Deloitte Analytics. Trusting big data: Perspective on data governance as a customer analytics investment
|
|
|
- Christina Morgan
- 10 years ago
- Views:
Transcription
1 Deloitte Analytics Trusting big data: Perspective on data governance as a customer analytics investment
2 Many companies are investing significant amounts in customer analytics to drive their business and seek new ways to offer value to their customers. However, much of the potential value of that investment is at risk because data governance practices have not kept pace with the ways in which data is being used. 2
3 Defining the governance objective A deluge of data now streams from nearly every aspect of your customers daily lives and the interactions you and other business partners and data sources have with those customers. The opportunities to capture, understand, and gain insight into customer behavior and sentiment are immense. Many consumer-facing organizations are now investing in, accumulating, and analyzing their customer data. This significant increase in data use offers great opportunity, but also exposes organizations to remarkable risks. There is no shortage of opportunities where data can be used, however, as businesses capture consumer activities, behaviors, and patterns, they are challenged with balancing two, potentially competing, objectives in the context of creating a trusted customer analytics program; how to simultaneously leverage and protect the data. Behavioral analytics is a popular big data tenant helping businesses understand and predict likely customer demands and trends. It often involves multimillion dollar projects which gather a broad array of customer signals, and when successful, can be employed to increase brand awareness, improve product designs, promote loyalty, and enhance customer satisfaction. These insights can play a major role in defining product strategies and future business investments, and as such, are coming under greater scrutiny regarding their precision, inherent bias, and longer-term predictive confidence. The speed with which marketing decisions need to be made now demand that source data be collected, analyzed, and adapted in near real time. The other concern, in addition to the reliability of customer insights, is how to respond to consumers heightened awareness and concern about their privacy. Simply complying with the legal terms and conditions from a privacy policy no longer seems sufficient. Regardless of what is stated in that privacy policy, customers believe they have a social contract with the brands they trust. This social contract often contains expectations that go beyond the legal agreement and is the basis for how customers judge a company s behavior in the court of public opinion. The legal contract is of little defense when trying to win back customers that no longer trust your brand. To create a trusted customer analytics program, data governance over customer analytics should seek to achieve two objectives: reliability and precision of the source data and analysis performed on it. protection of the data to satisfy both customer and legal expectations. While both objectives need to be achieved, there is a natural tension between both. More intense and widespread analysis of the data may lead to poor data-handling practices, placing customer privacy at risk. By the same token, too much control and rigidity can inhibit the ability to find key trends and insights. A strategic, proactive, and balanced strategy is needed. Furthermore, as companies expand their co-marketing efforts or consider opening their coffers to business partners, they need higher levels of trust in their datasets and require confidence in their data governance framework. Companies that are able to convey assurance to this extended enterprise can gain a competitive advantage with a trusted customer analytics program. Trusting big data: Perspective on data governance as a customer analytics investment
4 The way forward The quality and reliability of differently sourced datasets and the degree to which attribution can be made to individual customers varies significantly. A helpful way to think about how to achieve the objectives is to break them down into logical phases of the data life cycle. Recognizing that your customer data needs to follow a structured data life cycle is the first realization for many companies in establishing a suitable control environment. We will explore the leading practices at each phase: data sourcing, analysis, dissemination, and culmination. Data sourcing Data analysis Culmination Dissemination Data sourcing Customer data signals vary widely in their source and reliability. Some data originates from internal enterprise systems, such as customer relationship management and billing systems, and have a higher degree of precision, structure, and security. Companies also generate data from marketing campaigns and in other cases acquire data from third-party sources. Data from internal systems tends to be structured and organized in accordance with an accepted data dictionary, whereas data from third parties (typically sourced from Web marketing and social media) tends to be unstructured with very few universally adopted standards defining how such data should be measured and reported. Other data that is purchased from third parties, such as the services provided by data aggregator brokers or social media listening platforms, are often sourced from disparate and sometimes unknown sources and have uncertain levels of reliability. So many customer analytics programs have a variety of data types from varying sources and are challenged with regard to how to combine and analyze these datasets. The quality and reliability of differently sourced datasets and the degree to which attribution can be made to individual customers varies significantly. More importantly, companies combining datasets from third parties should be asking the following questions: What methodology was followed in sourcing this data? Is the analysis and aggregation performed on the data certified and by what governing body or standards? Was the data ethically sourced (i.e., not obtained or sold under false or misleading pretenses and in compliance with relevant privacy regulations)? What resources, infrastructure, and tools are needed? big data toolsets today require specialized skills and the corporate infrastructure may need to be reviewed to manage the volume and disparate nature of the datasets. Many aggregators and users of aggregated data are simply not asking these trust questions. The risks of not doing so are clear. The reliability of the analytical frameworks employed by a company based on external source data can be reduced to the reliability of the lowest-quality dataset, and the company runs a reputational and possibly a legal risk procuring unethically sourced data. 4
5 Companies should consider establishing a formal, enterprise-level data acquisition and ingestion program. This program should: Establish a data definition for all key data elements based, where possible, on industryaccepted standards. Perform due diligence on potential data suppliers to evaluate their data collection and protection practices. Evaluate the extent to which internal and external data sources meet the data definition standards. Develop a mechanism to tag data with respect to its relative reliability and sensitivity. This tagging is important to controlling data use in subsequent phases. Develop data analysis rules so that data is used in a manner consistent with its relative reliability and sensitivity. Regularly refresh the assessment of sources and datasets and adjust accordingly. Update infrastructure needs and data toolsets to reflect the ability to process and manage disparate data sources. Such a sourcing program can take time and effort, but is critical to establishing a strong control foundation to the customer analytics program. The standards that are set for data sourcing will need to be reassessed periodically as customer profiling practices and data privacy regulations evolve. Data analysis There are a number of unique challenges when aggregating and analyzing customer behavioral data. Some of the more difficult challenges are in the variety of unstructured data types, including: Identification and removal of inherent bias. Attribution of marketing efforts to customer action. Estimation and forward protection of historical trends. Data precision and reconciliation. As there is a degree of judgment and uncertainty in these types of analysis, it is important to identify these risks and define acceptable rulesets so there is consistency in practice and clarity on the risks inherent in the analysis. Unfortunately, it is still common in practice to see these risks overlooked or suppressed and an implicit assertion that the reporting coming out of customer analytics is both reliable and trustworthy. Trusting big data: Perspective on data governance as a customer analytics investment
6 Dissemination Controlling the dissemination of reporting is important not only to protect your customer data and intellectual property, but also to ensure the reporting is used by those authorized and for those purposes for which it was created. Business groups will often request open access to customer analytics data stores to have the freedom to do their own analysis and to not be shackled by the formality and time it takes to produce formal reporting. The danger, however, is that it can be very difficult to reign in excessive access once it has been given. Leading practices, tools, and infrastructure in the dissemination of customer analytics reporting involve controlling access both from the perspective of who should see the reporting as well as controlling which reports can be accessed. For example, some reports that contain timesensitive data should be withdrawn when they are no longer reliable. Another leading practice is clearly describing in reports the assumptions used, risks thereof, and purpose for which the reporting has been prepared. Looking forward, companies that are in the business of selling customer data or insights, or, those that need higher levels of internal confidence, should consider establishing a framework to convey assurance to users. Such a framework should cover the integrity of the reporting and the protection afforded to the customer data used in the reporting. The Service Organization Control (SOC) reporting framework issued by the American Institute of Certified Public Accountants (AICPA) is one example of such a framework that could be used to convey such assurance. Culmination At some point, data will outlive its usefulness and a leading practice is to be intentional and set policies for the time period various types of customer data will be used and ultimately retained. There are a number of reasons why companies should be intentional about data destruction. The utility of customer data tends to erode over time and the longer it is retained the greater the risk it presents for drawing conclusions. In addition, the risk associated with a breach of customer data also increases if more data is retained than is needed. The larger and older the customer dataset, the more difficult it is to track and trace to the customers it relates to, and manage in a breach situation. Finally, the legal risk of complying with electronic discovery requests becomes much more difficult, if not impossible, to comply with unless these types of requests are anticipated in advance. Some data will need to be retained for longer periods for various reasons but too often we see customer analytics practices that are either unintentional about data destruction or have a mind-set that all data should be retained forever. Leading organizations have implemented a robust data governance framework that assigns accountability for the tracking and inventory of customer datasets. Included in these frameworks are defined data policies that require data be destroyed after a certain period of time. For sensitive data, it is important to be able to confirm the destruction of such data. The certification of destruction should consider all repositories such as off-site backups and should use technologies that eliminate the ability to restore such data. 6
7 Conclusion With the investment in customer big data programs growing, the potential value add for companies that get this right is significant. However, success demands a robust control environment. Companies that underinvest or delay their investment in their control environments over customer big data, threaten that investment. Aside from the fact that a strong control environment has significant benefits, rising expectations of confidentiality and security in contracts, law, and regulation, as well as the potential from brand damage when data is leaked or misused, are quickly making this a business imperative. The companies that will ultimately succeed with customer big data are those who have a strategic and proactive framework that can get consistent and more reliable insights while carefully protecting that data. Trusting big data: Perspective on data governance as a customer analytics investment
8 For more information about data governance, analytics, and the risks to your organization, please contact: Contacts Tim Davis Deloitte Advisory Principal Deloitte & Touche LLP Mohammad Nayeri Deloitte Advisory Senior Manager Deloitte & Touche LLP Sunita Suryanarayan Deloitte Advisory Principal Deloitte & Touche LLP Glenn Wilson Deloitte Advisory Manager Deloitte & Touche LLP This publication contains general information only and Deloitte is not, by means of this publication, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This publication is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor. Deloitte shall not be responsible for any loss sustained by any person who relies on this publication. As used in this document, Deloitte Advisory means Deloitte & Touche LLP, which provides audit and enterprise risk services; Deloitte Financial Advisory Services LLP, which provides forensic, dispute, and other consulting services; and its affiliate, Deloitte Transactions and Business Analytics LLP, which provides a wide range of advisory and analytics services. Deloitte Transactions and Business Analytics LLP is not a certified public accounting firm. These entities are separate subsidiaries of Deloitte LLP. Please see for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and regulations of public accounting. Copyright 2015 Deloitte Development LLC. All rights reserved. Member of Deloitte Touche Tohmatsu Limited
Consumer products analytics The three-minute guide
Consumer products analytics The three-minute guide Consumer products analytics The three-minute guide 1 Why it matters now Category captains are no longer enough. Retailers are looking for insight captains.
Big data The three-minute guide
Big data The three-minute guide Don t squint. Select the full-screen option to view at full size. Big Data The three-minute guide 1 2 What is big data? It s about insight Big data generally refers to datasets
Legal billing and predictive coding A fresh way to assess your legal spend
Legal billing and predictive coding A fresh way to assess your legal spend The legal technology industry didn t really come through with its promise of useful real-time analytics on a phase and activity
Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard
Information Systems Audit and Controls Association Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard February 4, 2014 Tom Haberman, Principal, Deloitte & Touche LLP Reema Singh,
Blind spot Banks are increasingly outsourcing more activities to third parties. But they can t outsource the risks.
Blind spot Banks are increasingly outsourcing more activities to third parties. But they can t outsource the risks. For anyone familiar with the banking industry, it comes as no surprise that banks are
Risk Considerations for Internal Audit
Risk Considerations for Internal Audit Cecile Galvez, Deloitte & Touche LLP Enterprise Risk Services Director Traci Mizoguchi, Deloitte & Touche LLP Enterprise Risk Services Senior Manager February 2013
Information Life Cycle Management (ILM)
Information Life Cycle Management (ILM) Finding business value in Information Life Cycle Management (ILM): Proactive information management through ILM can reduce cost and risk while creating tangible
Service Organization Control (SOC) Reports
Service Organization Control (SOC) Reports Transitioning from SAS 70 to SSAE 16 Deloitte & Touche LLP Agenda Overview SAS 70/SSAE 16 Historical Perspective The New Framework Under SSAE 16 (SOC 1) Impact
Key Cyber Risks at the ERP Level
Key Cyber Risks at the ERP Level Process & Industrial Products (P&IP) Sector December, 2014 Today s presenters Bhavin Barot, Sr. Manager Deloitte & Touche LLP Goran Ristovski, Manager Deloitte & Touche
M&A analytics The three-minute guide
M&A analytics The three-minute guide M&A analytics The three-minute guide 1 Why it matters now Smarter decisions An M&A deal can be one of the biggest decisions a company makes, so it pays to do it right.
Analytics for Shared Services The three-minute guide
Analytics for Shared Services The three-minute guide Don t squint. Select the full-screen option to view at full size. Analytics for Shared Services The three-minute guide 1 2 Why it matters now You may
www.pwc.com Third Party Risk Management 12 April 2012
www.pwc.com Third Party Risk Management 12 April 2012 Agenda 1. Introductions 2. Drivers of Increased Focus on Third Parties 3. Governance 4. Third Party Risks and Scope 5. Third Party Risk Profiling 6.
Claims Management Services Get help to analyze the problem and execute an effective remediation plan
Claims Management Services Get help to analyze the problem and execute an effective remediation plan Your Challenge From time to time, a business may face a significant claim (or group of related claims)
Advanced Analytics for Better Insights. Part of the Insurance series: Benefits of a New Policy Administration System: Why Going Live is Not Enough
Advanced Analytics for Better Insights Part of the Insurance series: Benefits of a New Policy Administration System: Why Going Live is Not Enough Abstract Insurance professionals agree that data is a key
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
Conducting due diligence and managing cybersecurity in medical technology investments
Conducting due diligence and managing cybersecurity in medical technology investments 2015 McDermott Will & Emery LLP. McDermott operates its practice through separate legal entities in each of the countries
Third Party Security: Are your vendors compromising the security of your Agency?
Third Party Security: Are your vendors compromising the security of your Agency? Wendy Nather, Texas Education Agency Michael Wyatt, Deloitte & Touche LLP TASSCC Annual Conference 3 August 2010 Agenda
Health insurance exchanges: Jump ball for health plans
Health insurance exchanges: Jump ball for health plans The advent of mandated government-sponsored health insurance exchanges is expected to create a marketplace disruption larger than that of Medicare
The digital grapevine Social media and the role of Internal Audit
The digital grapevine Social media and the role of Internal Audit Preface Organizations today are embracing new digital technologies to leapfrog or keep pace with growing competition in the marketplace.
Fraud Risk Management providing insight into fraud prevention, detection and response
Fraud Risk Management providing insight into fraud prevention, detection and response For private circulation only www.deloitte.com/in Fraud follows opportunity and attacks weakness. Know where you are
Deloitte 2010 lease administration benchmarking survey
Deloitte 2010 lease administration benchmarking survey As used in this document, Deloitte means Deloitte LLP and its subsidiaries. Please see www.deloitte.com/us/about for a detailed description of the
Emerging Trends in Fraud Analytics:
Global Risk Advisory Services Emerging Trends in Fraud Analytics: Accounting for Words Text Analytics is a promising new forensic technique for the investigator 4 th Annual Text Analytics Summit Vincent
Privacy by Design Setting a new standard for privacy certification
Privacy by Design Setting a new standard for privacy certification Privacy by Design is a framework based on proactively embedding privacy into the design and operation of IT systems, networked infrastructure,
Auto insurance telematics The three-minute guide
Auto insurance telematics The three-minute guide Auto insurance telematics The three-minute guide 1 Why it matters now Telematics is upending the auto insurance world After considerable industry buzz,
An Executive Overview of GAPP. Generally Accepted Privacy Principles
An Executive Overview of GAPP Generally Accepted Privacy Principles Current Environment One of today s key business imperatives is maintaining the privacy of your customers personal information. As business
ERP Administrative Challenges Brian Jensen
ERP Administrative Challenges Brian Jensen Deloitte & Touche LLP February 2011 ERP Administrative Challenges Enterprise resource planning (ERP) implementations over the last two decades have generated
State of Compliance 2014 Healthcare provider industry brief
Delve into the full analysis of the 2014 State of Compliance Survey at: pwc.com/us/ stateofcompliance State of Compliance 2014 Healthcare provider industry brief Introduction The healthcare provider industry
Stop Reacting to Buyers Price Expectations; Manage Them
Stop Reacting to Buyers Price Expectations; Manage Them BY THOMAS T. NAGLE AND JOSEPH ZALE Executive Takeways Pricing policies empower companies to manage customers price expectations, and avoid the cycle
Information retention and disposal guide. Date: 31 October 2014 Version: 2.0
Information retention and disposal guide Date: 31 October 2014 Version: 2.0 Contents 01. Guidelines The data challenge 5 Compliance what is it and why is it important? 6 The compliant data journey 7 Case
Managing data security and privacy risk of third-party vendors
Managing data security and privacy risk of third-party vendors The use of third-party vendors for key business functions is here to stay. Routine sharing of critical information assets, including protected
Escrow Accounting and Internal Controls
Escrow Accounting and Internal Controls Nicole Thomas Deloitte & Touche, LLP 2012 Ohio TIPS Seminar November 12, 2012 Agenda Deloitte at a glance Importance of internal controls Escrow/trust accounting
Sustainability Analytics The three-minute guide
Sustainability Analytics The three-minute guide Sustainability Analytics The three-minute guide 1 Why it matters now Sustainability isn t just good for your corporate image and conscience. It s good for
Optimizing government and insurance claims management with IBM Case Manager
Enterprise Content Management Optimizing government and insurance claims management with IBM Case Manager Apply advanced case management capabilities from IBM to help ensure successful outcomes Highlights
Cloud Security Trust Cisco to Protect Your Data
Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive
U.S. CFO Program The Four Faces of the CFO. 2010 Deloitte Touche Tohmatsu
U.S. CFO Program The Four Faces of the CFO 2010 Deloitte Touche Tohmatsu CFOs Play Four Critical Roles in Companies Catalyze behaviors across the organization to execute strategic and financial objectives
Internal audit analytics: The journey to 2020 Insights-driven auditing
Internal audit analytics: The journey to 2020 Insights-driven auditing By capitalizing on the wealth of data now available from your own business activities as well as external sources internal audit (IA)
The Changing IT Risk Landscape Understanding and managing existing and emerging risks
The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015
Branding the Workplace: Innovating the talent brand
Branding the Workplace: Innovating the talent brand Social media has erased whatever lines used to exist between the corporate brand and the talent brand. They re two sides of the same coin. In a knowledge-based
Politique de sécurité de l information Information Security Policy
Politique de sécurité de l information Information Security Policy Adoptée par le Conseil d administration Le 10 novembre 2011 Adopted by the Board of Directors on November 10, 2011 Table of contents FOREWORD
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
Great (sales) expectations. The growing gap between sales force expectations and the influence traditional sales compensation has on performance
Great (sales) expectations The growing gap between sales force expectations and the influence traditional sales compensation has on performance Charles Dickens Great Expectations took place during a period
Auto Insurance Telematics: Where the Data Meets the Road
Casualty Actuarial Society Annual Meeting: Auto Insurance Telematics: Where the Data Meets the Road John Lucker, Principal, Global Advanced Analytics & Modeling Market Leader, Deloitte Consulting LLP Sam
Corporate Resiliency Managing g the Growing Risk of Fraud and Corruption
Corporate Resiliency Managing g the Growing Risk of Fraud and Corruption Toby Bishop, Director, Deloitte Forensic Center Deloitte Financial Advisory Services LLP Contents Why corporate resiliency? What
www.pwc.com Being protected Using data analytics to detect fraud
www.pwc.com Being protected Using data analytics to detect fraud Are you currently exposed to fraudulent activities? It will surprise few to learn that occupational fraud, IP infringement, corruption,
CFO Insights How CFOs Can Own Analytics
CFO Insights How CFOs Can Own Analytics Much has been made about the unprecedented quantities of data companies collect these days, from their own operations, supply chains, production processes, and customer
Data analytics and workforce strategies New insights for performance improvement and tax efficiency
Data analytics and workforce strategies New insights for performance improvement and tax efficiency Leading organizations today are shaping effective workforce strategies through the use of data analytics.
The Changing SAS 70 Landscape Dan Hirstein Director Rebecca Goodpasture Senior Manager Deloitte & Touche LLP January 13, 2011
The Changing SAS 70 Landscape Dan Hirstein Director Rebecca Goodpasture Senior Manager Deloitte & Touche LLP January 13, 2011 Table of Contents A Short History of SAS 70 Overview of SSAE 16 and ISAE 3402
Mortgage series on management estimates
Background and accounting primer Mortgage series on management estimates 1 Deloitte Center for Financial Services U.S. Residential Mortgage Market Update, October 2012. Many of the most subjective and
Standing together for financial industry cyber resilience Quantum Dawn 3 after-action report. November 23, 2015
Standing together for financial industry cyber resilience Quantum Dawn 3 after-action report November 23, 2015 Table of contents Background Exercise objectives Quantum Dawn 3 (QD3) cyberattack scenario
Text Analytics The three-minute guide
Text Analytics The three-minute guide Text Analytics The three-minute guide 1 What is text analytics? Detecting hidden signals There s a good chance that your organization is awash in unstructured, text-rich
Evergreen Solutions Lowering the cost of EHR ownership
Evergreen Solutions Lowering the cost of EHR ownership As used in this document, Deloitte means Deloitte LLP and its subsidiaries. Please see www.deloitte.com/us/about for a detailed description of the
SEC WHISTLEBLOWER RULES UNDER DODD- FRANK. Presented by: Michael A. Saslaw September 12, 2013 Matthew J. Jacobs David R. Woodcock Barefoot Bankhead
SEC WHISTLEBLOWER RULES UNDER DODD- FRANK Presented by: Michael A. Saslaw September 12, 2013 Matthew J. Jacobs David R. Woodcock Barefoot Bankhead DODD-FRANK OVERVIEW Response to financial crisis of late-2000s.
From Information Management to Information Governance: The New Paradigm
From Information Management to Information Governance: The New Paradigm By: Laurie Fischer Overview The explosive growth of information presents management challenges to every organization today. Retaining
Managing social media risks to reputation risk A hot topic on the board agenda
Managing social media risks to reputation risk A hot topic on the board agenda Henry Ristuccia Global Governance, Regulatory & Risk Strategies leader Deloitte Touche Tohmatsu Limited Michael Rossen Director
Director, Value Engineering
Director, Value Engineering April 25 th, 2012 Copyright OpenText Corporation. All rights reserved. This publication represents proprietary, confidential information pertaining to OpenText product, software
Balance Sheet Integrity The Utopian Close: Creating a low risk, highly effective financial close
Balance Sheet Integrity The Utopian Close: Creating a low risk, highly effective financial close Balance Sheet Integrity: The Utopian Close creating a low risk, highly effective financial close 1 Executive
National Market System (NMS) plan
SEC Rule 613: Consolidated Audit Trail National Market System (NMS) plan Considerations for broker-dealers Contents What is SEC Rule 613? 3 Why was Rule 613 proposed? 3 What does CAT mean to broker-dealers?
FinCEN Issues Notice of Proposed Rulemaking that Would Extend AML Requirements to Registered Investment Advisers
FinCEN Issues Notice of Proposed Rulemaking that Would Extend AML Requirements to Registered Investment Advisers On August 25, 2015, the Financial Crimes Enforcement Network (FinCEN), a bureau of the US
How To Improve The Pharmaceutical Industry In Japanese
Pharmaceutical business innovation through utilization of EMR Abstract The pharmaceutical industry in Japan is in a transformation phase due to the government s tightening control over healthcare expenditure
Draft Internal Audit Report Software Licensing Audit. December 2009
Draft Internal Audit Report Software Licensing Audit December 2009 Contents Page Executive Summary 3 Observations and Recommendations 6 Appendix 1 Audit Framework 9 Appendix 2 - Staff Interviewed 10 Statement
Integrating GRC with Performance Management Demands Enterprise Solutions
As published in the April n May n June 2008 issue of Integrating GRC with Performance Demands Enterprise Solutions by Lee Dittmar, Principal, Deloitte Consulting LLP and Peter Vogel, Senior Manager, Deloitte
CCH INCORPORATED, A WOLTERSKLUWER COMPANY ACCESS AGREEMENT FOR THE
CCH INCORPORATED, A WOLTERSKLUWER COMPANY ACCESS AGREEMENT FOR THE Accounting Research Manager INFORMATION DATABASE PROVIDED THROUGH Mayer Hoffman McCann P.C. ("AGREEMENT" OR "ACCESS AGREEMENT") IN THIS
Assessing the Adequacy and Effectiveness of a Fund s Compliance Policies and Procedures. December 2005
Assessing the Adequacy and Effectiveness of a Fund s Compliance Policies and Procedures December 2005 Copyright 2005 Investment Company Institute. All rights reserved. Information may be abridged and therefore
Deloitte s Preconfigured SAP on HANA Service offering for Life Sciences
Deloitte s Preconfigured SAP on HANA Service offering for Life Sciences Are you clear on the benefits of implementing SAP but afraid of taking a proposal to your management team? Are you worried about
Cybersecurity and the AICPA Cybersecurity Attestation Project
Cybersecurity and the AICPA Cybersecurity Attestation Project Chris Halterman Executive Director EY Chair AICPA Trust Information Integrity Task Force 2 October 2015 Increasing awareness of cybersecurity
Essentials to Building a Winning Business Case for Tax Technology
Essentials to Building a Winning Business Case for Tax Technology The complexity of the tax function continues to evolve beyond manual and time-consuming processes. Technology has been essential in managing
When should becomes shall
Deloitte Center for Regulatory Strategies When should becomes shall Rethinking compliance management for banks Contents Introduction 3 Find your baseline: Strategic self-assessment 4 Make the map: Strategic
!!!!! White Paper. Understanding The Role of Data Governance To Support A Self-Service Environment. Sponsored by
White Paper Understanding The Role of Data Governance To Support A Self-Service Environment Sponsored by Sponsored by MicroStrategy Incorporated Founded in 1989, MicroStrategy (Nasdaq: MSTR) is a leading
Fifth annual survey. Look before you leap Navigating risks in emerging markets
Fifth annual survey Look before you leap Navigating risks in emerging markets Table of contents 1 Executive summary 3 Significant concerns over compliance and integrity-related risks 4 Bribery leads the
The Rising Tide of Pharmacy Benefit Cost and Complexity: A health plans roadmap to optimizing pharmacy services relationships
The Rising Tide of Pharmacy Benefit Cost and Complexity: A health plans roadmap to optimizing pharmacy services relationships New pharmacy benefit challenges After several years of manageable pharmacy
Do you know your privacy risks? How new technologies, changing business models, and emerging regulations are changing the data-protection landscape
January 2013 Do you know your privacy risks? How new technologies, changing business models, and emerging regulations are changing the data-protection landscape At a glance Threats to data security both
Culture of purpose: A business imperative 2013 core beliefs & culture survey
Culture of purpose: A business imperative 2013 core beliefs & culture survey Executive summary What companies do for clients, people, communities and society are all interconnected. A culture of purpose
Importance of the Consumer Financial Protection Bureau
Importance of the Consumer Financial Protection Bureau The aftermath of the financial crisis affected millions of Americans. The U.S. economy was devastated as companies crumbled, homeowners lost their
Pulling it all together: Integrated Solutions for Governance, Risk and Compliance
Customer Practice Profile Pulling it all together: Integrated Solutions for Governance, Risk and Compliance The business case for a new enterprise approach to GRC Integrated solutions for Governance, Risk
Strategies for optimizing your inventory management
Part of the Deloitte working capital series Make your working capital work for you Strategies for optimizing your inventory management The Deloitte working capital series Strategies for optimizing your
Pricing Analytics The three-minute guide
Pricing Analytics The three-minute guide Pricing Analytics The three-minute guide 1 What is pricing analytics? Where it all comes together Advanced analytics aimed at customer and business outcomes are
Code of Conduct for Credit Rating Agencies
Code of Conduct for Credit Rating Agencies 1 TABLE OF CONTENTS Preamble 1 Interpretation 2 Section A: Quality and Integrity of the Rating Process 4 Quality of the Rating Process 4 Monitoring and Updating
Extending Security Analytics to support Operational Efficiency. John A. Greco Deloitte & Touche LLP Cyber Risk Services
Extending Security Analytics to support Operational Efficiency John A. Greco Deloitte & Touche LLP Cyber Risk Services Extending security analytics to support operational efficiency Key components of the
Sarbanes-Oxley Section 404: Compliance Challenges for Foreign Private Issuers
Sarbanes-Oxley Section 404: Compliance s for Foreign Private Issuers Table of Contents Requirements of the Act.............................................................. 1 Accelerated Filer s...........................................................
For Private circulation only www.deloitte.com/in. Creative. Clear. Focused. Forensic Services
For Private circulation only www.deloitte.com/in Creative. Clear. Focused. Forensic Services Do you conduct background checks on employees and vendors? Do you educate employees about the importance of
Lease accounting survey Preparing for implementation
Lease accounting survey Preparing for implementation Executive summary The new lease accounting standard proposed by the Financial Accounting Standards Board (FASB) fundamentally changes the rules that
