SlideShare a Scribd company logo
1 of 44
Risk Management
Mouse ‘Click’ to move on to the next slide Next What is Risk Management? Who uses Risk Management? How is Risk Management used? Risk Management in Customs How do you use it in Customs?
[object Object],[object Object],[object Object],[object Object],[object Object],Mouse ‘Click’ to move on to the next slide Next What is Risk Management?
[object Object],Mouse ‘Click’ to move on to the next slide Next What is Risk Management?
[object Object],Mouse ‘Click’ to move on to the next slide Next What is Risk Management?
[object Object],[object Object],Next Who uses Risk Management? ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],Next Who uses Risk Management?
[object Object],Next Who uses Risk Management?
[object Object],How is Risk Management used? Next There are   7   steps in the RM  process
[object Object],Next Establish the context Identify the risks Analyse the risks Evaluate the risks Treat the risks
[object Object],Next Communication & consultation Monitoring and review and
[object Object],Next The strategic and organisational context in which risk management will take place. For example, the nature of your business, the risks inherent in your business and your priorities. Communicate & consult Establish the context
[object Object],Next Communicate & consult Monitor and review ,[object Object],[object Object],[object Object],Identify the risks
[object Object],Next Communicate & consult Monitor and review Analyse the risks How likely is the risk event to happen?  (Probability and frequency?) What would be the impact, cost or consequences of that event occurring?  (Economic, political, social?)
[object Object],Next Communicate & consult Monitor and review Evaluate the risks Rank the risks according to management priorities, by risk category and rated by likelihood and possible cost or consequence. Determine inherent levels of risk.
[object Object],Next Treat the risks ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],Next Document your risk management plan and describe the reasons behind selecting the risk and for the treatment chosen. Record allocated responsibilities, monitoring or evaluation processes, and assumptions on residual risk. Communicate & consult Monitor and review Treat the risks
[object Object],Next Communicate & consult Risk Management policies and decisions must be regularly reviewed. Monitor and review In identifying, prioritising and treating risks, organisations make assumptions and decisions based on situations that are subject to change, (e.g., the business environment, trading patterns, or government policies).
[object Object],Next Risk Managers must monitor activities and processes to determine the accuracy of planning assumptions and the effectiveness of the measures taken to treat the risk. Methods can include data evaluation,  audit, compliance measurement. Communicate & consult Monitor and review
[object Object],Next Establish the context Identify the risks Analyse the risks Evaluate the risks Treat the risks Monitoring and review Communication & consultation
[object Object],[object Object],[object Object],Next Risk Management in Customs
[object Object],[object Object],[object Object],[object Object],Next Risk Management in Customs
[object Object],Next Risk Management in Customs Strategic:   Risks to  Customs goals and objectives,  e.g.,prohibitions and  restrictions, (social or  economic), health, revenue, environment. - usually longer term strategies
[object Object],Next Risk Management in Customs Operational:   Decisions and action plans on measures taken to deal  with the assessed risks. Deployment of resources;  monitoring and review.   - medium term strategies
[object Object],Next Risk Management in Customs Tactical:   Used by officers at their workplace,  to deal with immediate  situations, working within set parameters and to approved procedures. - short term strategies
[object Object],[object Object],[object Object],Next Risk Management in Customs Why you should use Risk Management:
[object Object],Next Risk Management in Customs Why you should use Risk Management:
[object Object],Next How do you use it in Customs? ,[object Object],[object Object],[object Object],[object Object]
Next How do you use it in Customs? ,[object Object],[object Object],[object Object],[object Object],[object Object],Where does the information come from? Who does this?
[object Object],Next ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],Next ,[object Object],[object Object],[object Object]
[object Object],Next ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],What is the consequence if the risk event occurs? ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],Next You need to describe or to quantify exactly what the ‘Likelihood’ and ‘Consequence’ terms means to you.   This helps in ensuring a consistent approach in future risk assessment and review and monitoring. It promotes a common understanding within the Administration.
[object Object],Next After establishing ‘ Likelihood ’ and ‘ Consequence ’ you can use a table like this to set a level of risk.   You must define what these risk levels mean to you. Extreme Very high Moderate Low Negligible Almost certain Severe Severe High Major Moderate Likely Severe High Major Significant Moderate Moderate High Major Significant Moderate Low Unlikely Major Significant Moderate Low Very low Rare Significant Moderate Low Very low Very Low
[object Object],Next Low and very low level risks can normally be accepted, subject to on-going monitoring.   All other risks are included in the management plan. The plan catalogues the risks, the level of risk, and describes a treatment.  The treatment is the action proposed, (and perhaps the resources allocated).
[object Object],Next Targeted selections Development of   Risk Profiles Physical examination Industry audits Random examinations Compliance improvement
[object Object],Next A common method of treating risks is to develop  risk profiling and targeting systems . This means – in the case of goods – selecting transactions for specific checks, according to trader, agent, origin of goods, commodity code, duty rate, routing, value, etc.
[object Object],Next Risk Profiles  are developed as a means of putting risk management into practice at the Operational level. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],Next Using the profile information, consignments of goods, means of transport and people are targeted.  The profile information is used as the basis for  Selection Criteria. Documents received and processed by Customs, i.e., cargo and passenger manifests, goods declarations, are compared against the Selection Criteria Selection  Criteria
[object Object],Next Selections are made by manual checks of documents, or by using automated systems. Selected transactions or movements are subject to the actions detailed in the profile or plan, e.g., physical examination, audit, etc. Selection  Criteria Documents and Data Selected  movements
[object Object],Next The initial assessment made of the existence and level of risks must be evaluated on a regular basis. You need to measure the effectiveness of risk profiles and update as necessary. ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Next Using Risk Management
[object Object],[object Object],[object Object],[object Object],[object Object],Next Using Risk Management
End

More Related Content

What's hot

Adyen Pricing Overview (1)
Adyen Pricing Overview (1)Adyen Pricing Overview (1)
Adyen Pricing Overview (1)soundium
 
The Path to Open Banking
The Path to Open BankingThe Path to Open Banking
The Path to Open BankingMuleSoft
 
CIRCUIT 2015 - Akamai: Caching and Beyond
CIRCUIT 2015 - Akamai:  Caching and BeyondCIRCUIT 2015 - Akamai:  Caching and Beyond
CIRCUIT 2015 - Akamai: Caching and BeyondICF CIRCUIT
 
KYC automation using artificial intelligence (AI)
KYC automation using artificial intelligence (AI)KYC automation using artificial intelligence (AI)
KYC automation using artificial intelligence (AI)EY
 
Cyber Security in The Cloud
Cyber Security in The CloudCyber Security in The Cloud
Cyber Security in The CloudPECB
 
Future Watch: China's fintech ecosystem update
Future Watch: China's fintech ecosystem updateFuture Watch: China's fintech ecosystem update
Future Watch: China's fintech ecosystem updateTeam Finland Future Watch
 
Beyond Passwords: FIDO and the Future of User Authentication
Beyond Passwords: FIDO and the Future of User AuthenticationBeyond Passwords: FIDO and the Future of User Authentication
Beyond Passwords: FIDO and the Future of User AuthenticationFIDO Alliance
 
Amazon: Strategic Management
Amazon: Strategic ManagementAmazon: Strategic Management
Amazon: Strategic ManagementFarhaad Sheikh
 
Digital 2019 South Korea (January 2019) v01
Digital 2019 South Korea (January 2019) v01Digital 2019 South Korea (January 2019) v01
Digital 2019 South Korea (January 2019) v01DataReportal
 
WSO2 Open Banking: Digital Transformation Through PSD2
WSO2 Open Banking: Digital Transformation Through PSD2WSO2 Open Banking: Digital Transformation Through PSD2
WSO2 Open Banking: Digital Transformation Through PSD2WSO2
 
The next 10 years in Fintech
The next 10 years in Fintech The next 10 years in Fintech
The next 10 years in Fintech Kantox
 
Webinar: The Future of FinTech: Insights for 2021 | Intellectsoft
Webinar: The Future of FinTech: Insights for 2021 | IntellectsoftWebinar: The Future of FinTech: Insights for 2021 | Intellectsoft
Webinar: The Future of FinTech: Insights for 2021 | IntellectsoftIntellectsoft
 
Mit cc turn into action - digital strategies banking v march2012-
Mit cc turn into action - digital strategies banking v march2012-Mit cc turn into action - digital strategies banking v march2012-
Mit cc turn into action - digital strategies banking v march2012-Claire Calmejane
 
How Banking as a Service Will Keep Banks Digitally Relevant and Growing
How Banking as a Service Will Keep Banks Digitally Relevant and GrowingHow Banking as a Service Will Keep Banks Digitally Relevant and Growing
How Banking as a Service Will Keep Banks Digitally Relevant and GrowingCognizant
 
淺談Fintech(1).ppt
淺談Fintech(1).ppt淺談Fintech(1).ppt
淺談Fintech(1).pptChris Chang
 
Tracxn Hyperlocal Delivery Landscape - July 2015
Tracxn  Hyperlocal Delivery Landscape - July 2015Tracxn  Hyperlocal Delivery Landscape - July 2015
Tracxn Hyperlocal Delivery Landscape - July 2015Tracxn
 
Open Banking Report Executive Summary
Open Banking Report Executive SummaryOpen Banking Report Executive Summary
Open Banking Report Executive SummaryMEDICI Inner Circle
 

What's hot (20)

Adyen Pricing Overview (1)
Adyen Pricing Overview (1)Adyen Pricing Overview (1)
Adyen Pricing Overview (1)
 
The Path to Open Banking
The Path to Open BankingThe Path to Open Banking
The Path to Open Banking
 
CIRCUIT 2015 - Akamai: Caching and Beyond
CIRCUIT 2015 - Akamai:  Caching and BeyondCIRCUIT 2015 - Akamai:  Caching and Beyond
CIRCUIT 2015 - Akamai: Caching and Beyond
 
KYC automation using artificial intelligence (AI)
KYC automation using artificial intelligence (AI)KYC automation using artificial intelligence (AI)
KYC automation using artificial intelligence (AI)
 
Cyber Security in The Cloud
Cyber Security in The CloudCyber Security in The Cloud
Cyber Security in The Cloud
 
Future Watch: China's fintech ecosystem update
Future Watch: China's fintech ecosystem updateFuture Watch: China's fintech ecosystem update
Future Watch: China's fintech ecosystem update
 
BharatPe
BharatPeBharatPe
BharatPe
 
Beyond Passwords: FIDO and the Future of User Authentication
Beyond Passwords: FIDO and the Future of User AuthenticationBeyond Passwords: FIDO and the Future of User Authentication
Beyond Passwords: FIDO and the Future of User Authentication
 
Amazon: Strategic Management
Amazon: Strategic ManagementAmazon: Strategic Management
Amazon: Strategic Management
 
Digital 2019 South Korea (January 2019) v01
Digital 2019 South Korea (January 2019) v01Digital 2019 South Korea (January 2019) v01
Digital 2019 South Korea (January 2019) v01
 
WSO2 Open Banking: Digital Transformation Through PSD2
WSO2 Open Banking: Digital Transformation Through PSD2WSO2 Open Banking: Digital Transformation Through PSD2
WSO2 Open Banking: Digital Transformation Through PSD2
 
Banking and fintech
Banking and fintechBanking and fintech
Banking and fintech
 
The next 10 years in Fintech
The next 10 years in Fintech The next 10 years in Fintech
The next 10 years in Fintech
 
Webinar: The Future of FinTech: Insights for 2021 | Intellectsoft
Webinar: The Future of FinTech: Insights for 2021 | IntellectsoftWebinar: The Future of FinTech: Insights for 2021 | Intellectsoft
Webinar: The Future of FinTech: Insights for 2021 | Intellectsoft
 
Mit cc turn into action - digital strategies banking v march2012-
Mit cc turn into action - digital strategies banking v march2012-Mit cc turn into action - digital strategies banking v march2012-
Mit cc turn into action - digital strategies banking v march2012-
 
Digital onboarding
Digital onboardingDigital onboarding
Digital onboarding
 
How Banking as a Service Will Keep Banks Digitally Relevant and Growing
How Banking as a Service Will Keep Banks Digitally Relevant and GrowingHow Banking as a Service Will Keep Banks Digitally Relevant and Growing
How Banking as a Service Will Keep Banks Digitally Relevant and Growing
 
淺談Fintech(1).ppt
淺談Fintech(1).ppt淺談Fintech(1).ppt
淺談Fintech(1).ppt
 
Tracxn Hyperlocal Delivery Landscape - July 2015
Tracxn  Hyperlocal Delivery Landscape - July 2015Tracxn  Hyperlocal Delivery Landscape - July 2015
Tracxn Hyperlocal Delivery Landscape - July 2015
 
Open Banking Report Executive Summary
Open Banking Report Executive SummaryOpen Banking Report Executive Summary
Open Banking Report Executive Summary
 

Viewers also liked

Viewers also liked (6)

Asp1
Asp1Asp1
Asp1
 
Heart, boem boem. 0.1
Heart, boem boem. 0.1Heart, boem boem. 0.1
Heart, boem boem. 0.1
 
Barra Google (1)
Barra Google (1)Barra Google (1)
Barra Google (1)
 
Informatica Esercizio 3
Informatica Esercizio 3Informatica Esercizio 3
Informatica Esercizio 3
 
What Is The Aids
What Is The AidsWhat Is The Aids
What Is The Aids
 
2006 232 4
2006 232 42006 232 4
2006 232 4
 

Similar to Risk

risk.ppt shrey vashistha.ppt
risk.ppt shrey vashistha.pptrisk.ppt shrey vashistha.ppt
risk.ppt shrey vashistha.pptUmangVashistha2
 
RISK MANAGEMENT.pptx
RISK MANAGEMENT.pptxRISK MANAGEMENT.pptx
RISK MANAGEMENT.pptxssuser107f14
 
Customs Risk Management PPT.Presentation
Customs Risk Management PPT.PresentationCustoms Risk Management PPT.Presentation
Customs Risk Management PPT.PresentationMrsRichards2
 
AbstractKey FeaturesAssessmentIntroductionMeasur.docx
AbstractKey FeaturesAssessmentIntroductionMeasur.docxAbstractKey FeaturesAssessmentIntroductionMeasur.docx
AbstractKey FeaturesAssessmentIntroductionMeasur.docxransayo
 
Risk Management.docx
Risk Management.docxRisk Management.docx
Risk Management.docxCPA Australia
 
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...PECB
 
Aswin kumar risk management
Aswin kumar  risk managementAswin kumar  risk management
Aswin kumar risk managementAswin kumar
 
Risk Management Process.ppt
Risk Management Process.pptRisk Management Process.ppt
Risk Management Process.pptUday Nayakwadi
 
An introduction to finance
An introduction to financeAn introduction to finance
An introduction to financeRobert Reed
 
Pm0016 set-1
Pm0016 set-1Pm0016 set-1
Pm0016 set-1Paul Hunt
 
Risk management osh
Risk management oshRisk management osh
Risk management oshjaycatubig
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk ManagementNikhil Soni
 
Risk Management - A Journey
Risk Management - A JourneyRisk Management - A Journey
Risk Management - A JourneyDebashis Gupta
 
Risk assessment
Risk assessmentRisk assessment
Risk assessmentHavio
 

Similar to Risk (20)

risk.ppt shrey vashistha.ppt
risk.ppt shrey vashistha.pptrisk.ppt shrey vashistha.ppt
risk.ppt shrey vashistha.ppt
 
RISK MANAGEMENT.pptx
RISK MANAGEMENT.pptxRISK MANAGEMENT.pptx
RISK MANAGEMENT.pptx
 
Customs Risk Management PPT.Presentation
Customs Risk Management PPT.PresentationCustoms Risk Management PPT.Presentation
Customs Risk Management PPT.Presentation
 
risk.ppt
risk.pptrisk.ppt
risk.ppt
 
risk.ppt
risk.pptrisk.ppt
risk.ppt
 
risk.ppt
risk.pptrisk.ppt
risk.ppt
 
risk.ppt
risk.pptrisk.ppt
risk.ppt
 
AbstractKey FeaturesAssessmentIntroductionMeasur.docx
AbstractKey FeaturesAssessmentIntroductionMeasur.docxAbstractKey FeaturesAssessmentIntroductionMeasur.docx
AbstractKey FeaturesAssessmentIntroductionMeasur.docx
 
Risk Management.docx
Risk Management.docxRisk Management.docx
Risk Management.docx
 
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
 
Risk analysis and risk mgt.
Risk analysis and risk mgt.Risk analysis and risk mgt.
Risk analysis and risk mgt.
 
Aswin kumar risk management
Aswin kumar  risk managementAswin kumar  risk management
Aswin kumar risk management
 
Risk
RiskRisk
Risk
 
Risk Management Process.ppt
Risk Management Process.pptRisk Management Process.ppt
Risk Management Process.ppt
 
An introduction to finance
An introduction to financeAn introduction to finance
An introduction to finance
 
Pm0016 set-1
Pm0016 set-1Pm0016 set-1
Pm0016 set-1
 
Risk management osh
Risk management oshRisk management osh
Risk management osh
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Risk Management - A Journey
Risk Management - A JourneyRisk Management - A Journey
Risk Management - A Journey
 
Risk assessment
Risk assessmentRisk assessment
Risk assessment
 

Risk

  • 2. Mouse ‘Click’ to move on to the next slide Next What is Risk Management? Who uses Risk Management? How is Risk Management used? Risk Management in Customs How do you use it in Customs?
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44. End