Modern Compliance: Capturing Mobile and Social Media Communications
Join ACA and SnippetSentry as we explore global communication capture strategies to reduce compliance risks and enhance your compliance program.
Third-party risk management (TPRM) is the process of monitoring, validating, and remediating risks presented by third-party vendors. TPRM helps ensure your vendors protect your data, comply with regulations, and provide sustainable services that meet your requirements. However, vendor risk management can be a costly and time-consuming task. Our vendor management outsourcing service (VMOS) allows your company to offload the vendor due diligence and risk assessment process. Unlike other vendor risk management solutions and vendor management software providers, ACA's VMOS will help your company save valuable time and resources in order to focus on more strategic tasks.
Our vendor management software allows you to track DDQ progress and vendor risk assessment results. Key features include:
Our vendor risk assessments are developed and managed by a team of information security risk analysts in ACA’s centralized, cost-effective analysis and review center (the ARC) in Pittsburgh, PA. The ARC’s dedicated vendor management outsourcing service team is overseen by an experienced vendor risk specialist and includes former senior managers in risk management, insider threat specialists, and data security officers from various industries, including financial services, banking, and healthcare. Over 750 clients and 2,000 vendors have chosen ACA to manage their vendor management process and mitigate third party risks.
Our tailored, proprietary vendor due diligence questionnaires (DDQ) include over 300 questions and are customized for each vendor type to provide an accurate assessment of possible risks. Topics include:
As geopolitical change and uncertainty, regulatory sabre-rattling and industry shake-ups combine to create a perfect storm, we examine the impact for financial services firms on their trade and transaction reporting obligations under MiFIR, EMIR and SFTR.
FINRA's release of Regulatory Notice 20-21 allows the use of IRR for investments or funds that have been fully realized but further requires utilizing the calculation methodologies of the Global Investment Performance Standards (GIPS) for investment programs/funds that include both realized and unrealized holdings.
Learn more about the California Privacy Rights Act (CPRA), which amends the existing California Consumer Privacy Act (CCPA).
Outsourcing risk and compliance activities can help firms navigate the future of risk and compliance in the age of RiskMutation™ through better results, increased agility, and scale for less. Get our outsourcing strategic roadmap here.
To continue providing the fund industry with transparency and insight into how peers are approaching compliance with the liquidity program rule, we are pleased to present the results of our third annual Liquidity Risk Management Program Rule survey.
Recent reports from the FBI’s Internet Crime Complaint Center indicate a staggering rise in the rate of business email compromise due to exploitation of Microsoft Office 365 and other cloud-based email services.
Acquisition strengthens ACA’s outsourced financial operations offering for broker-dealers.
We are thrilled to announce that ACA Group has earned a spot on the prestigious 2024 ESGFinTech100 list, joining the ranks of the world's most innovative ESG technology providers.
The 2024 AI Benchmarking Survey by ACA Aponix and NSCP reveals that, despite enthusiasm for AI, financial firms lack formal AI governance frameworks, testing protocols, and third-party oversight.
Join ACA and SnippetSentry as we explore global communication capture strategies to reduce compliance risks and enhance your compliance program.
Join our experienced ACA Wealth experts who will discuss an investment adviser’s obligations for the annual compliance review required under Rule 206(4)-7.