Competitor’s Offering and Business Case for Genpact
Post release of the guidelines by BCBS, many financial and IT consulting came up with different offerings for banks and financial institutions. We studied a few major companies operating in this space and their offerings. These offerings can be classified into the following three categories:
• Third Process Service Provider: These are the companies that maintain banks existing data warehouse and modify these as per the changing regulations.
• Solution Provider: These are the companies that have their risk management applications which they sell and maintain for the banks.
• Process Consultants: These are the companies that study the client’s processes and help assess gaps in the existing process
…show more content…
Both the companies have their banking application (Finacle for Infosys and Bancs for TCS) and they have integrated the risk management service along with the application. Oracle and SAS also have their own risk management solution that supports BCBS guidelines. McKinsey and Deloitte, because of their deep knowledge and experience in banking and financial regulation space, offer process consulting to many banks.
Business Case for Genpact
Genpact can act as both Third Party Service Provider or as a Process Consultant because of the following reasons:
• Deep process knowledge can help Genpact in understanding the principles & their relation to the institution’s current risk data which can play a crucial role in interlinking risk data aggregation and risk reporting practices simultaneously.
• Assisting with self-assessments by utilizing Genpact’s deep understanding of both business & technical requirements of complex risk data/reporting infrastructures
• It can identify gaps in the risk data, reporting & IT infrastructure.
• Assist in developing forward looking reporting capabilities to provide early warnings of any potential breaches of risk limits & risk appetite plus help in conducting flexible & effective stress testing.
• Provide expert judgment on incomplete data to facilitate aggregation process as well as interpretation of results within the risk reporting
…show more content…
There are multiple processes which concern with the entry of data into this warehouse, quality of the data entering this warehouse, quality of reports generated from the data in the warehouse and control of access to data in the warehouse. All such processes are encapsulated in the risk data governance function, the guidelines to which are specified in the Basel Principles for Effective Risk Data Aggregation and Risk Reporting. Owing to the dual impact that the risk data governance function has on the business, viz; compliance to Basel principles and standardization of processes; the evaluation of these processes is dual-faceted and can be carried out together.
The methodology can be explained in a step wise manner as below:
Step – 1: A comprehensive secondary research was done on the principles stipulated in the BCBS document and the processes surrounding risk data warehouse.
Step – 2: Process owners and Subject Matter Experts at Genpact were approached to know in depth details on various processes of risk data
Hi Tom, Thanks for the update. Please see my examples in red in the first 2 boxes. We should adjust our risk statements to specifically identify the risk in each requirement or area. Once you 've revised the Reg CC risk statements, please forward them to me. Thank you for your help and for being patient with us.
Critical Element 1: TITLE: Cash Verification (CV) Financial Reviews S: Conduct and complete mandated CV reviews on negotiable instruments and other assets to ensure sound financial management. Provide advice, education and training to appointed collection agents and departments to ensure fund management efficiency/effectiveness, ensuring strong internal management controls are practiced. M: Conduct 24 reviews; prepare reports, ensure RM is briefed and afforded an opportunity to respond to report results; report results to the CO in a timely manner; follow-up on any reported findings in subsequent reviews.
Task 1 - REPORT (P1, M1, D1) Your first task is to investigate web architecture and components involved in website production, and produce a report. In Part 1 of the report you are required to outline the role of the following: ARCHITECTURE: Internet Service Providers (ISP): businesses which provides access to the Internet to their subscribed customers and provide dial-up, cable, fibre optic or other types of Internet access. E.g. Sky, BT, Virgin Media and TalkTalk are examples of Internet Service Providers and broadband providers. Web hosting services: this is a kind of Internet hosting service that ables people and organisations to make their own website accessible through the World Wide Web.
Strategies are methods or plans that solves a problem; strategies are essential to resolve issues to be able to prevent them from happening again and it helps to do a better job. Computerized physician’s order, electronic medication administration record with a barcode and reviewing the practice standards from CNO such as medication and documentation are the suggested strategies to inhibit the incidents and the breached ethical values from occurring again. Moreover, using information technology is the first strategy to impede medication error in the long-term care facility where an ethical value such as commitment to client was breached.
The use of the data, both external and internal, should be treated with confidentiality in regards to customers and contracted associates. The data owner should be a trusted position with some lower level connections as executives might not need to be bothered with management of data systems, while anyone lower than a VP would be too low on the hierarchy (Brown, 2012, p. 167). Therefore, a VP directly reporting to the CIO should be the data owner. Who then would be responsible for data quality?
Probation Officer Job Description Overview Would you regard yourself as responsible? Follow orders so much that it has become a natural talent? Respect the court system and think you are capable of upholding their high standards? You may be enticed to know that this job may be the job for you. Day-to-day activities / duties and responsibilities • Being very attentive to the offender and hold supervisory duties • Make sure the offender is obedient to their custodial sentence • Paying attention to details and interviewing the offenders
in the September 2012 Market Scope for Global Enterprise Risk Management Consulting Services. • Named in FORTUNE® magazine's “Most Admired Companies” list. (1998-2013) • Robert Half again appeared in the Newsweek list of the greenest big companies in the U.S. (2012) • Recognized as one of the “100 Best” companies in the United States by DeMarche Associates, Inc., for achieving superior performance within the top 3 percent of all major U.S. corporations. (2009) 1.2 Overview of the Project 1.2.1 IT Audit
Risk Based Monitoring (RBM) is becoming more popular and widely used in clinical trials in the past few years. The concept of the risk based monitoring is to transform the traditional 100 % source data verification (SDV) monitoring approach towards a new concept of monitoring that includes varies of centralised activities in critical data evaluation and process monitoring. RBM is a monitoring approach which combines risk assessment and risk management by utilising key data indicators, along with analytical tools to identify risk at study level, site level and subject level respectively. It also introduces the new term Source Data Review (SDR) to the industry. Source Data Verification which is known as SDV is defined as “the process by which
The risk management process establishes the methodology for risk enterprises framework for the of many businesses (Fraser & Simkins, 2010). A retail business such as Target needs to do a risk assessment to establish the types of risks being faced by the organization. The risk assessment process starts with the identification and categorization of risk factors. High customer interaction of the retail businesses like Target, need to identify risk as a continuous basis effort over the lifetime of the business (Mandru, 2016). It important that the business leaders, set goals and priorities for the risk management system.
The RWG is led by the general counsel and company secretary and involves the heads of global risk management, global strategy, program office and global internal audit. Supporting the group's major risk review prepares each of the areas and capacities have their own danger profiles that are redesigned quarterly in accordance with the exercises of the vital arranging cycle. During the interim periods, consistent dialog happens between risk managers and risk topic specialists to create, execute and screen nitty gritty danger evaluations, hazard relief systems, controls and key risk markers. (IHG Annual Report,
Its clients are individual users, specialised businesses, and institutions such as government, science, defence, spatial and educational organisations. To meet and respond to its customers needs, IBM creates, develops and manufactures many of the world 's most advanced technologies, ranging from computer systems and software to networking systems, storage devices and microelectronics. 3) Internal and External Analysis A) Porter’s Value Chain Analysis: This model describes the activities that take place in a business and relates them to an analysis of the competitive strength of the business. Value Chain Analysis is one way of identifying which activities are best undertaken by a business and which are best provided by others ("outsourced").
- IT platform and core applications software support world-class SCM - Advanced decision support capabilities have the greatest impact on business performance - Data are required to manage the core business
This means they are responsible for the safety of children, young people and also the staff. There should be a clear ‘lines of responsibility’ for all workers etc to read in order for them to know who they must report to with any important information and to be accountable for. 1.2- Explain how to monitor and maintain the awareness of risks and hazards- It is important that we maintain a safe environment in order to be aware and prevent accidents that may occur depending on the following factors: The environment-
They state quite obvious and short explanations or certain risks that any company in any industry could use. For example, one risk was, “Supply chain interruptions may increase costs or
This enables wage and income earners, producers etc to take pre-emptive action. Some of the measures are Gross Domestic Product (GDP), Gross National Product (GNP) etc - Forecasting: This is necessary to predict the possible future trend of the economy so as to enhance overall efficiency of the economy. This may be short term, medium term as well as long