Third Party Risk

Course Description

This course guides you through the four steps associated with  handling  third  party  risk:  scoping,  risk  assessment,  due diligence and approval/post-approval risk mitigation.The  lessons covers  major  international  anti-corruption  laws,   including   the   US   Foreign   Corrupt   Practice   Act   (FCPA) and the UK Bribery Act. Jargon is kept to a minimum. Where possible, stories are used to paint a vivid picture.

Who is this training for?

Employees at all levels need to recognise the risks associated with third parties and how to identify them. This course guides staff through the four steps associated with handling third party risk.Management are trained to identify, minimise and handle corruption risks. General employees learn the role they play in ensuring that due diligence occurs.

Course Outline

Module 1 : Introducing Third Party Risk

   •The role of third party due diligence in your organisation’s ABC obligations

   •Scope of due diligence

   •Key corruption risk factors

   •Organisational benchmarks regarding third party risks

   •Assessing corruption risk as high, medium or low

Module 2 : Due Diligence and Approvals

   •The data collection process

   • Key aspects of third parties to research

   •Validating research• Monitoring third parties post-approvals

   •Supporting due diligence and anti-corruption processes

Module 3 : Due Diligence for Employees

   •The role of third party due diligence in your organisation’s ABC obligations

   •Key corruption risk factors

   •The due diligence process

   •Monitoring third parties post-approvals

   •The function of whistle-blower policies

Sanctions Compliance Training

Course Description

This course will help you understand what economic sanctions are, how they work and how they impact international business and the financial services sector in particular.

Sanctions are volatile and often there is little or no advance warning.

This training is indispensable for enhancing your general knowledge of the purpose and nature of sanctions regimes, explaining what they are used for and how they can affect lives and businesses.

As economic sanctions continue to feature in the news headlines, this course provides practical insights into managing sanctions compliance and engaging with clients, mapping out what you should know, what you should do and what you should have in place to be compliant.

Who should do this training?

This course is especially relevant to account directors, business development managers, operations specialists, risk management analysts, compliance officers, customer due diligence analysts and senior executives.

Download course outline here

Specialized Financial Economic Crime Training

GRC Solutions is thrilled to collaborate with leading financial crime advisory firm, i-KYC, pairing their premium content library with our award-winning Salt Learning technologies to improve your approach to addressing Financial Economic Crime (FEC).

Download our brochure here

Course Outline

Module 1: Describe what sanctions are, their purpose, key features and reach

Module 2: Identify which sanctions regimes are the most important and how they can impact businesses

Module 3: Outline key sanctions do’s and don’ts

Module 4: Respond to client queries about sanctions

Risk and Control Self-Assessment (RCSA)

Course Description

Risk and control self-assessment (RCSA) involves identifying, recording and assessing the risks that

an organisation may encounter, as well as the controls in place to contain them. It covers several steps, from identifying the risks to which an organisation or business may be exposed to escalating and taking follow-up action and identifying ongoing issues that affect risks. This course explains what an RCSA is and how to construct, use and report on it

Who is this training for?

You should complete this course if you are involved in a compliance or risk management function in your workplace

Course Outline

Module 1 : Defining Risk and Control Self-Assessment (RCSA)

   • Objectives of RCSA

    • Components used in an RCSA

    • How the RCSA fits into the risk management framework

Module 2 : RCSA Inputs – Risks, Control, Scales

    • Identifying and recording risks in a register

    • What are risk controls?

    • Recording controls and building a control library

    • Developing control effectiveness scales

Module 3 : RCSA Processes

   • Assessing risks

   • Assessing the effectiveness of risk controls

   • Approaches to self-assessing risk levels

Module 4 : RCSA Outputs – Reporting and Follow-up Process

   • Reporting risks

   • Notifying and escalating report information

   • Using reports and taking action

Proliferation Financing Awareness Training

Course Description

Stakeholders in the financial sector need to understand Proliferation Financing and its consequences

The proliferation of weapons of mass destruction (WMD), including their means of delivery, is a significant threat to global security. Proliferation and its financing are quickly evolving as threat actors find innovative ways of disguising the funding using complex web structures.

This single-module course introduces staff to the concept of Proliferation Financing (PF) and then develops their understanding of how PF works, how it is developing, and the threat it poses to the world. It makes clear how PF differs from money laundering, and how financial services businesses in all countries can be exposed to the risk of having their systems misused to facilitate PF. It contains details on the problems posed by dual use goods.

The lesson provides practical tips and examples to assist in identifying transactions that should be subjected to closer examination. These practical examples empower employees to act in line with their legal and ethical obligations.

Who should do this training?

This course is suitable for customer-facing staff, their managers, and other operational staff who deal with financial transactions.

Download the course outline here

Specialized Financial Economic Crime Training

GRC Solutions is thrilled to collaborate with leading financial crime advisory firm, i-KYC, pairing their premium content library with our award-winning Salt Learning technologies to improve your approach to addressing Financial Economic Crime (FEC).

Course Outline

  • What is Proliferation Financing?
  • Why is the prevention and detection of Proliferation Financing important?
  • What is the Proliferation Financing process?
  • What are the high risk countries for Proliferation Financing?
  • Red flags

Privacy Compliance Training Course

Course Description

Training on privacy and recognising and dealing with information security risks and threats and the importance of a privacy policy

Product Description

Privacy breaches make headlines all the time. But while everyone thinks they know what privacy is, understanding the importance of a privacy policy and how the laws apply to our work, clients and customers is another matter

Who is this training for?

This training is designed for staff at any level within an organisation that comes in contact with private information or could be at risk of breaching privacy laws, or who need to understand the importance of a privacy policy.

Course Outline

Module 1 : Introducing privacy

    •What is personal information?

    •Types of information collected

    •How to manage personal information

    •Information use and information disclosure

    •How to store, access and correct information

Module 2 : Management and collection

    •The importance of a privacy policy

    •Assessing individuals’ right to deal with entities anonymously or pseudonymously

    •Collecting solicited personal and sensitive information

    •Dealing with unsolicited personal information

    •Notifying individuals

Module 3 : Use and disclosure

    •Primary and secondary purposes of data collection

    •When you cannot perform direct marketing

    •Requirements under other laws, codes or practice and standards

    •Ensuring compliance with privacy law by overseas recipients

    •Adopting, using or disclosing government-related identifiers

Module 4 : Storage,access and correction

    •Quality of personal information requirements

    •Data breaches

    •De-identifying or destroying personal data

    •Dealing with requests for access to personal information

    •Correcting personal information

Modern Slavery – non-jurisdictional

Course Description

Modern slavery can affect any country; the United Nations estimates there are more than 40 million victims of modern slavery worldwide. Modern slavery can occur in any sector or industry, and at any point in a supply chain. High-risk industries include fashion, agriculture, hospitality, construction, electronics and extractives. The risk of modern slavery occurring in supply chains increases for organisations that have extensive, complex or global supply chains.

This three-module course covers what modern slavery is, its prevalence in supply chains, and how its use can most effectively be prevented by organisations. Both modules contain practical scenarios relating to issues affecting organisations with modern slavery in their supply chains. These scenarios equip staff to identify and take steps to prevent modern slavery from occurring in their supply chains.

Who is this training for?

This training is suitable for a wide variety of staff including those working in procurement, compliance or risk roles as well as those working in a front-line capacity.

Course Outline

  • Module 1: Introduction to the prevention of modern slavery
  • Module 2: Preventing the use of modern slavery in supply chain

Modern Slavery Awareness

Course Description

Are your staff equipped to identify and appropriately respond to modern slavery risks?

Do you need short, effective training to raise staff awareness of the indicators of modern slavery and how they should respond?

Modern slavery can affect any country: the United Nations estimates there are more than 40 million victims of modern slavery worldwide. It can occur in any sector or industry, and at any point in a supply chain. High-risk industries include fashion, agriculture, hospitality, construction, electronics and extractives. The risk of modern slavery occurring in supply chains increases for organisations that have extensive, complex or global supply chains. Your staff – including your front line and non-specialist staff – must be aware of the risks of modern slavery, and the ensuing consequences your business could face if they’re left unchecked.

Modern Slavery – Awareness is a single-module, awareness course that equips your staff with an understanding of:

  • The definition of Modern Slavery
  • How to explain the occurrence of modern slavery in supply chains
  • What can be done to combat and prevent the existence of modern slavery

Who is this training for?

This training is an express, 10 minute variant of our three-module Modern Slavery – Australia and non-jurisdictional courses. It is designed to equip your front line staff with general awareness surrounding modern slavery.

It is also suitable for volunteers, contractors and students.

Course Outline

  • Module 1: Modern Slavery Awareness

Cybersecurity

Course Description

Everyone has a role to play in maintaining cybersecurity and addressing information security issues and challenges

Preventing Data Breaches

Everyone in the workplace has a role to play in responding to information security issues and challenges. The first step in reducing the risk of data breaches is to learn what they are and be aware of how they typically occur, so that appropriate measures can be taken to prevent them from taking place in the future.

This course surveys the most common information security issues and challenges, including direct observation, malware viruses, phishing, identity theft, spam and credit card skimming. It explores how mobile devices such as laptops and phones are vulnerable to theft. It also considers the Cybersecurity risks associated with working remotely, as well as the personal and professional issues associated with online activities such as using social media or storing information in the cloud. Each topic is explored in plain English, followed by a clear explanation of simple strategies for data protection.

Who is this training for?

This course is suitable for everyone responsible for handling information in the workplace, whether they are at work, at home or offsite.

Course Outline

  • Module 1: Introduction
  • Module 2: Protecting Work Information
  • Module 3: Data security while working from home, in the office, and offsite

Ethical Decison Making

Course Description

“Every choice, every decision we make helps to shape the world, for good or for ill.”
Dr Simon Longstaff, St James Ethics Centre

Good decision making in action

Developed in conjunction with the St James Ethics Centre, the Business Ethics course gives employees an understanding of how ethics apply to the workplace and how they can contribute to a more pleasant and productive working environment. The course is delivered in a practical way – meaning it relates ethical considerations to day-to-day organisational roles. Students learn about processes and principles, and how they apply to a wide variety of workplace situations and scenarios; helping them develop their own process for good decision making and action.

Who should do this training?

This course is suitable for anyone who has contact with other people during the course of their everyday job – whether it is colleagues, clients, suppliers, staff, managers, etc. As with all Salt courses, the training is designed to cater for a diverse audience and all levels of staff; from mailroom staff right up to senior executives. Some of the modules – for example, “Ethics and good decision making” – explain the basics of ethics while other modules cater for those who need to have a deeper understanding on an organisational level such as managers.

Course Outline

  • Module 1: Ethics and good decision making
  • Module 2: Workplace relationships
  • Module 3: Business relationships
  • Module 4: Ethical dealings with your organisations
  • Module 5: An ethical organisation (for managers)

Diversity and Equality

Course Description

“The costs of bullying, discrimination and sexual harassment affect us all.”

What is bullying and what should you do if you see it occur in the workplace? Where does flirting stop and harassment begin? Every member of your organisation needs to be aware of these types of issues because the consequences of unacceptable behaviour, left unmanaged, can be severe.

Bullying, discrimination and sexual harassment can cause major harm to the wellbeing of individuals. They can also incur heavy costs for organisations, including reputational damage, compensation orders and the costs of replacing staff who can no longer work in hostile environments.

This course explores the issues within the framework of Work Health and Safety (WHS) laws and anti-discrimination laws, as well as strategies and avenues of support available to those who experience bullying, discrimination or harassment within the workplace.

Specific modules address the key concepts from the perspective of supervisors, team leaders and managers, and outline the appropriate steps for dealing with complaints. Finally, the course examines how all employees should use workplace resources ethically.

Who is this training for?

Diversity and Equality teaches employees to understand what bullying, discrimination and sexual harassment look like in the workplace, and to recognise the fine line between acceptable and unacceptable behaviour. Management also receives invaluable training in dealing with potential problems.

Course Outline

  • Module 1: Workplace bullying
  • Module 2: Discrimination and sexual harassment
  • Module 3: (Advanced) Bullying, discrimination and sexual harassment
  • Module 4: (Advanced) Dealing with incidents and complaints
  • Module 5: Ethical use of resources