this pace continues, here are some ways in which compliance risk assessment will probably change in the upcoming years.</span></span></p>
<ul>
<li>
<p style="margin-bottom: 0in;" align="JUSTIFY"><span style="font-family: Calibri, serif;"><span style="font-size: x-small;"><img class="alignleft" title="Compliance Risk: What Would it be Like in the Future?" src="http://www.e-bcorp.com/ebc/images/GRC-0_4.jpg" alt="" width="158" height="165" />The 	scope of this methodology will increase even more and will start 	supporting more regulatory requirements under the scrutiny of the 	government. These requirements are bound to grow in immense numbers, 	especially in businesses that belong to the financial and 	health-care industries. Any company that has limited resources will 	probably find it difficult to track legal and regulatory changes in 	requirements and then assess the impact of these modifications on 	the organization itself. Such a business would also have trouble 	updating their own registers. No matter what issues have to be 	faced, all these tasks will have to be accomplished, even though 	they do not directly result in increase in profits. </span></span></p>
</li>
<li>
<p style="margin-bottom: 0in;" align="JUSTIFY"><span style="font-family: Calibri, serif;"><span style="font-size: x-small;">For 	all those companies who follow the checklist approach towards 	compliance risks will have to change their methodologies because 	this method will become ineffective. This is because with the 	passage of time, the standards which are used for measuring 	compliance will modify from a one – model – fits – all 	structure to tailored models that are largely based on risks. What 	this implies is that assessments which are based on checklists will 	not be useful enough and can even harm businesses because they do 	not analyze risks effectively.</span></span></p>
</li>
<li>
<p style="margin-bottom: 0in;" align="JUSTIFY"><span style="font-family: Calibri, serif;"><span style="font-size: x-small;">Risk 	management will keep on developing as specialization, and companies 	will eagerly hire individuals who achiever this. Compliance risks 	will continue to occupy even greater portions in a company&#8217;s 	complete risk portfolio. As such, the need for individuals who have 	gained expertise in this will rise. True right now, risk management 	is not exactly recognized as a proper professional specialization, 	but as time changes, so will this in the long run. </span></span></p>
</li>
<li>
<p style="margin-bottom: 0in;" align="JUSTIFY"><span style="font-family: Calibri, serif;"><span style="font-size: x-small;">Compliance 	risk assessment activities will gradually become a continuous and 	dynamic process. As of now, companies perform these assessments on a 	yearly basis. After this, the compliance register is often thrown 	off in the shelves, only to be taken out in the subsequent year. 	However, now lawmaking is becoming more prominent and is 	accelerating at a rapid pace. As such, companies will need to 	reassess their compliance risks on a regular basis. </span></span></p>
</li>
<li>
<p style="margin-bottom: 0in;" align="JUSTIFY"><span style="font-family: Calibri, serif;"><span style="font-size: x-small;">Risk 	assessment will also start addressing third party risks so that they 	can be managed in a better way. Often, risk managers do not consider 	the regulatory and legal risks that are associated with vendors, 	suppliers, outsourced companies and the like. This approach often 	results in an error. Though in every business, all these outside 	agencies are an integral part, you cannot be sure if they will 	comply with the legal polices or not. As such until everyone follows 	the same methodologies, proper management cannot be achieved.</span></span></p>
</li>
</ul>
]]></content:encoded>
			<wfw:commentRss>http://www.best-practice.com/governance/governance-compliance/compliance-risk-what-would-it-be-like-in-the-future/compliance-risk-what-would-it-be-like-in-the-future-14092013/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>What is the Chinese Wall?</title>
		<link>http://www.best-practice.com/governance/governance-compliance/what-is-the-chinese-wall/what-is-the-chinese-wall-14092013/</link>
		<comments>http://www.best-practice.com/governance/governance-compliance/what-is-the-chinese-wall/what-is-the-chinese-wall-14092013/#comments</comments>
		<pubDate>Sat, 14 Sep 2013 10:41:51 +0000</pubDate>
		<dc:creator>Matthew S.</dc:creator>
				<category><![CDATA[What is the Chinese Wall?]]></category>

		<guid isPermaLink="false">http://www.best-practice.com/?p=3160</guid>
		<description><![CDATA[The Chinese Wall is basically a barrier that separates two or more groups, generally as a way of restricting information flow and to protect confidential information. Usually, the wall is entirely conceptual. However, groups can be divided by physical barriers (building areas) as well as policies.
The concept of the Chinese Wall is incorporated in various [...]]]></description>
			<content:encoded><![CDATA[<p style="margin-bottom: 0in;" align="JUSTIFY">The Chinese Wall is basically a barrier that separates two or more groups, generally as a way of restricting information flow and to protect confidential information. Usually, the wall is entirely conceptual. However, groups can be divided by physical barriers (building areas) as well as policies.</p>
<p style="margin-bottom: 0in;" align="JUSTIFY">The concept of the Chinese Wall is incorporated in various environment situations, which includes journalism, law, network security, project management, software development, business, and the financial industry.</p>
<p style="margin-bottom: 0in;" align="JUSTIFY">The term ‘Chinese Wall’ originated after the disastrous stock market crash in 1929, when the widely unregulated United States market suffered a 40% plunge between the months of September and October. According to a theory, the crash was a result of inflated stock values, which were created by insider trading and price manipulation. It was after the crash that Congress passed a law mandating separation of both investment and commercial banks, in an attempt to prevent a conflict of interest. Instead of enforcing corporate and physical separation, the law only stated that the policies need to be in place in order to create a logical partition between these divisions.</p>
<p style="margin-bottom: 0in;" align="JUSTIFY">In theory, a Chinese Wall serves to restrict information flow to those individuals or groups who need it to perform their jobs. In practice, however, the Chinese Wall is highly dependable because it relies completely on the honor system. The information is restricted by the meticulousness and discretion of the parties involved. Regulations that identify the need for legal requirements for information security are incidentally more inclined towards improving compliance.</p>
<p style="margin-bottom: 0in;" align="JUSTIFY">An example of the Chinese Wall is in software development, where the Chinese wall also referred to as the “clean room technique” is a reverse engineering approach by which programmers work on codes to separate groups.  The first group will convert the program’s “machine code” into “source code” and then “document” the process, but will write no new code. The second group, however, will not be referring to the original code, but develops a new program based on the first group’s ‘documentation’.</p>
<p style="margin-bottom: 0in;" align="JUSTIFY">The basic purpose of the exercise is to make sure that the new program’s code cannot be derived from the original program’s codes.</p>
<p style="margin-bottom: 0in;" align="JUSTIFY">The Chinese Wall is typically an indication of the ‘Great Wall of China’, which had been built 2,000 years ago in order to protect its populace from invaders. However, there are other theories that exist such as in a Wikipedia entry, for instance, the author debates over the term being derived from a diplomatic machination during the Late Imperial Era in China, “&#8230;if a junior mandarin saw a senior mandarin on the road he was expected to bow and present his compliments. In Beijing this tended to happen quite a lot and so traffic was frequently blocked. Instead mandarins came up with a method of pretending they did not see each other on the road by the clever placing of a retainer with an umbrella. Because they did not &#8220;see&#8221; each other, they were not obliged to stop.&#8221;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.best-practice.com/governance/governance-compliance/what-is-the-chinese-wall/what-is-the-chinese-wall-14092013/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Using Big Data To Create Great Customer Experience</title>
		<link>http://www.best-practice.com/governance/data-governance/using-big-data-to-create-great-customer-experience/using-big-data-to-create-great-customer-experience-14092013/</link>
		<comments>http://www.best-practice.com/governance/data-governance/using-big-data-to-create-great-customer-experience/using-big-data-to-create-great-customer-experience-14092013/#comments</comments>
		<pubDate>Sat, 14 Sep 2013 10:39:56 +0000</pubDate>
		<dc:creator>Matthew S.</dc:creator>
				<category><![CDATA[Using Big Data To Create Great Customer Experience]]></category>

		<guid isPermaLink="false">http://www.best-practice.com/?p=3158</guid>
		<description><![CDATA[The phenomenon known to us as &#8216;Big Data&#8217; certainly comes with a lot of promise. And why wouldn&#8217;t it? After all, having terabytes of information and data based on customer behavior and history is surely better than extracting information from a few data points.
Of course, online marketers who understand the Big Data are obviously going [...]]]></description>
			<content:encoded><![CDATA[<p>The phenomenon known to us as &#8216;Big Data&#8217; certainly comes with a lot of promise. And why wouldn&#8217;t it? After all, having terabytes of information and data based on customer behavior and history is surely better than extracting information from a few data points.</p>
<p><img class="alignleft" title="Using Big Data To Create Great Customer Experience" src="http://b-i.forbesimg.com/gyro/files/2013/06/feel-mark-300x30011.jpg" alt="" width="180" height="180" />Of course, online marketers who understand the Big Data are obviously going to build better customer experiences based on evidence and hard data, rather than making guesswork and hunches. Instead of working with crude analytics or on intuition, you might consider using definitive data to design product pages to attract best and potential customers directly towards your shopping cart. Plus, you&#8217;d know exactly when to introduce your special offers and promotions and you would even know what promotion would work best according to your customers profile. In addition, you could even optimize your online interface, that way you can make sure that everything from registration to search to placing orders would be completely frictionless.</p>
<p>However, getting to that point does require you to first acquire the data. It&#8217;s not a small feat to gather huge amounts of data from various sources. It&#8217;s even trickier to understand and translate that information into fuller shopping carts and visits.</p>
<p>The good news is, there are tools and technologies that allow you to find that gold at the end of the customer data rainbow and will allow you to use it by refining your online marketing strategies with precision. However, there&#8217;s a way of thinking concerning the collected data that involves shifts in culture, according to where your company stands right now.</p>
<p>So, here are a few steps to help you tame your big data:</p>
<p><strong>Don&#8217;t Think Instantaneous, Focus on Continuous Iteration and Evolution</strong><br />
Yes, Big Data has the ability to fundamentally cause a shift in the way you do business, but don&#8217;t change everything at once.  It&#8217;s actually far more productive to adopt the “test and learn” approach rather than the “hit and run” philosophy. A dozen incremental changes in the sites personalization, design or word can get you further than simply trying to “innovate” all at once.</p>
<p>The most successful online marketers are continuously refining and optimizing. They steadily move forwards, by taking over a thousand baby steps, finding improvements along the way.</p>
<p><strong>Incorporate Big Data Goals With Your Own Individual Goals</strong><br />
You need to set up separate projects and initiatives for your business goals like increasing lifetime customer value, improve customer loyalty, increasing conversion rates or acquiring new customers.  This approach makes it easier to determine the kind of data you need to obtain, and how you need to use it. Remember to make your team focus on one project objective at a time.</p>
<p><strong>Internally Sell the Concept</strong><br />
In some organizations, shifting towards a more evidence-based, data driven marketing might require some extra communication, especially if you want everyone on the same &#8216;page&#8217;.</p>
<ul>
<li>Let everyone know what you know, encourage continual learning and knowledge sharing.</li>
<li>Simplify everything by using graphs and pictures.</li>
<li>Present the data and the outcomes in a way that&#8217;s easy to understand allowing managers to make more accurate decisions.</li>
<li>Don&#8217;t Hide the end results, make sure you communicate achievements and plans across the organization.</li>
</ul>
<p><strong>Form One Big Family</strong><br />
You need to include Web developers, analytical gurus and marketing strategists as well as the creatives, who might feel a bit threatened when working with hard evidence. Then integrate those responsible for site optimizations and e-commerce.</p>
<p>And finally, you need to dedicate, obsessed and committed executive who will drive and combine the process and will also act as the focal point for future customer experience innovation.</p>
<p>Once, you do all of this, you can know for sure that your customers will always be coming back to fill their shopping cart.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.best-practice.com/governance/data-governance/using-big-data-to-create-great-customer-experience/using-big-data-to-create-great-customer-experience-14092013/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Understanding the Basics of Conflict of Interest</title>
		<link>http://www.best-practice.com/governance/governance-risk-management/understanding-the-basics-of-conflict-of-interest/understanding-the-basics-of-conflict-of-interest-14092013/</link>
		<comments>http://www.best-practice.com/governance/governance-risk-management/understanding-the-basics-of-conflict-of-interest/understanding-the-basics-of-conflict-of-interest-14092013/#comments</comments>
		<pubDate>Sat, 14 Sep 2013 09:56:18 +0000</pubDate>
		<dc:creator>Matthew S.</dc:creator>
				<category><![CDATA[Understanding the Basics of Conflict of Interest]]></category>

		<guid isPermaLink="false">http://www.best-practice.com/?p=3154</guid>
		<description><![CDATA[Employees who perform official duties are expected to perform those duties in the best interest of and by representing the organization that has employed them. A conflict of interest can only arise when an employee, director or officer of the organization appears to have or has a motive based on self interest, where the organization [...]]]></description>
			<content:encoded><![CDATA[<p><img class="alignleft" title="Understanding the Basics of Conflict of Interest " src="http://bostoncatholicinsider.files.wordpress.com/2010/11/managing-coi.gif?w=150&amp;h=80" alt="" width="150" height="80" />Employees who perform official duties are expected to perform those duties in the best interest of and by representing the organization that has employed them. A conflict of interest can only arise when an employee, director or officer of the organization appears to have or has a motive based on self interest, where the organization is completely unaware of the motives which could be potentially adverse to its best interest.</p>
<p>If a conflict of interest results in financial or economical loss to the organization through waste, abuse or fraud, then criminal, civil and administrative remedies can be pursued as the situation or policy dictates.</p>
<h3>What is Conflict of Interest?</h3>
<p>Conflict of interest is usually described as any situation that would involve a person’s “self-dealing”, “non arms length relationships”, “serving two masters” or even “related party transactions” all of which could result in the gain or benefit for one party at the expense of another. A structured definition of the conflict of interest is:</p>
<ul>
<li>The convergence between an individual&#8217;s personal relationships/obligations/interests and his/her professional obligations towards the organization.</li>
</ul>
<ul>
<li> So much so that an independent observer can rationally question the actions, outcomes and motives regarding the actions taken and decisions made by the particular individual, employee, director, officer as well as</li>
</ul>
<ul>
<li> The individuals immediate family, third party or organization that might have a business association or interest where they might receive “things of value” as a result of the actions taken or decisions made by the particular individual whether they&#8217;re an employee, officer or even the director of the organization.</li>
</ul>
<h3>What Are &#8220;Things of Value&#8221;?</h3>
<p>“Things of value” include various forms of financial benefits, such as commissions, salaries, raises, bonuses or even promotions that are not offered by the organization. It could even include receipts of automobiles and gifts of nominal values, there could be receipts of investments, annuities or even paid vacations. Payment of credit card bills, or any other forms of personal expenses, receipts for bonds, stocks, insurance policies which will be paid by the third party, a promise or offer of employment, realization of unfair competitive advantage, business profits or any other forms of compensation being provided by the organization to its employees, officer and directors.</p>
<h3>Is Conflict of Interest a Crime?</h3>
<p>In the U.S, conflict of interest generally is not considered as crime unless the individual with the “conflict” is actually a government employee or works with a government employee. However, if the conflicting interest of an employee, officer or director results in economic or fiscal loss or loss of competitive advantage of the organization then an intentional act of abuse or fraud which involves bribery or receiving rewards can be considered as a crime punishable by law.</p>
<h2><em>Common Examples of Conflict of Interest</em></h2>
<p>The following are considered to be the most common examples concerning conflict of interest:</p>
<h3><em>Administrative Funding/Decisions:</em></h3>
<p>An employee or officer hires a consultant who is related to them without getting any approval by the organization.</p>
<h3><em>Business/Consulting Interests:</em></h3>
<p>An employee, officer or director makes referrals to a business venture in which that particular individual, a member of his family or an associated entity, has some financial interest.</p>
<h3><em>Use of Services, Materials and Equipment:</em></h3>
<p>An employee or officer uses the organization’s resources and facilities for external business activities or private consulting.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.best-practice.com/governance/governance-risk-management/understanding-the-basics-of-conflict-of-interest/understanding-the-basics-of-conflict-of-interest-14092013/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Tips For Businesses to Prevent Fraud</title>
		<link>http://www.best-practice.com/governance/governance-risk-management/tips-for-businesses-to-prevent-fraud/tips-for-businesses-to-prevent-fraud-14092013/</link>
		<comments>http://www.best-practice.com/governance/governance-risk-management/tips-for-businesses-to-prevent-fraud/tips-for-businesses-to-prevent-fraud-14092013/#comments</comments>
		<pubDate>Sat, 14 Sep 2013 09:47:13 +0000</pubDate>
		<dc:creator>Matthew S.</dc:creator>
				<category><![CDATA[Tips For Businesses to Prevent Fraud]]></category>

		<guid isPermaLink="false">http://www.best-practice.com/?p=3151</guid>
		<description><![CDATA[Businesses need to take the necessary precautions to protect their assets from any form of fraud. It&#8217;s actually quite common for anyone to strike, at any time. Organizations around the globe actually lose an estimate of 5% of their revenue due to fraud.
According to the survey conducted by fraud experts from the Associate of Certified [...]]]></description>
			<content:encoded><![CDATA[<p>Businesses need to take the necessary precautions to protect their assets from any form of fraud. It&#8217;s actually quite common for anyone to strike, at any time. Organizations around the globe actually lose an estimate of 5% of their revenue due to fraud.</p>
<p>According to the survey conducted by fraud experts from the Associate of Certified Fraud Examiners (ACFE), companies that believe they&#8217;re taking all of the necessary precautions to prevent fraudsters from wrecking havoc can also become victims.</p>
<p><img class="alignleft" title="Tips For Businesses to Prevent Fraud" src="http://img.ehowcdn.com/article-new-thumbnail/ehow/images/a07/0t/01/ways-prevent-fraud-identity-theft-1.1-800x800.jpg" alt="" width="210" height="180" />To help businesses protect themselves, here are a few tips you should follow in order to protect yourself against fraud attacks.</p>
<h3>Make Sure You Do Background Checks</h3>
<p>Make sure you research and verify each of your employee&#8217;s backgrounds. The US Chamber of Commerce has estimated that employee theft can cost an organization over $40 billion per year. This value is 10x times greater than the value of street crimes in the US.</p>
<h3>Verify Creditworthiness</h3>
<p>Your customers come second to your employees, especially to the importance of your business. However, any kind of organization is susceptible to customer fraud, whether they&#8217;re from return frauds, stolen credit cards and bad checks. Organizations that conduct customer credits checks will always avoid any form of lost revenue.</p>
<h3>Tighten Security</h3>
<p>Organizations need to incorporate the use of physical internal and external security in the form of personnel, cameras and locks. One of the easiest ways to commit fraud is to obtain access to personal business files and leave with the material.</p>
<p>According to the Javelin 2013 Identity Fraud Industry Report, 2012 itself had seen over one million fraud incidents costing around $21 billion.</p>
<h3>Passwords Should Be Changed Frequently</h3>
<p>This is an essential &#8216;must do&#8217; strategy; employees are simply required to change their passwords frequently in order to protect confidential information from leaking out. In accordance to the 2011, Cost of a Data Breach Study: United States, in 2012 alone, the cost per company on reported breaches amounted to $5.5 million</p>
<h3>Use a Tip Line</h3>
<p>Most fraud incidents are identified by whistle blowers in the company. An organization needs to either set up a text number, website, email address or phone number, ensuring the provider with complete security, if they identify any form of fraud incidents. The Associate of Certified Fraud Examiners (ACFE) said that most frauds are identified through whistle blower and tipsters from within the organization.</p>
<h3>Always Be Prepared</h3>
<p>Form a knowledge based team who will be ready to aggressively investigate, address and correct any issues, irregularities and concerns in the organization. In order to perform such a task, the individuals in the team need to have strong working knowledge of the company&#8217;s policies. The team needs to be capable enough to handle various incidents that may arise, through snail mail, social media phone, email or fax.</p>
<p>A dynamic and flexible case management system that is capable of assembling pieces from various sources is highly crucial. Technology offers access to various pieces, no matter where they&#8217;re hiding, and knowing when the incident occurred is important too. Today, smart phones and tablets are the perfect tools for the knowledge worker and the success of your business relies heavily on the support of these devices.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.best-practice.com/governance/governance-risk-management/tips-for-businesses-to-prevent-fraud/tips-for-businesses-to-prevent-fraud-14092013/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The World Rakes in All the Goods As the Dollar Begins to Steady Itself</title>
		<link>http://www.best-practice.com/governance/data-governance/the-world-rakes-in-all-the-goods-as-the-dollar-begins-to-steady-itself/the-world-rakes-in-all-the-goods-as-the-dollar-begins-to-steady-itself-14092013/</link>
		<comments>http://www.best-practice.com/governance/data-governance/the-world-rakes-in-all-the-goods-as-the-dollar-begins-to-steady-itself/the-world-rakes-in-all-the-goods-as-the-dollar-begins-to-steady-itself-14092013/#comments</comments>
		<pubDate>Sat, 14 Sep 2013 09:42:57 +0000</pubDate>
		<dc:creator>Matthew S.</dc:creator>
				<category><![CDATA[The World Rakes in All the Goods As the Dollar Begins to Steady Itself]]></category>

		<guid isPermaLink="false">http://www.best-practice.com/?p=3148</guid>
		<description><![CDATA[As the stocks began to recover from their recent sharp losses and the dollar steadied itself on Friday, even though both were expected to decline for the fourth straight week, talks about the US Federal Reserve (which happens to meet next week) may have something to do with this recent up rise.
The agenda of the [...]]]></description>
			<content:encoded><![CDATA[<p>As the stocks began to recover from their recent sharp losses and the dollar steadied itself on Friday, even though both were expected to decline for the fourth straight week, talks about the US Federal Reserve (which happens to meet next week) may have something to do with this recent up rise.</p>
<p>The agenda of the meeting is to discuss a reduction in bond buying later in the year, which has sparked a selloff not only in local, but global markets as well. This week it has bruised not only emerging market assets, bonds, stocks, but has also battered the dollar.</p>
<p>The U.S. currency continued to be sluggish against both the euro and the yen on Friday, but had gained a footing against the Japanese unit, which was around 95 yen, but was at an all time 2 month low at 93.75 the previous day.</p>
<p>With the unexpected U.S. retail sales data rising overnight, and with the impact of selloffs on riskier assets beginning to settle, the market noticed some degree of relief. In fact, the European stocks rose to 0.3% as they followed a rebound from the Asian shares.</p>
<p>The markets have been panicky because of the idea that the Federal Reserve could start pulling in its support, which has been known to increase asset prices over the past 4 years. However, Philippe Gijsels, who is head of research at BNP Paribas Fortis Global Markets, said that growth seemed a bit patchy; he wasn’t expecting the Fed to move till the end of the year.</p>
<p>&#8220;If you have easy monetary policy and improving economic conditions, which will also help companies to produce good earnings, &#8230; then you have a lot of the building blocks in place (to drive stock market gains),&#8221; he added.</p>
<p>Most of the major stock markets including the MSCI’s world index have substantially fallen for 4 straight weeks now; along with Europe right on course with a drop of 1.5% this week, Japan’s Nikkei is still trying to recover from its losses of a 15% fumble since mid-May, despite rising 2% on Friday.</p>
<p>The Japanese stock market has been on a constant roller coaster ride; being hurt by the stimulus has caused worries that have unveiled the government’s pro-growth package.</p>
<h3>Peripheral Image</h3>
<p>In Europe’s own debt market, the southern euro zone bonds in particular were back on top after a turbulent session, which includes the German bonds that rose up 43 ticks adding to this week’s gain. Standard and Poor’s rating agency helped the euro zone margin by keeping Spain’s debt over the ‘junk’ status, even though it does leave the country at a risk of being downgraded since it will be maintaining a negative position on the bonds.</p>
<p>Commodities, including metals have been avoided because of the striking swings seen by currencies and equities this week. However, they too were affected by the stimulus concern by the Feds.</p>
<p>Copper had edged itself up to $7,094 a ton, after recovering from a six week low drop on Thursday, while precious metals such as platinum and gold lingered on their recent lows.</p>
<p>Brent Crude rose up to $105 a barrel for the first time in recent months, even though analysts had suggested that the volatile dollar would have its impact.</p>
<p>According to Ric Spooner, Chief market analyst at CMC Markets, “The key driver of oil has been the weakness in the dollar rather than any fundamental factors,” he further went on to say that, “Traders are wary about pushing things higher because they are confronted with a situation of plenty of supplies when seasonal demand is supposed to pick up”.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.best-practice.com/governance/data-governance/the-world-rakes-in-all-the-goods-as-the-dollar-begins-to-steady-itself/the-world-rakes-in-all-the-goods-as-the-dollar-begins-to-steady-itself-14092013/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Promise of the Big Data Era</title>
		<link>http://www.best-practice.com/governance/data-governance/the-promise-of-the-big-data-era/the-promise-of-the-big-data-era-14092013/</link>
		<comments>http://www.best-practice.com/governance/data-governance/the-promise-of-the-big-data-era/the-promise-of-the-big-data-era-14092013/#comments</comments>
		<pubDate>Sat, 14 Sep 2013 09:38:26 +0000</pubDate>
		<dc:creator>Matthew S.</dc:creator>
				<category><![CDATA[The Promise of the Big Data Era]]></category>

		<guid isPermaLink="false">http://www.best-practice.com/?p=3145</guid>
		<description><![CDATA[Recently a DM News article titles “Big Data Must create Big Experiences”, direct marketing veteran Ernan Roman highlighted that for all of the information that is being collected, marketers apparently aren’t doing much about it.
An appraisal of the brand and loyalty marketing emails received by many reveals that only a few of them mention any [...]]]></description>
			<content:encoded><![CDATA[<p>Recently a DM News article titles “Big Data Must create Big Experiences”, direct marketing veteran Ernan Roman highlighted that for all of the information that is being collected, marketers apparently aren’t doing much about it.</p>
<p>An appraisal of the brand and loyalty marketing emails received by many reveals that only a few of them mention any form of relationship that had existed between the user and the company, whether it’s an address or a past buying behavior. This is a serious oversight made by many companies, since research has shown that if companies provide customers with relevant personal information, they’re much more likely to buy something from them.</p>
<p><img class="alignleft" title="The Promise of the Big Data Era" src="http://www.newyorker.com/online/blogs/elements/big-data-swarte.jpg" alt="" width="157" height="218" />In fact, the unfulfilled promise of using big data was even presented during the DM News Roundtable. Although, there were a small number of people on the panel who had paid to combine, “research, analytics, and transaction data… in the hope of creating a more tailored form of communication”. The conversation between the panel members was simply all talk and no work.</p>
<p>However, there was one statement that took place on the roundtable that was true, and it simply sums up the current situation of the big data. The statement came from the straight shooter IIana Rabinowitz, the CMO at Lion Brand Yarns, who said, “I think that for most small and midsize companies Big Data is irrelevant. It’s like the Wild, Wild West of information. You can’t use it, you don’t have people who can analyze it, and if it’s there, you don’t know how to get to it.”</p>
<p>It may seem like a derogatory statement, but it’s true nonetheless.  Plus there were concerns with big data extending into the loyalty marketing business also. In a recent report by Retail Wire a question had been raised that: “Why Aren’t More Companies Connecting Big Data Dots for Loyalty Programs?” the online publicist referred to the lack of effort by marketers, and concluded that, ““While most respondents feel the need to engage customers based on their needs and expectations, they’re not leveraging the data in a way that maximizes the potential loyalty offered by customers.”</p>
<p>We can try to explain it a bit simpler using a football analogy. Simply big data feels like a potential superstar player who came from the first draft pick, but still hasn’t proven himself while he’s on the field. Plus, the coach isn’t really sure on how or when to use him. So, for the time being, he’s confined to the bench; he may get a chance to play in the future, but it’s anyone’s call when he gets to play.</p>
<p>Since, it appears that most marketers haven’t quite understood how to use the big data, it’s perhaps time to go old-school. Again quoting Ernan Roman, “Customers, both B2B and B2C, are sophisticated enough to recognize that to receive increasingly relevant offers, they must share detailed preference information.”</p>
<p>So, if you’re not capable of leveraging big data, the next best way to collect ‘customer preferences data’ is by sending out surveys, both online and offline.  With this approach, you create a form of communication between yourself and the customer, offering them personalized communication, featuring services, products as well as benefits that could interest your customers.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.best-practice.com/governance/data-governance/the-promise-of-the-big-data-era/the-promise-of-the-big-data-era-14092013/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Paradigm Shifts That Will Occur Because of Big Data</title>
		<link>http://www.best-practice.com/governance/data-governance/the-paradigm-shifts-that-will-occur-because-of-big-data/the-paradigm-shifts-that-will-occur-because-of-big-data-14092013/</link>
		<comments>http://www.best-practice.com/governance/data-governance/the-paradigm-shifts-that-will-occur-because-of-big-data/the-paradigm-shifts-that-will-occur-because-of-big-data-14092013/#comments</comments>
		<pubDate>Sat, 14 Sep 2013 08:37:35 +0000</pubDate>
		<dc:creator>Matthew S.</dc:creator>
				<category><![CDATA[The Paradigm Shifts That Will Occur Because of Big Data]]></category>

		<guid isPermaLink="false">http://www.best-practice.com/?p=3142</guid>
		<description><![CDATA[It’s always an interesting idea to address technological issues and when the Foreign Affairs published “The Rise of Big Data: How’ It’s Changing the Way We Think About the World”, you can be sure it created some hype.
It was written by Viktor Mayer-Schoenberger who’s a professor of Internet Governance and Regulations at Oxford Internet Institute [...]]]></description>
			<content:encoded><![CDATA[<p>It’s always an interesting idea to address technological issues and when the Foreign Affairs published “The Rise of Big Data: How’ It’s Changing the Way We Think About the World”, you can be sure it created some hype.</p>
<p>It was written by Viktor Mayer-Schoenberger who’s a professor of Internet Governance and Regulations at Oxford Internet Institute and Data Editor of the Economist, Kenneth Cukier.</p>
<p><img class="alignleft" title="The Paradigm Shifts That Will Occur Because of Big Data" src="http://www.africatelecomsonline.co.za/media/k2/items/cache/8181cbd90df5a1571a01396c2c96d8d0_L.jpg" alt="" width="187" height="136" />What’s so ingenious about the piece is that it puts Big Data into a much larger context, as if you would be dipping back in time to the 3rd Century BC, where the sum of all human knowledge existed only in the Library of Alexandria, which would be about an estimate of 1,200 exabytes. However, by doing so Mayer-Schoenberger and Cukier have changed how we perceive Big Data. According to them, Big Data changes the playing field not just for technology, but for all data types and our understanding of them.</p>
<p>In their piece, both Cukier and Mayer-Scheonberger have identified three ways Big Data will change our understanding of data:</p>
<h3>Sampling from Some To All</h3>
<p>Before the inception of Big Data, the only way to truly understand human behavior was based on sampling of specific segmented group. Now, with Big Data, the size of the sample is much larger. In fact, we can even go as far as saying “all”.</p>
<p>“Big data is a matter not just of creating somewhat larger samples but of harnessing as much of the existing data as possible about what is being studied,” the authors write. “We still need statistics; we just no longer need to rely on small samples.”</p>
<h3>Moving From Organized To Clutter</h3>
<p>Data Management experts will spend most of their time discussing the importance of data governance and data quality. There have been discussions on how these disciplines could be incorporated in the use of Big Data; that way you can make informed decisions.</p>
<p>The problem, however, lies in the fact that you’re talking about data that’s not under your control nor is it under an easy governance program, but when you’re dealing with larger data sets that’s generally not the problem. The only reason you believe in it is that statisticians will tell you that, but you need to remember that when you’re talking about the quality of the data set, you might encounter such problems with Big Data.</p>
<p>The article cleared all that up by describing the history of computer aided language translation. For instance, in the 1990’s IBM made an attempt to create a translation machine that used masks, perfect translation of parliamentary transcripts and probability. It wasn’t really appreciated, nor was it that great.</p>
<p>Moving forward to today, what do you look for when you want on the spot translation? You look for Google. The company has accomplished something quite astounding; they’ve used “messy” data from the internet which includes billions of translations from all over the web, resulting in a translation of over 65 languages.</p>
<p>“Large amounts of messy data trumped small amounts of cleaner data,” the authors write.</p>
<p>Its one thing to know, it’s another to actually grasp the idea of understanding data sets and moving forward with Big Data and according to the writers it’s the reason for the third shift of how we comprehend data sets, which is our focus on correlations, instead of causations.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.best-practice.com/governance/data-governance/the-paradigm-shifts-that-will-occur-because-of-big-data/the-paradigm-shifts-that-will-occur-because-of-big-data-14092013/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Benefits of a Risk Management Software</title>
		<link>http://www.best-practice.com/governance/governance-risk-management/the-benefits-of-a-risk-management-software/the-benefits-of-a-risk-management-software-14092013/</link>
		<comments>http://www.best-practice.com/governance/governance-risk-management/the-benefits-of-a-risk-management-software/the-benefits-of-a-risk-management-software-14092013/#comments</comments>
		<pubDate>Sat, 14 Sep 2013 08:28:27 +0000</pubDate>
		<dc:creator>Matthew S.</dc:creator>
				<category><![CDATA[The Benefits of a Risk Management Software]]></category>

		<guid isPermaLink="false">http://www.best-practice.com/?p=3139</guid>
		<description><![CDATA[Trying to put together a business case that requires financial investment in today&#8217;s environment can be a daunting task. So things are definitely much tighter. However, most organizations still realize that if they stop investing in new processes, projects and personnel altogether it would be a really big mistake. It just means that in today&#8217;s [...]]]></description>
			<content:encoded><![CDATA[<p style="text-align: center;"><img class="aligncenter" title="The Benefits of a Risk Management Software" src="http://www.aon.com/images/esolutions/esolutions.jpg" alt="" width="446" height="107" /></p>
<p>Trying to put together a business case that requires financial investment in today&#8217;s environment can be a daunting task. So things are definitely much tighter. However, most organizations still realize that if they stop investing in new processes, projects and personnel altogether it would be a really big mistake. It just means that in today&#8217;s day and age, senior managers need to have greater evidence and confidence about how new investments in technology and systems can improve the organization overall.</p>
<p>Investing in risk management software is simply no different. So, let&#8217;s take a look at the few benefits that organizations can receive if they decide to invest in risk management software.</p>
<h3>Seizing Opportunities</h3>
<p>Through the process of risk analysis opportunities can be seized and recognized. However, the problem faced by many organizations without a dedicated risk management software system is that they do more than capture easily identifiable, historic and obvious risks with no consideration to their relevance.  This reactive approach to risk management systems can help organizations “tick boxes” as well as comply with standards, but it adds very little value to the organization itself.</p>
<p>Risk management has actually become a necessity for corporate governance, so why not focus on it completely? Taking a more proactive stance like implementing a fully functional risk management software and embedding clear strategies would allow an organization to relate risks according to departments, objectives, and even a simple search could identify opportunities and threats much more efficiently and quickly.</p>
<h3>Enhancing Project Risk Management</h3>
<p>Trying to achieve your project objective in a timely manner and within budget is not easy, thus risk management is important for project managers to ensure the best possible outcomes. By using risk management software, project managers can actually delegate ownership of control and risk measures to relevant departments and personnel, making sure that they are kept up to date through the generation of automatic reminders.</p>
<p>A dedicated software system ensures that the projects risks are all identified, managed and that accountability has been well defined. It even prevents issues such as “fire fighting” which are failures that should have been prevented.</p>
<h3>Consistency and Communication</h3>
<p>Communication is very essential for risk management, but with large and global scale projects it can be quite difficult. And as a result consistency can be lost if departments decide to hold their own risk registers and employees who could benefit from access to these risk registers do not have access to it.</p>
<p>The risk management software needs to be flexible. Employees can be given access to single and multiple departments or even the entire organization, which would allow simple assessment ensuring that there&#8217;s a uniform approach when it comes to maintaining risk.</p>
<h3>Clear Strategy for Risk Based Audits</h3>
<p>Risk based auditing is actually becoming an increasing practice. Many organizations have been experiencing significant advantages when it comes to viewing business processes in a risk environment, since risks are often the root cause for financial surprises. This does not just apply to financial audits, but audits covering operations, reputations and various other aspects are all included.</p>
<p>Organizations that manage their risk through spreadsheets often find it difficult to manage version control, especially if multiple users access the document and edit it. Having a highly dedicated risk management software that records a full history and audit trail can make the entire audit process much more effective and easier.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.best-practice.com/governance/governance-risk-management/the-benefits-of-a-risk-management-software/the-benefits-of-a-risk-management-software-14092013/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
