Does your organization need a CCO?

Find out how tackling compliance -- particularly when regulations share common goals -- can be made easier by charging a corporate compliance officer (CCO) with oversight responsibility.

In an increasingly regulated world where laws cover a widening range of public and private entities, complying

with overlapping regulations is a challenge. The good news is that tackling compliance -- particularly when regulations share common goals -- can be made easier by charging a corporate compliance officer (CCO) with oversight responsibility.

The CCO is the focal point for regulatory compliance. It is that person's job to learn what is expected of the organization and ensure that appropriate steps are taken to comply with regulations. This is akin to legal counsel and risk management roles, since the CCO helps the organization avoid legal risks associated with failure to comply.

The CCO may develop a superstructure over discrete programs such as an information security program, a privacy program and a financial controls program. Similar to an internal audit function, the CCO needs to ensure that those programs are effective by establishing compliance oversight processes. Through those processes, the CCO periodically evaluates the effectiveness of the underlying programs.

Compliance is comprised of administrative, physical and technical processes including: policies, procedures, documented roles and responsibilities, training, technical tools and physical controls. The intent of the resulting ongoing processes is to demonstrate compliance with relevant regulations. Typically, someone other than the CCO develops these processes. For example, information security program processes are the domain of the ISO and privacy processes are the domain of the Privacy Officer. It is the CCO's responsibility to ensure that such processes are in place to address each regulatory requirement and ensure that they are functioning adequately. From the perspective of information security, the CCO should be a strong ally for the CISO and bring clout to an organization's security program.

The CCO position should have a sufficiently visible spot on the organization chart so that his or her authority matches the position's responsibility. The CCO's key responsibilities include:

  • Staying current with new and updated regulations. These may include state and federal laws, as well as industry-based accreditation requirements.

  • Developing and maintaining a repository of regulations and the organization's compliance status. This provides a quick snapshot and a valuable reference document. When new regulations emerge, this tool can identify any overlap with pre-existing regulations.

  • Understanding how each regulation affects the organization and explaining the impact of non-compliance to leadership.

  • Developing cooperative relationships with those charged with implementation, such as the ISO and the Privacy Officer.

  • Developing documented and repeatable evaluation processes to verify that underlying controls are adequate to meet requirements.

  • Periodically performing evaluations and reporting outcomes to senior management.

  • Developing processes for the workforce to report non-compliance issues to the CCO and how the CCO will respond to those issues.

  • Reporting compliance deficits and lapses to senior management and ensuring they are remedied.
An effective CCO is a great asset to the CISO and the information security program. The CISO can make a case for this position as an added layer of protection for the organization. The CCO brings a fresh perspective to security and other regulatory controls and may spot program opportunities or weaknesses that the CISO is too close to see.

About the author
Kate Borten is president and founder of The Marblehead Group, Inc. She led the first corporate-wide information security program at Massachusetts General Hospital, and she is the former Chief Information Security Officer at CareGroup, a major healthcare system based in Boston. Ms. Borten is a nationally-recognized expert on HIPAA and health information privacy and security, and a frequent speaker on the topic. She is a contributing author to Auerbach Publications' Information Security Management Handbook; author of HIPAA Security Made Simple (HCPro, Inc. 2003) and Guide to HIPAA Security Risk Analysis (HCPro, Inc. 2004); contributor to newsletters on HIPAA privacy and security; and three-year chair of HealthSec, the premier annual conference on information security in healthcare.

This was first published in August 2005

Dig deeper on Data Privacy and Protection

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close