LearnXLive! 2022 Best Compliance Training Project with Unity Bank
We won this award for our wholistic approach to supporting our client in meet transformational challenge in a very tight time frame
We won this award for our wholistic approach to supporting our client in meet transformational challenge in a very tight time frame
This course will help you understand what economic sanctions are, how they work and how they impact international business and the financial services sector in particular.
Sanctions are volatile and often there is little or no advance warning.
This training is indispensable for enhancing your general knowledge of the purpose and nature of sanctions regimes, explaining what they are used for and how they can affect lives and businesses.
As economic sanctions continue to feature in the news headlines, this course provides practical insights into managing sanctions compliance and engaging with clients, mapping out what you should know, what you should do and what you should have in place to be compliant.
This course is especially relevant to account directors, business development managers, operations specialists, risk management analysts, compliance officers, customer due diligence analysts and senior executives.
Download course outline here
GRC Solutions is thrilled to collaborate with leading financial crime advisory firm, i-KYC, pairing their premium content library with our award-winning Salt Learning technologies to improve your approach to addressing Financial Economic Crime (FEC).
Download our brochure here
Module 1: Describe what sanctions are, their purpose, key features and reach
Module 2: Identify which sanctions regimes are the most important and how they can impact businesses
Module 3: Outline key sanctions do’s and don’ts
Module 4: Respond to client queries about sanctions
We won this award for our work with BlueBet to roll out its AML polices and obligations to its rapidly growing workforce in Australia and the US catering to different jurisdictions, job roles and language levels
Risk and control self-assessment (RCSA) involves identifying, recording and assessing the risks that
an organisation may encounter, as well as the controls in place to contain them. It covers several steps, from identifying the risks to which an organisation or business may be exposed to escalating and taking follow-up action and identifying ongoing issues that affect risks. This course explains what an RCSA is and how to construct, use and report on it
You should complete this course if you are involved in a compliance or risk management function in your workplace
Module 1 : Defining Risk and Control Self-Assessment (RCSA)
• Objectives of RCSA
• Components used in an RCSA
• How the RCSA fits into the risk management framework
Module 2 : RCSA Inputs – Risks, Control, Scales
• Identifying and recording risks in a register
• What are risk controls?
• Recording controls and building a control library
• Developing control effectiveness scales
Module 3 : RCSA Processes
• Assessing risks
• Assessing the effectiveness of risk controls
• Approaches to self-assessing risk levels
Module 4 : RCSA Outputs – Reporting and Follow-up Process
• Reporting risks
• Notifying and escalating report information
• Using reports and taking action
A Christmas season message from our CEO, Julian Fenwick: what to look forward to in 2021
The challenge of measuring the impact of your company value chain or portfolio upon biodiversity
Stakeholders in the financial sector need to understand Proliferation Financing and its consequences
The proliferation of weapons of mass destruction (WMD), including their means of delivery, is a significant threat to global security. Proliferation and its financing are quickly evolving as threat actors find innovative ways of disguising the funding using complex web structures.
This single-module course introduces staff to the concept of Proliferation Financing (PF) and then develops their understanding of how PF works, how it is developing, and the threat it poses to the world. It makes clear how PF differs from money laundering, and how financial services businesses in all countries can be exposed to the risk of having their systems misused to facilitate PF. It contains details on the problems posed by dual use goods.
The lesson provides practical tips and examples to assist in identifying transactions that should be subjected to closer examination. These practical examples empower employees to act in line with their legal and ethical obligations.
This course is suitable for customer-facing staff, their managers, and other operational staff who deal with financial transactions.
Download the course outline here
GRC Solutions is thrilled to collaborate with leading financial crime advisory firm, i-KYC, pairing their premium content library with our award-winning Salt Learning technologies to improve your approach to addressing Financial Economic Crime (FEC).
We won this award for our great team of compliance experts, legal specialists, and highly qualified eLearning designers
Your employees are a diverse group, both linguistically and culturally.
This course provides training on dealing with personal information under the latest New Zealand Privacy law
Privacy is one of the biggest issues a business faces; it affects them when dealing with customers, suppliers and staff. Businesses need to ensure their staff understand what is required of them when dealing with individuals’ personal information. To ensure there are no flaws in your system, it is imperative that each and every employee understands what they can and cannot do with personal information.
In this course you and your Staff will learn all about the Information Privacy Principles. Learn what personal information is and how and when to handle, collect, retain and disclose it. Find out how to prevent a privacy or data breach from occurring and how to manage the incident if an event occurs.
Even if your business has no physical presence in New Zealand, the local privacy laws may still apply. Find out the process and regulations for managing crossborder data flows.
Scenario: Meredith is a sales representative at BargaiNZ, a national department store chain.
A customer, Roberta, has bought a stereo. Meredith offers to register Roberta’s details for the stereo warranty with the store, in case Roberta loses her receipt. Roberta seems reluctant.
Roberta: “I just think the fewer people who have my information, the better. If I give my details to an entity and they misuse it, or it gets stolen, there’s nothing I can do about it personally. Then my info is just out there and there’s nothing I can do.”
If Roberta did give BargaiNZ her details and BargaiNZ breached privacy law with them, what could Roberta do?
The training is suitable for staff at any level of an organisation that collects, holds or uses personal information and does business in New Zealand.
It is designed to cater for a diverse audience and all levels of staff, addressing the legal content in plain language.
Privacy – Covering the Privacy Act and the Australian Privacy Principles
Privacy for Schools – Covering the Privacy Act and the Australian Privacy Principles as they apply to schools
Health Privacy – Health businesses collect and maintain sensitive personal information
Financial Services Privacy Training – covering the Privacy Act and the Australian Privacy Principles
Credit Reporting – covering the Credit Reporting Act
Health Privacy
General Data Protection Regulation – covering the GDPR – which has global implications
Data Protection Singapore – covering the Personal Data Protection Act 2012 and also the implications of the GDPR
Data Protection Malaysia – covering the Personal Data Protection Act 2010 and also the implications of the GDPR
California Consumer Privacy Act
Module 1: Introducing privacy
· What is personal information?
· Describe the scope of privacy law in relation to New Zealand
· Collection, storage access and correction of personal information
· Obligations in relation to the use and disclosure of personal information
· What to do when a data breach occurs and what penalties can be imposed for breaches of privacy law
Module 2: Collection
· Identify when you can collect personal information
· What sources you can use for personal information
· Requirements for notifying individuals of collection
· Exceptions to notification of collection
· Describe the manner in which you can collect personal information
Module 3: Storage, access and correction
· Explain the importance of keeping personal information secure in your role
· Identify ways to protect and control access to personal information
· How to handle requests for access to personal information
· When you can refuse to grant individuals access to their personal information
· Why and when agencies should correct personal information they hold
Module 4: Use and disclosure
· Describe how to ensure personal information is accurate
· Determine whether you should retain or dispose of personal information
· Identify the limits on use and disclosure of personal information
· In what situations you can use or disclose personal information for direct marketing
· The prohibition on the assignment or use of unique identifiers
Module 5: Credit reporting
· Identify the entities involved in credit reporting
· The principles governing the management and collection of credit information
· Circumstances in which credit reporters are permitted to use or disclose credit information
· Your obligations relating to storing credit information, giving individuals access to personal information and making corrections
· Outline the procedure for dealing with complaints
Give us a call or complete the form and we’ll be in touch soon
"*" indicates required fields
Level 14-01,
1 Wallich Street, Guoco Tower
Singapore 078881
+65 6403 3830
Level 14, 201 Kent Street
Sydney NSW 2000 Australia
+61 2 8823 4100
+61 2 8823 4104
Better (US) Inc
101 S. Reid St Suite 307 PMB# 1274
Sioux Falls, SD 57103.