{"id":2818,"date":"2015-06-01T18:19:04","date_gmt":"2015-06-01T22:19:04","guid":{"rendered":"https:\/\/compliance-risk.com\/?p=2818"},"modified":"2018-05-29T11:54:09","modified_gmt":"2018-05-29T11:54:09","slug":"electronic-communications-surveillance-platforms-checking-the-box-or-providing-value","status":"publish","type":"post","link":"https:\/\/compliance-risk.com\/electronic-communications-surveillance-platforms-checking-the-box-or-providing-value\/","title":{"rendered":"Electronic Communications Surveillance Platforms: Checking The Box or Providing Value?"},"content":{"rendered":"

As a Former Chief Compliance Officer, I am frequently asked by my clients to help them find \/understand where the \u201crisk\u201d is in their compliance programs \/ throughout their organizations. For me, a huge part of an organization's risk profile comes down to the quality of their surveillance protocols and the quality of information gleaned from these processes. As most Compliance Officers within Financial Services recently saw in the widely publicized insider trading case involving the Ex-JP Morgan Banker and his father \u2013 the two were able to devise a scheme utilizing \u201cgolf-related code\u201d in their illegal emails, where \u201ctips\u201d were provided, enabling the Banker\u2019s father to earn over $1 million in illegal profits. In case you missed this, read it here: http:\/\/www.sec.gov\/news\/pressrelease\/2015-90.html<\/a><\/p>\n

Know the Code?<\/strong> The following \u201ccoded\u201d emails were pinpointed and referenced by the SEC in their case. Do you think your electronic surveillance platform could have surfaced these communications?<\/p>\n

The following \u201ccoded\u201d emails were pinpointed and referenced by the SEC in their case. Do you think your electronic surveillance platform could have surfaced these communications? Based on the answer I\u2019m sure most of us would be afraid to utter, Compliance Officers should be pondering if their electronic surveillance platforms are doing all that they can to help detect, prevent, and mitigate the risk<\/a> associated with deceptive communications.<\/p>\n

Searching for a Needle in a Stack of Needles<\/strong> Within the Financial Services vertical, electronic communications surveillance has become an area where most firms \/ Compliance officers have become \u201caccepting\u201d of their process. It has almost become an area where firms \/individuals rest on their laurels \u2013 assuming their process will pass muster with the regulators, satisfying the<\/p>\n

Within the Financial Services vertical, electronic communications surveillance has become an area where most firms \/ Compliance officers have become \u201caccepting\u201d of their process. It has almost become an area where firms \/individuals rest on their laurels \u2013 assuming their process will pass muster with the regulators, satisfying the review and retention requirements<\/a> stipulated by FINRA and the SEC. \"needle<\/a>This \u201ccomfort\u201d leaves firms exposed. Since most electronic surveillance technologies are based on key word \/ key phrase searches, they often come up short in terms of their overall utility to an organization. In fact, most individuals charged with the supervisory responsibility of reviewing emails often complain about the redundancy in the process \/ the amount of false positives \u2013 and the valuable time wasted reviewing and approving emails that have no applicability nor present any true risk to their organizations. Truthfully, I\u2019ve heard the process described as worse than \u201cfinding a needle in a haystack\u201d. It\u2019s more like \u201cfinding a needle in a stack of needles\u201d.<\/p>\n

Is There a Better Way?<\/strong><\/p>\n

As fraud-detection technologies have evolved, better solutions have emerged. Now, technologies exist that are policy driven, relying on complex algorithms to identify \u201cbehaviors\u201d. As these technologies improve, they will actually learn from the behaviors you don\u2019t want to see versus the ones you do. The Ex- JP Morgan Banker case presents an interesting dilemma for firms. Do you still rely on antiquated technology<\/a> \u2013 or do you use this as an opportunity to test the waters for improved surveillance \/detection systems that can help better defend your firm from these types of outcomes.<\/p>\n

Is There a Business Case Here? Something All Compliance Officers Should Ponder\u2026<\/strong><\/p>\n

In the end, nothing can protect a firm against an employee driven fraud. Fraudsters are smart \u2013 and will always devise schemes that allow them to penetrate company defenses. The question is \u2013 how quickly can you catch these individuals and mitigate against reputational risk, regulatory issues and financial loss. It\u2019s a very interesting problem and dilemma to contemplate. In the end, it is my opinion that when these market events occur, Compliance Officers have a limited window of opportunity to improve their company\u2019s defenses \u2013 and they should seize the opportunity!<\/p>\n","protected":false},"excerpt":{"rendered":"

As a Former Chief Compliance Officer, I am frequently asked by my clients to help […]<\/p>\n","protected":false},"author":3,"featured_media":7211,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[21],"tags":[],"acf":[],"yoast_head":"\nElectronic Communications Surveillance Platforms: Checking The Box or Providing Value? - Compliance Risk Concepts<\/title>\n<meta name=\"description\" content=\"As a Former Chief Compliance Officer, I am frequently asked by my clients to help them find \/understand where the \u201crisk\u201d is in their compliance programs \/\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/compliance-risk.com\/electronic-communications-surveillance-platforms-checking-the-box-or-providing-value\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Electronic Communications Surveillance Platforms: Checking The Box or Providing Value? - Compliance Risk Concepts\" \/>\n<meta property=\"og:description\" content=\"As a Former Chief Compliance Officer, I am frequently asked by my clients to help them find \/understand where the \u201crisk\u201d is in their compliance programs \/\" \/>\n<meta property=\"og:url\" content=\"https:\/\/compliance-risk.com\/electronic-communications-surveillance-platforms-checking-the-box-or-providing-value\/\" \/>\n<meta property=\"og:site_name\" content=\"Compliance Risk Concepts\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ComplianceRisk\" \/>\n<meta property=\"article:published_time\" content=\"2015-06-01T22:19:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-05-29T11:54:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/compliance-risk.com\/wp-content\/uploads\/2015\/06\/the-box-or-providing-value.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mitch Avnet\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@c_r_concepts\" \/>\n<meta name=\"twitter:site\" content=\"@c_r_concepts\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mitch Avnet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/compliance-risk.com\/electronic-communications-surveillance-platforms-checking-the-box-or-providing-value\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/compliance-risk.com\/electronic-communications-surveillance-platforms-checking-the-box-or-providing-value\/\"},\"author\":{\"name\":\"Mitch Avnet\",\"@id\":\"https:\/\/compliance-risk.com\/#\/schema\/person\/087a35b830441b72ba8a23330a44a715\"},\"headline\":\"Electronic Communications Surveillance Platforms: Checking The Box or Providing Value?\",\"datePublished\":\"2015-06-01T22:19:04+00:00\",\"dateModified\":\"2018-05-29T11:54:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/compliance-risk.com\/electronic-communications-surveillance-platforms-checking-the-box-or-providing-value\/\"},\"wordCount\":656,\"publisher\":{\"@id\":\"https:\/\/compliance-risk.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/compliance-risk.com\/electronic-communications-surveillance-platforms-checking-the-box-or-providing-value\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/compliance-risk.com\/wp-content\/uploads\/2015\/06\/the-box-or-providing-value.jpg\",\"articleSection\":[\"Compliance\/ Risk Management\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/compliance-risk.com\/electronic-communications-surveillance-platforms-checking-the-box-or-providing-value\/\",\"url\":\"https:\/\/compliance-risk.com\/electronic-communications-surveillance-platforms-checking-the-box-or-providing-value\/\",\"name\":\"Electronic Communications Surveillance Platforms: Checking The Box or Providing Value? - Compliance Risk Concepts\",\"isPartOf\":{\"@id\":\"https:\/\/compliance-risk.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/compliance-risk.com\/electronic-communications-surveillance-platforms-checking-the-box-or-providing-value\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/compliance-risk.com\/electronic-communications-surveillance-platforms-checking-the-box-or-providing-value\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/compliance-risk.com\/wp-content\/uploads\/2015\/06\/the-box-or-providing-value.jpg\",\"datePublished\":\"2015-06-01T22:19:04+00:00\",\"dateModified\":\"2018-05-29T11:54:09+00:00\",\"description\":\"As a Former Chief Compliance Officer, I am frequently asked by my clients to help them find \/understand where the \u201crisk\u201d is in their compliance programs \/\",\"breadcrumb\":{\"@id\":\"https:\/\/compliance-risk.com\/electronic-communications-surveillance-platforms-checking-the-box-or-providing-value\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/compliance-risk.com\/electronic-communications-surveillance-platforms-checking-the-box-or-providing-value\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/compliance-risk.com\/electronic-communications-surveillance-platforms-checking-the-box-or-providing-value\/#primaryimage\",\"url\":\"https:\/\/compliance-risk.com\/wp-content\/uploads\/2015\/06\/the-box-or-providing-value.jpg\",\"contentUrl\":\"https:\/\/compliance-risk.com\/wp-content\/uploads\/2015\/06\/the-box-or-providing-value.jpg\",\"width\":900,\"height\":500,\"caption\":\"the-box-or-providing-value\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/compliance-risk.com\/electronic-communications-surveillance-platforms-checking-the-box-or-providing-value\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/compliance-risk.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Electronic Communications Surveillance Platforms: Checking The Box or Providing Value?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/compliance-risk.com\/#website\",\"url\":\"https:\/\/compliance-risk.com\/\",\"name\":\"Compliance Risk Concepts\",\"description\":\"Compliance Risk Concepts: Senior Compliance Consultants & Executives.\",\"publisher\":{\"@id\":\"https:\/\/compliance-risk.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/compliance-risk.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/compliance-risk.com\/#organization\",\"name\":\"Compliance Risk Concepts\",\"url\":\"https:\/\/compliance-risk.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/compliance-risk.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/compliance-risk.com\/wp-content\/uploads\/2018\/02\/crc-logo-crc-80-2.png\",\"contentUrl\":\"https:\/\/compliance-risk.com\/wp-content\/uploads\/2018\/02\/crc-logo-crc-80-2.png\",\"width\":72,\"height\":80,\"caption\":\"Compliance Risk Concepts\"},\"image\":{\"@id\":\"https:\/\/compliance-risk.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ComplianceRisk\",\"https:\/\/x.com\/c_r_concepts\",\"https:\/\/www.linkedin.com\/company\/compliance-risk-concepts-crc-\/\",\"https:\/\/www.youtube.com\/channel\/UCKyHBgqJ9309SotUm-s-7bg\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/compliance-risk.com\/#\/schema\/person\/087a35b830441b72ba8a23330a44a715\",\"name\":\"Mitch Avnet\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/compliance-risk.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5c9175509724ce7de34fa8262e961ac2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5c9175509724ce7de34fa8262e961ac2?s=96&d=mm&r=g\",\"caption\":\"Mitch Avnet\"},\"url\":\"https:\/\/compliance-risk.com\/author\/mitch-avnet\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Electronic Communications Surveillance Platforms: Checking The Box or Providing Value? - Compliance Risk Concepts","description":"As a Former Chief Compliance Officer, I am frequently asked by my clients to help them find \/understand where the \u201crisk\u201d is in their compliance programs \/","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/compliance-risk.com\/electronic-communications-surveillance-platforms-checking-the-box-or-providing-value\/","og_locale":"en_US","og_type":"article","og_title":"Electronic Communications Surveillance Platforms: Checking The Box or Providing Value? - Compliance Risk Concepts","og_description":"As a Former Chief Compliance Officer, I am frequently asked by my clients to help them find \/understand where the \u201crisk\u201d is in their compliance programs \/","og_url":"https:\/\/compliance-risk.com\/electronic-communications-surveillance-platforms-checking-the-box-or-providing-value\/","og_site_name":"Compliance Risk Concepts","article_publisher":"https:\/\/www.facebook.com\/ComplianceRisk","article_published_time":"2015-06-01T22:19:04+00:00","article_modified_time":"2018-05-29T11:54:09+00:00","og_image":[{"width":900,"height":500,"url":"https:\/\/compliance-risk.com\/wp-content\/uploads\/2015\/06\/the-box-or-providing-value.jpg","type":"image\/jpeg"}],"author":"Mitch Avnet","twitter_card":"summary_large_image","twitter_creator":"@c_r_concepts","twitter_site":"@c_r_concepts","twitter_misc":{"Written by":"Mitch Avnet","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/compliance-risk.com\/electronic-communications-surveillance-platforms-checking-the-box-or-providing-value\/#article","isPartOf":{"@id":"https:\/\/compliance-risk.com\/electronic-communications-surveillance-platforms-checking-the-box-or-providing-value\/"},"author":{"name":"Mitch Avnet","@id":"https:\/\/compliance-risk.com\/#\/schema\/person\/087a35b830441b72ba8a23330a44a715"},"headline":"Electronic Communications Surveillance Platforms: Checking The Box or Providing Value?","datePublished":"2015-06-01T22:19:04+00:00","dateModified":"2018-05-29T11:54:09+00:00","mainEntityOfPage":{"@id":"https:\/\/compliance-risk.com\/electronic-communications-surveillance-platforms-checking-the-box-or-providing-value\/"},"wordCount":656,"publisher":{"@id":"https:\/\/compliance-risk.com\/#organization"},"image":{"@id":"https:\/\/compliance-risk.com\/electronic-communications-surveillance-platforms-checking-the-box-or-providing-value\/#primaryimage"},"thumbnailUrl":"https:\/\/compliance-risk.com\/wp-content\/uploads\/2015\/06\/the-box-or-providing-value.jpg","articleSection":["Compliance\/ Risk Management"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/compliance-risk.com\/electronic-communications-surveillance-platforms-checking-the-box-or-providing-value\/","url":"https:\/\/compliance-risk.com\/electronic-communications-surveillance-platforms-checking-the-box-or-providing-value\/","name":"Electronic Communications Surveillance Platforms: Checking The Box or Providing Value? - Compliance Risk Concepts","isPartOf":{"@id":"https:\/\/compliance-risk.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/compliance-risk.com\/electronic-communications-surveillance-platforms-checking-the-box-or-providing-value\/#primaryimage"},"image":{"@id":"https:\/\/compliance-risk.com\/electronic-communications-surveillance-platforms-checking-the-box-or-providing-value\/#primaryimage"},"thumbnailUrl":"https:\/\/compliance-risk.com\/wp-content\/uploads\/2015\/06\/the-box-or-providing-value.jpg","datePublished":"2015-06-01T22:19:04+00:00","dateModified":"2018-05-29T11:54:09+00:00","description":"As a Former Chief Compliance Officer, I am frequently asked by my clients to help them find \/understand where the \u201crisk\u201d is in their compliance programs \/","breadcrumb":{"@id":"https:\/\/compliance-risk.com\/electronic-communications-surveillance-platforms-checking-the-box-or-providing-value\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/compliance-risk.com\/electronic-communications-surveillance-platforms-checking-the-box-or-providing-value\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/compliance-risk.com\/electronic-communications-surveillance-platforms-checking-the-box-or-providing-value\/#primaryimage","url":"https:\/\/compliance-risk.com\/wp-content\/uploads\/2015\/06\/the-box-or-providing-value.jpg","contentUrl":"https:\/\/compliance-risk.com\/wp-content\/uploads\/2015\/06\/the-box-or-providing-value.jpg","width":900,"height":500,"caption":"the-box-or-providing-value"},{"@type":"BreadcrumbList","@id":"https:\/\/compliance-risk.com\/electronic-communications-surveillance-platforms-checking-the-box-or-providing-value\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/compliance-risk.com\/"},{"@type":"ListItem","position":2,"name":"Electronic Communications Surveillance Platforms: Checking The Box or Providing Value?"}]},{"@type":"WebSite","@id":"https:\/\/compliance-risk.com\/#website","url":"https:\/\/compliance-risk.com\/","name":"Compliance Risk Concepts","description":"Compliance Risk Concepts: Senior Compliance Consultants & Executives.","publisher":{"@id":"https:\/\/compliance-risk.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/compliance-risk.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/compliance-risk.com\/#organization","name":"Compliance Risk Concepts","url":"https:\/\/compliance-risk.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/compliance-risk.com\/#\/schema\/logo\/image\/","url":"https:\/\/compliance-risk.com\/wp-content\/uploads\/2018\/02\/crc-logo-crc-80-2.png","contentUrl":"https:\/\/compliance-risk.com\/wp-content\/uploads\/2018\/02\/crc-logo-crc-80-2.png","width":72,"height":80,"caption":"Compliance Risk Concepts"},"image":{"@id":"https:\/\/compliance-risk.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ComplianceRisk","https:\/\/x.com\/c_r_concepts","https:\/\/www.linkedin.com\/company\/compliance-risk-concepts-crc-\/","https:\/\/www.youtube.com\/channel\/UCKyHBgqJ9309SotUm-s-7bg"]},{"@type":"Person","@id":"https:\/\/compliance-risk.com\/#\/schema\/person\/087a35b830441b72ba8a23330a44a715","name":"Mitch Avnet","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/compliance-risk.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5c9175509724ce7de34fa8262e961ac2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5c9175509724ce7de34fa8262e961ac2?s=96&d=mm&r=g","caption":"Mitch Avnet"},"url":"https:\/\/compliance-risk.com\/author\/mitch-avnet\/"}]}},"_links":{"self":[{"href":"https:\/\/compliance-risk.com\/wp-json\/wp\/v2\/posts\/2818"}],"collection":[{"href":"https:\/\/compliance-risk.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/compliance-risk.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/compliance-risk.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/compliance-risk.com\/wp-json\/wp\/v2\/comments?post=2818"}],"version-history":[{"count":0,"href":"https:\/\/compliance-risk.com\/wp-json\/wp\/v2\/posts\/2818\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/compliance-risk.com\/wp-json\/wp\/v2\/media\/7211"}],"wp:attachment":[{"href":"https:\/\/compliance-risk.com\/wp-json\/wp\/v2\/media?parent=2818"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/compliance-risk.com\/wp-json\/wp\/v2\/categories?post=2818"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/compliance-risk.com\/wp-json\/wp\/v2\/tags?post=2818"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}