fsa data security compliance

8
Ben oguntala, LLB, LLM 2011 Case study: FSA Data Security FSA Data security case study describes the various processes and procedures adapted by www.riesgoriskmanagement.com to achieve FSA Data Security compliance. For more information, please contact [email protected] www.riesgoriskmanagement.com Westminster, London 07812 039 867

Upload: ben-omoakin-oguntala-developingafricadotnet

Post on 22-Jan-2015

709 views

Category:

Documents


2 download

DESCRIPTION

FSA Data Security compliance case study show cases the key FSA requirements and how www.riesgoriskmanagement.com can assist clients to accomplish the tasks in a sustainable manner.

TRANSCRIPT

  • 1. Ben oguntala, LLB, LLMCase study: FSA Data Security 2011FSA Data security case study describes the various processes andprocedures adapted by www.riesgoriskmanagement.com to achieveFSA Data Security compliance. For more information, please contactBen.oguntala@riesgoriskmanagement.comwww.riesgoriskmanagement.comWestminster, London07812 039 867

2. INTRODUCTIONFSA has 8 key requirements under its Data Security framework, each of the 8 key requirements areauditable and require demonstrating operational compliance.www.riesgoriskmanagement.com FSA compliance solution is a web based solution designed toaddress the key 8 requirements with a view to ensuring they are integrated into the customersoperation there by ensuring inherent compliance.The framework is a centralised platform that consolidates the end to end resources required tocomplete the audit assessment. It captures data and reports on the level of compliance providingthe management with first instance of knowledge on non compliance. 3. FSA DATA SECURITYThe FSA Data Security framework covers the key areas where evidence need to exist of policiesmapped to procedures as well as processes.Our solution lists all the relevant the policies and tracks how contemporary they as well as mapsthem to procedures and operational processes that give effect to the policies in the day to dayoperations. 4. GOVERNANCEFor effective governance to exist, there must be an :1. ISMS forum with active members2. ISMS meeting dates3. An agenda for the ISMS forum4. A record of the minutes of the ISMS forum5. A documentation of the meetingISMS FORUMThe tool handles the following: ISMS Members ISMS Meeting dates ISMS Agendas ISMS MinutesISMS documents Click to see details 6 www.riesgoriskmanagement.com ||| [email protected] 5. The policies and procedures mapping dashboardThe organisation and its business units 6. MANAGING 3RD PARTY SUPPLIERSManaging 3rd party suppliers in managed via our extranet solution that extends the hostorganisations minimum compliance requirements and monitors compliance across the organisation. 7. INTERNAL AUDITORS AND COMPLIANCE MONITORINGThe diagram below depicts how the internal audit and compliance monitoring process isimplemented to ensure that the requirements of the FSA are not only meet but sustainable.Non compliance reports from Audits 8. CONTACT DETAILSThe solution is available in the form a web based solution that is installed and implemented on thecustomer network, it requires a web served that may also have an extranet instance.For purchase information:Ben Oguntala, LLB, LLM (Financial markets regulation)[email protected] - +44 781 039 867