Risk Management 9pdf
Risk Management 9pdf
Risk Management 9pdf
OPERATIONAL RISK
MANAGEMENT
LEARNING OUTCOMES
After going through the chapter student shall be able to understand
Operational Risk Management
(a) Definition,
(b) Scope and
(c) Techniques
1. INTRODUCTION
1.1 What is Operational Risk?
The most commonly used and accepted definition of operational Risk is from Basel II which states
that Operational Risk is the risk of loss resulting from inadequate or failed processes, people and
systems and from external events.
This definition includes legal risk, but excludes strategic risk and reputational risk.
Basel II is the common name used to refer to the “International Convergence of Capital
Measurement and Capital Standards: A Revised Framework,” which was published by the Bank for
International Settlements in Europe in 2004, and the framework is broadly adopted, with country
level customisation as required by the countries that have been party to the accord. While this was
specific only for the regulated financial institutions industry, the overall concept of operational risk
remains the same irrespective of the industry.
Each and every industry, whether manufacturing, trading or in service sector, is subject to a
degree of operational risk though the level of risks may differ between industry sectors,
companies, the nature of products and services offered, and the actual management control over
these risks.
Operational risk is an overarching concept interrelated with several other types of risks, and
cannot be viewed in isolation. The most important risks linked to operational risk are risk of non-
compliance to applicable laws and regulations, risk of fraud losses due to an internal or external
event that takes advantage of gaps in the processes to make an unlawful gain, risk of financial
losses, risk of incorrect financial reporting, and in several organisations, reputational risk is also
part of the areas touched by operational risk.
1.2. Why does operational risk originate?
(a) Inadequately defined products and services which may not be compliant to industry
regulations, and/or may be exposed to risk of misspelling;
(b) Inadequately defined policies and processes which would directly adversely impact quality of
controls like checks and balances, segregation of duties as may be required;
(c) Inadequate technology functionality, or infrastructure that exists in any technology supported
environment, which organisations use in respective business operations;
(d) Internal or external crime that takes advantage of gaps in processes for unlawful gain, i.e.
fraud;
(e) External events like terrorist attacks or natural disasters that disrupt business or cause
financial losses;
(f) Change in the environment of the industry sector (including significant regulatory changes)
that impacts the operational risk profile of an organisation.
Thus, Operational Risk Management (ORM) is primarily an exercise in mitigating potential losses,
i.e. possible losses, through a well-laid out mechanism of identifying the inherent risks in a
business process and reviewing / testing the efficacy of the controls related to each risk.
Additionally, an important part of ORM is also to identify and report operational risk events,
including their financial impact (losses and recoveries) if any. Thus, an adequate governance
framework is expected to cover both the preventive and the lag aspects of operational risks.
In coming sections, we shall also elaborate on the concepts outlined above, in terms of how
policies, processes and technology failures can cause possible risks and losses.
development and implementation of risk management framework for the company, including
identification of risks, which as per Board’s opinion could threaten the very existence of the
company.
Clause (e) of Sub-section 5 of Section 134 explains the meaning of the term ‘internal financial
controls’ as “the policies and procedures adopted by the company for ensuring the orderly
and efficient conduct of its business, including adherence to company’s policies, the
safeguarding of its assets, the prevention and detection of frauds and errors, the accuracy
and completeness of the accounting records, and the timely preparation of reliable financial
information.”
Section 177 instructs that the Audit Committee shall review the risk management procedures
implemented by the management.
Schedule IV instructs that Independent Directors are required to get assurance that systems
of risk management are robust and defensible.
(b) Paragraph 4(c) of the Standard on Auditing (SA) 315 “Identifying and Assessing the Risks of
Material Misstatement Through Understanding the Entity and Its Environment” defines the
term ‘internal control’ as “the process designed, implemented and maintained by those
charged with governance, management and other personnel to provide reasonable assurance
about the achievement of an entity’s objectives with regard to reliability of financial reporting,
effectiveness and efficiency of operations, safeguarding of assets, and compliance with
applicable laws and regulations. The term “controls” refers to any aspects of one or more of
the components of internal control.”
(c) Clause 49 of the Listing Agreement, indicates that disclosures are to be made to the Board of
Directors on risk management, on whether the company has laid down any procedures to
inform Board members about the risk assessment and mitigation procedures.
(d) The ICAI Guidance Note on Audit of Internal Financial Controls over Financial Reporting has
several sections pertinent to the understanding of operational controls underlying in the
processes;
While the Guidance Note does not explicitly dwell on operational risk per se, the overall
approach and methodologies mentioned in the Note rest on, and derive from an implied
understanding of the auditor’s understanding of operational risks and the mitigating controls
of the organisation; for instance, the auditor is expected to have a thorough understanding of
the automated and manual controls that lie in each of the processes that have a direct
bearing on the financials of the organisation.
The following section on auditor’s responsibility is broadly paraphrased from the Guidance
Note, and it is recommended that the student read it in entirety for a holistic understanding:
• Assessing risks across the organisation that could lead to a material misstatement in the
financial statement;
The Third line of defence is Internal Audit; it is independent of management control and reports
to the Audit Committee of the Board.
• An effective internal audit would highlight issues and potential gaps in processes, which
were missed by the first two lines of defence as well. As an independent vertical, their
value addition provides a better insight into the process from a holistic perspective since
they are not directly involved in managing the process.
• Checking on efficacy of controls that mitigate operational risk, is a key deliverable of
Internal Audit.
• Over last few decades, internal audit has evolved into a concept of Risk Based Auditing.
The term itself refers to an approach where the audit function identified risks and controls
in a very similar fashion as the operational risk methodology, and then choose to focus
their attention and deploy resources on checking the areas of choice.
All three lines of defence are expected to work in a professionally collaborative manner, respecting
each other’s views and concerns. ORMC of an organisation must include the Internal Audit head
too, in addition to senior management, so that a holistic view of the risks and controls is obtained.
For an effective Operational Risk Management Framework, the following focus areas are
recommended; though they fall outside the direct management of the Operational Risk
department, these are prime drivers of operational risk, and hence frequently either the cause of
higher operational risks and/or its remedial measure.
3.4 Effective policy framework
• Entity level policies: Depending on nature of the industry and applicable regulations, it
is necessary for an organisation to have certain high-level policies that are applicable to
the organisation, irrespective of lines of businesses or departments. These are typically
owned at the highest levels of management and set the tone at the top. Examples are
Code of Conduct for employees, Whistleblower policy, Expense Delegation Policy,
Procurement Policy, Information Security Policy etc.
• Line of business / Departmental policies: Depending on nature of the business an
organisation is engaged in each business activity or department may need suitable
Policies to govern and direct its functioning. Inadequate definition of the policy statement
and responsibilities thereof are often a cause of operational risk events. Examples are
Credit policy in a lending institution, product specific policies in a manufacturing industry,
Human Resources policies, and Operational policies. Policies often include a “standard”
too, which outlines the specific deliverables and a minimum expected level of
performance in it. In some organisations, the Standards could be maintained outside the
Policy documentation, nevertheless, it is an advisable item to have in overall governance
process.
Policies have to be made in a manner that they are compliant all existing applicable laws and
regulations, and enable the organisation meet the business objective.
3.5 Process notes / Standard Operating Procedures (SOP)
Process notes are detailed instructions that address the specific responsibilities given in the policy
documents; process notes detail the roles and responsibilities of each department / responsible
person in executing a process/ transaction; it is expected that process notes have fair granularity,
on how exactly a process is executed, including the controls to be exercised. In an advanced
operational risk management environment, the process notes tend to be very articulate and define
the processes granularly and leave no scope for ambiguity or misinterpretation by those
responsible for execution.
Taking the same example as in policies, in a lending institution, a credit process note would detail
the exact steps that an organisation is to follow, in lending money to a customer and all the checks
and controls expected to be done in the process. A manufacturing process manual may describe
in detail aspects like the factory specifications, technology used in the process or the sub-process,
the assembly line, the specific departmental, and individual roles and technical tasks, output,
productivity and the quality expected.
impact to the revenues, injury to employees or loss or property that can be recuperated with a
small expense or effort.
Broadly, risk types that often overlap or are caused by operational failures, used commonly are:
(a) Regulatory risk: When the risk of a failure may lead to a violation of the regulatory
requirements that the organisation is supposed to comply with, the risk is termed as
regulatory risk. An inter-related term, often used in conjunction with regulatory risk, is
statutory risk. Statutory risk refers to violation of applicable law. Essentially, in common
parlance they often refer to the same group of potential risk, though, most organisations use
the word statutory risk to refer to violation of law, and regulatory risk to refer to violation of
norms issued by the specific regulator they fall under. KYC-AML is a common example of
being a statutory and regulatory risk (since Prevention of Money Laundering is an Act), and
since all regulated industries have norms on KYC, it is commonly tagged as regulatory risk.
(b) Financial risk: Risk of possible financial loss to the organisation.
(c) Financial reporting: Risk of misstatement of financials due to a failure, is termed risk of
financial reporting. This may be linked to financial risk in some specific risks, but not always.
For example, an excess payment made to a vendor may qualify for being categorised as
financial loss, but if it is accounted for properly it may not lead to risk of financial reporting.
Some organisations choose to include a description of financial assertions in the RCSAs, so
as to indicate the nature of impact a failure may have on the financial reporting from an audit
perspective.
(d) Legal risk: Risk of the organisation being at a risk of facing lawsuits, litigation, or a risk of
inadequate legal enforceability. Often, contractual risk is clubbed with legal risk, since lack of
due diligence in contractual agreements is inter-related to legal risks, given the chance of
disputes between parties, or the incapability to enforce terms of the agreement due to a
poorly defined contract.
(e) Reputation risk: Risk of the organisation’s reputation in public view is a key concern in
current age of an active and engaged media and social media. The related aspects like a
lower credit rating for the organisation, higher borrowing costs, reduction in credit terms
extended to organisation, fall in share price leading to overall market capitalisation fall, and
disruption due to vendors/suppliers/service providers refusing to do business due to
reputational risk are all real risks that a business faces. Quite often, a failed operational
transaction leading to a customer dispute/complaint may lead to an enhanced reputation risk.
(f) Fraud risk: Fraud risk is basically one that can lead to an unlawful gain by an internal
employee or an external person / entity by exploiting a gap in a process that fails to catch the
deliberately created scenarios by the perpetuator of the fraud; Examples are falsifying identity
for taking a loan, or raising an inflated bill, deliberate excess payment to a customer / vendor
etc. With the enhancement of COSO framework to ensure highest degree of accuracy and
completeness in financial statements, fraud risk in financial reporting assumes greatest
importance. Operational control failures, such as those that allow an employee to deliberately
tamper data (on systems or manually) leading to financial misstatement is a typical fraud risk,
linked to operational risk (poorly designed process of reporting of data).
(g) External risk: External risk are essentially those on which the organisation has no control,
like terrorist attacks, natural disasters etc. But these are real risks and the losses of loss of
employee lives or damage to physical assets incurred on these events do fall under
operational losses.
4.3 Risk Grading / Rating
Table of examples below indicate an assessment of impact into high, medium and low. These are
purely indicative and a hypothetical example; each organisation has to create this grid basis a mix
of qualitative and quantitative parameters and keep improving upon it with ongoing learnings with
reference to the risk appetite.
A purely illustrative table is given below, containing hypothetical thresholds.
A lot of it is subjective to the perception of the organisation and basis the risk appetite of each
operational risk framework. These are only examples, and parameters are to be set by the ORMC
and evolved.
Parameter High Medium Low
Financial loss Over 10 lacs (due to 5 to 10 lacs (due to Below 5 lacs (due to
any event falling under any event falling under any event falling under
any Loss category) any Loss category) any Loss category)
Regulatory Design level error, over Transaction level Below 0.2% of
violation 1% violation in key errors, above 0.2% transactions
regulatory compliance; and below 1% of Minor violations, but
May lead to regulatory transactions ; overall the process
reprimand / license May lead to regulatory design is in place
suspension / penalty reprimand/ penalty
etc.
Statutory Design level error, Transaction level Minor transgressions,
violation leading to serious non- errors, not leading to not leading to statutory
compliance of serious penalty / penalty etc.
applicable laws, may withdrawal of licence Overall process being in
lead to penalties, etc., but may lead to place, only transactional
reprimand, withdrawal issues with statutory errors occur.
of licence etc. authorities
Financial Significant error that Minor error but overall Minor error in financial
reporting error may lead to material could lead to a reporting, leading to a
misstatement of misstatement in material misstatement
financial information financials and an or a qualified statement
and/or material adverse comment from
• Impact /Severity: Impact category has to be ascribed to each risk. Impact category may
fall under one or more heads; for example, a fraud risk may also result in financial loss;
or a regulatory violation may lead to a reputational risk; or, wrong product configuration
sold to a customer and inability to service it, may lead to regulatory, reputational and
financial losses in combination; thus, it is possible to tag multiple heads of impact as well
as use only the primary impact category, that is a flexible judgement of the organisation.
• Probability / Frequency: Probability, simply put, is the chance of the transaction /
process going wrong due to a failure. Probability of failures are often expressed in
percentage terms of the total volume of transactions in a process if it is a high volume
transaction process; in processes where the universe of transactions is of lower volumes
or of lower frequency, a qualitative judgement on probability is often required to be taken.
Probability can be arrived at in high-volume processes by analysing past data on failures
in the process. It is important to note that this is often a subjective assessment in
instances where no past data is available.
This brings us to a very important concept of bucketing the risk profile of the processes into four
basic categories:
• High Impact – High Probability
• High Impact- Low Probability
• Low Impact – High Probability
• Low Impact – Low Probability
While the first and third categories tend to get sufficient attention by management, the high impact
low probability often skips the management decision purely because these incidents are either not
foreseen at all in reality or even if they are, they are so rare but with severe impact that putting a
risk mitigation plan for them is very difficult. However, wherever possible the management must
consider them on an evolving basis.
While it is easier for an operational risk practitioner to work on four buckets, it is often enhanced by
introducing an additional factor of Medium Probability and Medium Impact, depending on the
organisation’s view on risk grading.
4.4 Residual risk and Rating/Grading
Identified inherent risks in processes, are expected to be mitigated by using suitably designed
controls. In any organisation that has a view on managing operational risks, all or most of the
identified risks in a process would be controlled through a process that reduces, or eliminates the
risk of a failure taking place in that process.
Residual risk is thus the remaining risk in a process assuming the control designed is operating
properly. Thus, all companies strive to have a low level of residual risk.
Higher the control effectiveness, the lower the residual risk. Lower the control effectiveness, the
residual risk would be same or similar to level of inherent risk. We shall study more about the
concept of controls in the subsequent section.
5. UNDERSTANDING OF CONTROLS
Controls are activities that are intended to prevent the inherent risk from materialising into a real
failure of the process / transaction. These activities are designed keeping in mind the overall
process objective, the inherent risks in the process, and the impact of the risk if the failure were to
materialise in reality. Given that this concept applies to all industries we have attempted to broadly
categorise the types of controls into the following.
There are several different, but closely related or similar categorisations used in different kinds of
control framework, organisations, but mostly they would fall under these categories, thus this is an
indicative list and is subject to evolution.
(a) Verification: Refers to a control where a control step necessitates the transaction is verified
by either the same individual or a different individual before it is completed. For example, in a
financial lending institution, a department may process an application along with the customer
documents, and carry out a verification at the end of the process within the department,
before passing the file to the other department for further processing that relies on the
accuracy of the earlier department’s processing.
(b) Reconciliations: Refers to a control where an output of a process step is reconciled against
other known, established sources of information. For example, before publishing a report, the
responsible person may use the primary data, and reconcile it with other existing sources
from multiple systems / departments before finalising it.
(c) Segregation of duties: Refers to a control where part of the transaction is executed across
two segregated departments / functions / verticals thereby eliminating the risk of the
originating department to carry out the entire transaction on its own. For example, in a
finance lending organisation, the process of sourcing an application is owned by Sales
department, while the credit process is completely segregated into the Risk department, and
further, the entire operational process of checking the accuracy and completeness of the
processed application documentation may lie with Operations who would actually set up the
account and make the disbursement.
(d) Physical control: Refers to a control type where physical custody of an asset is the control.
For example, cash and blank cheque books are stored in a vault or safe to prevent misuse.
Original critical documents, legal agreements etc. are also stored safely in safe keeping
vaults. In certain cases, organisations may further add a control of authorisation thereby
creating a process where an individual holding a key has to operate it first, and additionally
the manager would use a different key in his position and open the vault to be accessed.
(e) Supervisory control: Refers to a control where the primary transaction / process is executed
at a particular level in an organisation, but before finalising it, the supervisor is required to
review it and accord an approval. Sometimes this is also classified as Authorisation if the
authorisation is given by an authority superior to the one originating the transaction. Often,
where the primary control is MIS (Management Information System) such review based
controls fall under supervisory control category.
(f) Exception triggers: Refers to a control where a system, or a responsible individual, throws
up regular reports of transactions which are deviant from the accepted, established process.
These reports are expected to be actioned upon by designated individuals. This control type
is effective only when the process has achieved a stability and scale that only deviations are
reviewed by authorities. For example, reporting of error rate in an operational process is an
exception trigger. Or, reporting of a high balance in a suspense account beyond the usual
acceptable levels can be an exceptional report item.
(g) Authorisation/ approval: Refers to a control step where, after a processing of a transaction
basis built in controls is almost complete, a final authority reviews it and approves it. For
example, there are several organisations use automated or semi-automated credit decision
tools in a financial lending process. However, as per selected parameters, a credit officer
may be designated to review the system based processing and approve it as well.
Classification of controls is also required to be classified in two more ways, considering whether
the control is exercise manually or is built into an automated system; and if the control is intended
to prevent a potential failure in the process, or detect a failure if it has happened.
(i) Preventive controls are those which attempt to prevent the inherent risk from materialising
into a failure.
(ii) Detective controls are built in to analyse the process / transactions post-facto and throw up
issues and exceptions. Preventive control in a transaction intensive process may be
verification and authorisation; a detective control may be MIS on errors that falls under
supervisory review.
For example, two people being required to count cash before making a cash payment, is a
common preventive control. If there is a cash reconciliation process at end of day, that
detects whether the correct amounts of cash was paid out, it is termed detective control.
(iii) Manual controls are those which are exercised by a designated role in a manual fashion.
For example, a verification of customer documents in a credit application, done manually, is a
manual control.
(iv) Automated controls are dependent on a predefined system check, it is called an automated
control. For example credit application data is fed into an automated system and data
supporting the process is done by a system, giving the recommended investment decision
and/or next steps in processing as the output. For example, a complex credit decision
involving several parameters and input data, if done manually, is subject to error if done
manually; using a system would be an optimal control and hence an automated control is set
up. There may be controls that are partly automated and use manual steps to synergize /
verify data from automated controls, these are termed hybrid controls. A MIS process that
uses automated data, and involves manual collation from different sources and checked
manually by a verifier is a hybrid control.
Additional information may include, financial assertion impact (if any), the name of system used (if
any), Sample description of test done etc.
7. TECHNOLOGY RISK
As we saw in the very fundamental definition of operational risk, a key constituent is technology
risk. In the current environment of increasing automation in business processes, and evolved
technology platforms for accounting, the operational risk practitioner and the auditor must both
understand the exact nuances of technology risk in any organisation.
All organisations nowadays use some kind of systems, technology platforms depending on the
nature of business. For large complex business processes, there would be several systems, either
in isolation or interrelated with each other, working to deliver the business outputs required.
From an auditor’s perspective or the operational risk professional perspective, the main issues that
can surface from technology risk are:
(a) Unscheduled system downtime or a system malfunctioning due to which a business
process is disrupted, due to which the necessary work output suffers a setback. This could result
in financial loss, loss of opportunity of business, customer issues and loss of raw material. For
example, a system failure in a financial lending organisation may lead to critical customer
commitments like disbursements not happening due to which customer may suffer losses; or
inability to post incoming payments on account leading to liquidity issues; or inability to service a
customer account leading to customer attrition. Organisations have backup servers, systems,
databases, and disaster recovery procedures to ensure work disruption is minimized in such
circumstances. The operational risk manager is expected to have an overview of the specific
facilities available to the technology department, to service the organisation’s critical needs at such
times of failure.
(b) System failure pertaining to incorrect programming: This is by far the most common
cause of operational risk events in an organisation, since each system can only function in the
manner it is set up. Organisations either build their own systems or buy them from specialised
service providers, and customise them. In either case, depending on the nature of transactions
required to be processed, a very detailed business requirement document is required to be given
to the technology department by the business user groups. Often, either due to incapability or poor
co-ordination between the business user groups, the requirement document does not capture the
entire detailing and the extremely granular details that are required by the technical teams doing
the coding, customisation or the deployment. The result is a poorly executed system that causes
errors in processing, which may have financial, regulatory, fraud risks, depending on kind of error
in the system.
For example, taking an example of a lending institution that processes loan applications on a
particular Loan Originating System and a Loan Management System the following scenarios
indicate how errors of programming can cause severe operational risk failures:
• Processing fees or interest not being charged correctly to the loan account correctly,
resulting in financial loss and / or customer disputes;
• Hands-off between different control owners may be compromised if the system workflow
is not properly defined on the system; for example, an application that requires specific
fraud risk checks on documents supplied by customer, may totally bypass the required
check and go from sales to credit department, thus exposing the organisation to fraud
risk. Or, an application may get processed with incorrect customer data, credit bureau
information basis the credit parameters set in the system. The coding of acquisition
scorecards in the financial lending industry is a typical example of a very sensitive area
where technology risk is the cause of operational risk.
Taking an example from manufacturing,
• A software error in parameterizing the right quantity of one raw material to flow into an
automated assembly line may result in a completely wasted production output thereby
causing an operational loss;
• Another industry-agnostic example is wrong master maintenance of taxation rates in any
business charging its customers can lead to a non-compliance in taxation requirements.
(c) Master maintenance: All systems, besides the basic coding, need a set of Masters which
are user-defined parameters that enable the processing of the data. Master configuration is in itself
a key risk that technology users face, since the linkages between products or service programs as
defined by the business users can be ambiguous, or at times contradictory instructions go to the
technology team resulting in erroneous set up of Masters.
(d) User access control: This is by far the most key control in driving controls in an automated
controls environment. For example, in a lending institution, a credit officer if allowed to process
operational activities beyond his job role may result in compromise of the segregation of duties
that the process is designed with; or, if an user may have a higher level of access to changing
customer data by one modification, while the process may require an authorisation which was
bypassed due to inadequate user access control maintenance. User access control requires the
user profiles to be set up properly upfront in the initial basic programming, followed by correct
assignment of user profiles upon employee requests as per their permissible authorities basis their
job role. Organisations are required to delete or modify user IDs once employees move out from
their roles or the organisation itself.
(e) Accounting systems: From an audit and accounting perspective, the most intensive focus
area is the technology platform that is used for accounting. There are obvious operational risks of
misstatements in financial reporting if the accounting software is not configured properly. In
complex organisations with several types of transactions that have a financial impact are
performed in various systems, the feed in from other production systems (i.e. outside of the main
accounting system) are very important to check for accuracy since they are used in financial
reporting. The feeds, if manual have their own risk of incorrect manual processing; in automated
feed process also, there are risks of incorrect data inflows that could lead to financial
misstatements. In lending institutions, the loan management systems are different from the main
accounting system; a huge amount of data, at various frequencies, flows into the accounting
system. The linkage of the source system to the correct GLs in accounting system, and
appropriate reconciliations, the exception reports, analysis and ongoing supervisory reviews can
prevent the data from being inconsistent in final reporting. Any regular exceptions in the data in
two systems, need to be analysed to find out the root cause of the technological reason, and any
incorrect programming. Examples are the data of customers like interest due, principal
outstanding, overdue amounts etc. which flow from loan management systems to accounting
systems.
(f) Change management is a key area of Information Technology General Controls (ITGC). It
simply means that any change to the systems can cause a risk of incorrect change being
developed or deployed. This can be a result of multiple causes:
• Change being carried out without approvals of authorised roles,
• Change being wrongly conceived by the user groups, without adequate analysis of pros
and cons for the change, and getting deployed by the technology unit under approvals
well as from an operational perspective otherwise the seamless functioning of the systems can be
disrupted.
(c) Keyman risk due to death or incapacitation of key decision makers in a company leading to
chaos in management of the company;
(d) Failure of one department or function to do their assigned tasks in a case of disruption may
cause the entire process to delivery of the organisation;
(e) In current business scenario, several organisations concentrate their operational activities in
one major operational hub; these organisations are at a higher BCP risk than the ones with
operations in several hubs if they are geared to support each other in a moment of crisis.
Common examples of critical disruption in business process are:
• Raw material in process being lost or spoilt due to one of the processes being disrupted
due to system, people or process failure, i.e. operational reasons;
• Contractual financial obligations such as repayment of loans, or vendor payments,
salaries,
• Payment of taxes;
• Inability to disbursement of loans that causes customer dissatisfaction;
• In an ITES company, the principal (i.e. the main organisation that hires an ITES
company) may have complete disruption of their services to their customers in case of
failure in the ITES service provider’s services;
• In fact in highly developed economies, the risk of customer’s dissatisfaction, the highest
form of which takes class lawsuits, is high in case of large scale business process
failures;
Hence a Business Continuity Plan (“BCP”) is required to be adopted.
BCP is now an evolved, objective framework and involves a large section of the organisation,
including the operational risk management framework.
Now we shall discuss the key constituents of a BCP one by one.
9.1 Business Impact Analysis (BIA)
This refers to the impact that a business disruption has on all activities in an organisation; this is
the base line from which an organisation can build its BCP.
All departments of the organisation are required to list all their processes (including sub-
processes) and grade them in order of priority. This is a difficult task, since most organisations like
to believe all their processes are critical; but in reality, with limited resources in a disruption
situation, the best that can be done are the most important activities; hence parameters of
prioritisation are to be fixed; these could be as follows:
Impact: Critical, Important, Routine; the classification into each of these could be done on the
basis of some objective parameters such as whether it affects regulatory violations, or can cause
financial loss, or loss to lives or property; for instance, in a lending institution, a process that does
due diligence on customer identity and address (KYC checks) may be very critical and
indispensable without which a sanction cannot happen since it is a regulatory risk; or a case where
a secondary check on the sanction is dispensed with in given sanctions, where a financial loss can
happen. These are carefully evaluated parameters that the management has to consider and take
a decision on what processes to keep running in disruption situation and what to stop.
Also, what is considered as important but not critical for a department, may be critical for another
department; for instance, treasury may feel making payment to external lenders as most critical
while making payments to operations or finance departments for making disbursements to loan
customers or vendors as not critical; however, the operations or finance departments may be
severely inconvenienced if the money to service their obligations is not made available in a
disruptive situation. Thus, a categorisation of Impact is done with collaborative approach of all
departments that a process impacts.
In summary,
A BIA must ideally cover following aspects:
• Minimum % that the process must continue to run in BCP scenario (say 10 %, 50 % etc.
of original volume / workload),
• Minimum resourcing required to carry it out,
• Maximum permissible time to allow a task to be not performed (Recovery Time)
• Category of impact due to disruption (customer impact, regulatory impact, financial loss
or risk to employee health and life),
• Deriving the criticality from these parameters (including consideration for normal days
and month-ends),
• Minimum technological and infrastructural requirements in the BCP site.
• This exercise will lead to decisions on which processes / activities need to be covered
under BCP on priority, and which can be scoped out (and for how long).
9.2 Functional Recovery Plan (FRP)
Here, once the BIA is approved at management level, a detailed plan as to alternate functioning of
the selected processes / sub-processes has to be made. This by far is the most challenging phase
since it involves alternative resources, staffing, infrastructure and maybe technology systems as
well. Depending on the complexity and nature of services provided by an organisation, each
organisation must decide the steps to be taken;
For example: an operations intensive company may decide to use an alternative, smaller hub to
process all key transactions; a customer service centric company may have an alternative
customer service centre if the main one is down due to disruption;
Roles identified as key in running a FRP in execution, are required to have formal backups in case
they cannot move locations or carry out the required operation from their base location or site.
Companies resort to several tech savvy solutions such as work-from-home facilitated by remote
logging in to systems, webinars, video conference, telephonic conference bridges, and use of
secured-data-storage such as cloud.
An FRP has to consider the key elements involved in the alternate plan; whether it is movement of
goods, or movements of information, or paper-based files; any plan is successful only if the
practical constraints of the Plan are clearly elucidated, thereby objectively listing the conditions in
which the FRP would function, and when it cannot.
A FRP is a very detailed document that would list the following at a minimum:
• Site in which the process would be carried out (called the Alternate Site), the role/s who
would carry it out, the back-up to the roles if the primary one is unable to perform in
disruptive circumstances; the minimum resources such as telephones, internet, printers
or access to intranet, internal systems etc. as an indicative list.
• This needs to be documented and circulated, and reiterated to each employee and/or
service provider who is involved in the FRP. Operational risk managers are required to
oversee whether the framework is composite and integrated sufficiently to ensure the
framework is real and practically implementable, not a drawing board theory document.
• The names and contacts of all key members in each process need to be listed and
available to all others involved in FRP , in a domain other than the primary office domain
so that the communication lines are not disrupted when it is required to invoke a FRP.
This communication plan is commonly known as a Call Tree.
• The FRP is useful and practical only if tested regularly, maybe at predefined periodic
intervals, as well as unannounced situations to mirror a real disruption. This is the critical
stage where theory is tested in practice, and the ensuring failures and successes have to
be documented to improve the Plan in future. An organisation has to ensure this is a
recurring process to be able to give confidence to investors/promoters/owners,
management, and customers that the FRP is practical and genuinely addresses the
critical tasks.
In an effective BCP, the concern on outsourced activities need to be addressed too; in current
scenario where several organisations use outsourced vendors, the vendor’s BCP has to reviewed
periodically to ensure the whole process works. In fact the choice of a vendor should ideally cover
the BCP aspects too.
An auditor / consultant working on internal controls or an operational risk manager needs to review
the efficacy of the organisation’s BCP, in context of the services it provides. For example, even a
small scale audit firm may need a BCP to ensure its services to the clients are not disrupted. In
large complex manufacturing organisations the BCP needs to be a major framework that co-
ordinates the interrelationships of various business units, locations, business processes etc.
It is highly advisable to have a formal decision making committee of management functions to
oversee the entire chain of activities from formation of BCP policy, Business Impact Analysis,
Functional Recovery Plan and to review Test results.
It is recommended to have an internal audit scoped for technology and information security by
teams that have technology assessment competence.
Most organisations do have a Code of Conduct that has a significant section on confidentiality and
protection of data, broadly covering information security aspects. This is further enabled by
mandatory training by the employees depending on their roles and exposure.
Unlicensed activity
Money laundering
Product Flaws Product defects (unauthorised etc.)
Model errors
Selection, Failure to investigate client as per
Sponsorship, guidelines
and Exposure Exceeding client exposure limits
Advisory Disputes over performance of
activities advisory activities
Damage to Losses from Disasters and Natural disaster losses, human losses
physical physical assets other events from external events like terrorism
assets damage either
intentional or from
natural disaster
Business Losses arising Systems Hardware, software,
Disruption and from disruption of telecommunications, utility
System business or disruptions/outage
Failures system failures
Execution, Losses from Transaction Miscommunication, Data entry,
Delivery and failed capture, maintenance or loading error,
Process transactions execution, and Missed deadline/ responsibility
Management processing or maintenance Model/ system mis-operation
process
Accounting error
management
Delivery failure
Collateral management failure
Reference data maintenance,
Other task mis-performance
Monitoring and Failed mandatory reporting obligation
reporting Inaccurate external report (loss
incurred)
Customer Client permissions/disclaimers
intake and missing; Legal documents
documentation missing/incomplete
Customer/client Unapproved access given to accounts
account Incorrect client records leading to loss
management Negligent loss or damage of client
assets
Trade Non-client counterparty mis-
counterparties performance / disputes
For example, an excess full and final settlement payment to an exiting employee, would have been
booked under Salaries by normal course. But once the error is discovered, it is advisable to book it
in a separate Operational Loss GL and credit the Salaries GL so that the financial reporting is
appropriate. Further in a lending institution, if a loan is closed erroneously, the entire principal and
other heads’ outstanding is a real financial loss to the organisation; these need to be booked in the
operational loss GL and the respective other GLs be credited with the amounts.
Some organisations book Fraud Losses in the Operational Loss GL (since fraud losses are also
part of operational losses as per categorisation elaborated above), but some organisations
maintain a separate GL for Fraud losses, so as to enable efficient reconciliation with other
reporting requirements like Fraud reports to regulators and to track action taken against them.
In instances where a recovery of the loss is expected, the management is expected to track the
event till its logical end by recovering whatever is possible thereby reducing the net operational
loss.
12.3 Reporting
A report to the ORMC (and to the Board / Board Committee as may be necessary by regulation or
by company policy) is recommended to include the following:
Date of Date of Event Financial Event Recovery Action Event
incident reporting description loss category if any taken closed /
including further
root action
causes due
The convergence of the secular trends of exponential growth in data volume, concomitant
geometric increase in computational capacity and the resultant development of sophisticated
algorithms is fuelling rapid technology advances and business disruptions. The field of risk
management is not immune to these changes and we are witnessing significant changes in the
discipline.
13.1 Machine Learning
A standard software code is characterized by explicit rules that a computer is supposed to perform.
In case, there is a change in the data / situation, a programmer needs to change these explicit
rules. In contrast, a machine learning program dynamically responds to change in data / situation
by changing the rules that govern the behaviour.
Machine learning, meanwhile, uses an inductive approach to form a representation of the world
based on the data it sees. It is able to tweak and improve its representation as new data arrive. In
that sense, the algorithm “learns” from new data inputs and gets better over time.
Techniques such as regression, support vector machines, and k-means clustering have been in
use for decades. Others, while developed previously, have become viable only now that vast
quantities of data and unprecedented processing power are available. Deep Learning and
Reinforcement learning are good example of newly developed machine learning techniques.
At the most basic level, machine learning techniques can be divided into two primary groups:
• Supervised Learning
• Unsupervised Learning
Supervised Learning refers to the statistical analysis that aims to map the behaviour of a certain
variable on the basis of some other variables. The principal aim of these methods is to fit a model
that relates the set of independent variables to the dependent variable. The model in turn is
largely used for future prediction of better understanding of the relationship between the
independent and dependent variables. Bulk of the machine learning methods such as linear
regression, logistic regression, boosting, and support vector machines operate in the supervised
learning domain.
Unsupervised Learning, as the name suggests, refers to statistical methods that aim to delve into
the challenging realm of data that has no dependent or response variable i.e. there is no variable
that supervises the behaviour of the algorithm. The primary aim of this kind of analysis is to
understand the relationships between the variables or between the observations. One statistical
learning tool that we may use in this setting is cluster analysis, or clustering.
Machine Learning methods can also be categorized on the basis of the nature of the variables
handled. Regression methods primarily deal with variables that are quantitative in nature e.g. a
person’s age, height, or income, the value of a house, and the price of a stock. In contrast,
Classification methods deal with qualitative variables i.e. variables that take on values in one of K
different classes, or categories. Examples of qualitative class variables include a person’s gender
(male or female), the brand of product purchased (brand A, B, or C), whether a person defaults on
a debt (yes or no), or a cancer diagnosis (Acute Myelogenous Leukemia, Acute Lymphoblastic
Leukemia, or No Leukemia).
13.2 Analytics – Risk Management Applications
Risk management faces new demands and challenges. In response to the crisis, regulators are
requiring more detailed data and increasingly sophisticated reports. Banks are expected to
conduct regular and comprehensive bottom-up stress tests for a number of scenarios across all
asset classes. Big Data technologies present fresh opportunities to address these challenges.
Vast, comprehensive and near real-time data has the potential to improve monitoring of risk, risk
coverage, and the stability and predictive power of risk models. In a number of key domains –
particularly operational and compliance risk – Big Data technologies will allow the development of
models that will support every day.
Post-crisis, financial institutions are now expected to have thorough knowledge of their clients.
Increasingly, forward-thinking banks harness Big Data to develop more robust predictive indicators
in the credit risk domain. New data sources - including social media and marketing databases –
are being used to gain greater visibility into customer behaviour. This information can augment
traditional data sources including financial, socio-demographic, internal payments and externals
loss data.
Together, the data sets can produce a highly robust, comprehensive risk indicator. Rather than
waiting to review loan clients’ financial reports to discover loan-servicing problems, firms can
utilise Big Data technologies to detect early warning signals by observing clients’ on-going
behaviours, and act in time.
The high cost of money laundering cases has prompted banks to seek new ways to address the
severe limitations in current anti-money laundering risk management. Traditional approaches to
anti money laundering remain dependent on rule-based, descriptive analytics to process structured
data. This system clearly has limitations - without automated algorithms, detecting information
within the wealth of data requires laborious keyword searches and manual sifting through reports.
Big Data analytics can improve the existing processes in AML operations. Its approaches allow for
the advanced statistical analysis of structured data, and advanced visualisation and statistical text
mining of unstructured data. These approaches can provide a means to quickly draw out hidden
links between transactions and accounts, and uncover suspicious transaction patterns. Advanced
analytics can generate real-time actionable insights, stopping potential money laundering in its
tracks, whilst still allowing fund transfers for crucial economic and human aid to troubled regions.
Big data technologies can identify incidents, help draw a wider picture, and allow a bank to raise
the alarm before it’s too late.
14. INSURANCE
Insurance is used by organisations to mitigate operational risks that can be insured. Insurance
coverage is commonly available for risks arising out of fire, for instance. Depending on the cover
available and opted for, other losses due to terrorist attacks, natural disasters etc. can also be
covered. Cash transit insurance and fidelity insurance are off quoted examples.
These three examples are based on loss categories of Damage to Assets, External fraud and
Internal fraud. Recently a new concept of Cyber risk insurance has also come up, and there are
companies offering cover against the risk of damages due to lawsuits / compensation on account
of being a victim of cyber-attack, due to which data of customers, vendors or any other counter-
party can be leaked to an unauthorised, malevolent entity.