No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe
No Result
View All Result
Corporate Compliance Insights
Home Risk

Using an Effective Policy Structure to Establish Risk Accountability

by Jim DeLoach
March 11, 2016
in Risk
Policy is critical in defining risk accountability

Once management and the Board understand the enterprise’s most significant strategic, operational, financial and compliance risk exposures embedded in the business and have a process in place for refreshing this assessment as markets and operating conditions change, management must address – with the Board’s input – which of those risks should be rejected or retained.

Steps to Avoid the Risk

These decisions have risk policy implications. If the decision is to reject a risk exposure because it’s off-strategy, it offers unattractive rewards, it’s simply the right thing to do (compliance and threats to public safety, for example) or it’s too risky and the organization doesn’t have the capability to manage it, then management must take the appropriate steps to avoid the risk:

  • If the risk is strategic in nature – Steps to avoid the risk might include adopting an exit strategy to get out of a market, business or geographic area, targeting more specifically the entity’s business development and market expansion activities to avoid pursuit of “off-strategy” opportunities or screening alternative capital projects and investments to avoid low-return, off-strategy and unacceptably high-risk initiatives.
  • If the risk is operational in nature – Steps to avoid the risk typically include eliminating the risk at the source by, for example, re-engineering a flawed process or by designing and implementing internal preventive processes to eliminate product defects at the point they originate.
  • If the risk is financial in nature – Examples of risk avoidance would include unwinding a derivatives or securities position or prohibiting or stopping completely the trading activities giving rise to the risk in question.
  • For compliance risks – Examples include decisions to avoid doing business in certain geographies or with certain customers resulting in prohibitive policies, enhanced monitoring processes and training.

Risk Responses

If an entity retains a large risk exposure – that is, it chooses not to avoid it – several risk responses are available.  The enterprise can:

  • Accept the risk at its present level – This choice is one management should not make without consulting the Board and potentially disclosing to shareholders. For example, some global oil companies make no secret that they are taking a risk on oil and natural gas prices and, in effect, are passing the risk on to their shareholders. In some instances, the organization may use a captive to fund or self-insure the risk.
  • Reduce the severity of the risk and/or its likelihood of occurrence – For instance, control activities (policy and procedures) reduce the severity of impact of a risk event through effective detection and correction controls and response plans. Control activities also can reduce the likelihood of occurrence of a risk event. Geographic dispersion of assets reduces the impact of the occurrence of a single catastrophic event, such as an earthquake or a hurricane, on the company.
  • Share the risk with a financially capable, independent party – Risk-transfer strategies include hedging, insurance and joint ventures.

Whether a decision is made to reject or retain a risk, it is important to designate someone, or a group, function or unit, with the responsibility, authority and accountability to “own” the risk response. Top-down reject/retain decisions drive the need for formulating focused risk responses that are integrated within the enterprise’s strategy and business plan. This integration process drives transparency across the organization as to the risk exposure, how it is managed and who is accountable.

To that end, the lines-of-defense model stipulates that each operating unit owns the risks and risk responses integral to its respective business activities. To be effective as “risk owners,” the accountable parties, at a minimum, must be responsible for (1) deciding on the tactics around executing the selected risk response, (2) designing (or being responsible for the design of) the capabilities for managing the risk in accordance with the risk response and (3) monitoring these capabilities over time to ensure they perform as intended.

An Effective Policy Structure

Risk ownership is clarified when a policy is written to articulate what people must and cannot do. The actual format and details of the risk policy will vary from one company to the next and depend on the nature of the underlying risks. That said, an effective policy structure often addresses the following:

  • Objectives of managing and monitoring risk;
  • Roles and responsibilities of operating units and lines of business in managing risk and delineation of responsibilities of risk owners, risk oversight personnel and independent risk and compliance functions;
  • Overall enterprise risk appetite assertions linked to established business objectives (e.g., if management’s goals are to earn $6.75 per share and retire $850 million in debt during the coming year, how much exposure to earnings and cash flow variability can the business withstand?);
  • Boundary controls and specific limit structures that management has put in place for authorized, potentially risky opportunity pursuits to create enterprise value to specify the company’s “risk tolerance” so it can be deployed at an operational level (i.e., how much risk is the enterprise willing to accept?);
  • Authorities empowering specific individuals to commit enterprise resources in conjunction with managing volatile and high-risk activities, and to execute specific risk responses;
  • Minimum risk controls (e.g., separation of duties, access limitations, etc.) that need to be in place in specific circumstances; and
  • Required risk reporting and the approved methodologies for measuring and valuing risk, including marking-to-market portfolios of financial instruments and commodities.

The policy structure is more effective if it addresses the largest risk exposures that must be managed on a day-to-day basis and defines explicitly the primary risk responses that management has chosen to address those exposures. For example, it might address strategies for managing different exposures, including acceptable or preferred risk management techniques and prescribed tools and practices. If necessary, it might also point out risk response strategies, tools, products and practices that are specifically disallowed.

While the specificity of the enterprise’s policy enables effective accountability, it is only a start. After approving a policy statement, management must ensure, with Board oversight, that established policies are addressed through effectively designed procedures and that implementation of the procedures is monitored and enforced. From an accountability standpoint, the best control procedures and risk information will be worthless if traders, managers, operators and others think they can be ignored. Management must make it clear to everyone that violation of established policies and limits will be subject to disciplinary action and, depending on severity, possible termination. When violations occur, they must not be tolerated. Lessons learned must be shared.

When policy structures dictate behavioral and performance expectations, it is important that the reward system be aligned with those expectations. For instance, compensation for so-called “star performers” should be evaluated carefully to determine whether they incentivize risk taking that is not in the best interests of the organization. Neither senior management nor the Board should want a cavalier and confrontational management style or a “warrior culture” in which operating unit managers or individual employees tend to focus on short-term compensation and, thus, do not think enough – or at all – about the risks their activities may create for the enterprise.

Therefore, executive management must ensure the appropriate incentives and controls are in place to focus responsible individuals on the critical enterprise risks and acceptable – and unacceptable – business behavior. To that end, managers and Boards of Directors should recognize the consequences of too much emphasis on short-term incentives and the benefits of risk-adjusted compensation structures.

When the organization’s policy structure sets clear accountabilities for risk and the compensation system reinforces those accountabilities, there is a positive impact on the organization’s risk awareness and culture. Effectively articulated risk accountabilities lay the groundwork for balancing the entrepreneurial, revenue-generation side of the business and the control, risk oversight side of the business, so that neither one is too disproportionately strong relative to the other. This balance is elusive, which is why a strong foundation of clear accountabilities is vital to any organization.


Previous Post

The Magic Fish

Next Post

Proxy Access Shareholder Proposals: SEC Issues No-Action Responses

Jim DeLoach

Jim DeLoach

Jim DeLoach, a founding Protiviti managing director, has over 35 years of experience in advising boards and C-suite executives on a variety of matters, including the evaluation of responses to government mandates, shareholder demands and changing markets in a cost-effective and sustainable manner. He assists companies in integrating risk and risk management with strategy setting and performance management. Jim has been appointed to the NACD Directorship 100 list from 2012 to 2018.

Related Posts

Fox_DOJ Speeches_f

Analysis of Recent DOJ Statements

by Corporate Compliance Insights
March 23, 2023

DOJ leaders provide insight into agency's plans. Analysis of Recent Statements DOJ Shaping the Future of Corporate Criminal Enforcement What’s...

Fox_2023 ECCP Update_f

2023 Evaluation of Corporate Compliance Programs

by Corporate Compliance Insights
March 23, 2023

Keeping up with 2023 changes to DOJ guidelines. Additions, Deletions & Changes From 2020 2023 Evaluation of Corporate Compliance Programs...

encompass update

Encompass Launches pKYC Maturity Model

by Corporate Compliance Insights
March 22, 2023

KYC automation platform Encompass has unveiled a new perpetual Know Your Customer (pKYC) maturity model designed to help banks improve...

consilio onna partnership

Consilio, Onna Seek to Streamline eDiscovery for Cloud Apps

by Corporate Compliance Insights
March 22, 2023

Legal technology provider Consilio has launched a new platform, Sightline Collect, powered by data management supplier Onna. The platform is...

Next Post
Is your organization considering the benefits of proxy access?

Proxy Access Shareholder Proposals: SEC Issues No-Action Responses

Compliance Job Interview Q&A

Jump to a Topic

AML Anti-Bribery Anti-Corruption Artificial Intelligence (AI) Automation Banking Board of Directors Board Risk Oversight Business Continuity Planning California Consumer Privacy Act (CCPA) Code of Conduct Communications Management Corporate Culture COVID-19 Cryptocurrency Culture of Ethics Cybercrime Cyber Risk Data Analytics Data Breach Data Governance DOJ Download Due Diligence Enterprise Risk Management (ERM) ESG FCPA Enforcement Actions Financial Crime Financial Crimes Enforcement Network (FinCEN) GDPR HIPAA Know Your Customer (KYC) Machine Learning Monitoring RegTech Reputation Risk Risk Assessment SEC Social Media Risk Supply Chain Technology Third Party Risk Management Tone at the Top Training Whistleblowing
No Result
View All Result

Privacy Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2022 Corporate Compliance Insights

No Result
View All Result
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe

© 2022 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT