Risk management when concluding contracts - free course from the Russian School of Management, training, Date: December 7, 2023.
Miscellaneous / / December 09, 2023
Concluding an agreement is one of the important stages of a company’s activities. How to prepare for signing a document to minimize risks? Experienced teachers of the Russian School of Management have prepared a course that will help you gain the knowledge and skills necessary for this.
Expert practitioner in the field of corporate security. Has experience in developing and implementing comprehensive business protection systems from external and internal threats.
Organization of safe contractual work at the enterprise
• General principles of contractual work at the enterprise based on the requirements of the Civil Code of the Russian Federation and other legislation of the Russian Federation.
• Organization of contract work at the enterprise. Instructions for contract work. Delegation of powers in contractual work. Internal approval procedures. Distribution of competence and areas of responsibility between divisions of the enterprise in contractual work.
• Pre-contractual work at the enterprise. Assessing the reliability of the counterparty and the security of commercial offers. Drawing up a counterparty verification matrix based on the risks of civil relations.
• Tax risks in contract work. The concept of “due diligence” in disputes with tax authorities. Requirements of regulatory legal acts of the Federal Tax Service of Russia, according to independent assessment, of tax risks in civil legal relations.
• Corruption risks in contract work. Requirements of the legislation of the Russian Federation for enterprises to take measures to prevent and combat corruption. Anti-Corruption Charter of Russian Business. Resolving conflicts of interest.
• Risks of affiliation of enterprise employees with counterparties. Information-analytical and psychological methods of identifying connections. Fundamentals of operational psychology.
• Conducting effective and safe claims work. Non-payment monitoring. Mediation as a way of pre-trial dispute resolution. Psychological, legal and image methods of influencing the debtor.
• Fraud in contract work. Fraudulent schemes used in civil law relations. Fraud in various types of business. Procedures for relations with government regulatory and law enforcement agencies regarding cases of fraud.
• Arbitration proceedings as the most effective solution to the problem of debt collection. Competence and jurisdiction of arbitration courts. The difference between arbitration courts and state arbitration courts.
• Creation of effective internal control over contractual work at the enterprise.
Internal audits and investigations in labor relations
• The concept of investigation (inspection) and cases of their implementation at the enterprise. Formation of a local regulatory framework that allows the employer to control the actions of the employee and conduct an investigation (inspection).
• Grounds for conducting an investigation (inspection). Using feedback systems (helpline, secret shopper, etc.) to obtain information. Documentation of the decision to carry it out. Drawing up a matrix of implementation.
• Creation of a commission to conduct an investigation (inspection). Qualitative and quantitative composition of commissions. Interaction of commission members with enterprise departments and trade unions. Features of conducting investigations (inspections) in foreign organizations, holding structures, as well as territorially separate divisions.
• Compliance with the constitutional rights of workers, as well as the legislation of the Russian Federation during the investigation (inspection). Consent to the processing of personal data. Interaction with lawyers hired by employees to protect their interests.
• Use of a polygraph (lie detector) during an investigation (check). Legal regulations for its use. Application of psychoprobing methods. Methods to counteract the polygraph.
• Estimation of the cost of damage during the investigation (inspection). Bringing the employee to financial responsibility.
• Use of evidence obtained from technical safety and security equipment, as well as IT systems in the process of conducting an investigation (inspection). Conducting an examination of the authenticity of records and documents.
• Use of external consultants during the investigation (inspection) process.
• Methods for conducting an investigation (inspection) for gross violations that are grounds for dismissal of an employee for negative reasons.
• Features of conducting an investigation (inspection) for violations of compliance procedures and the requirements of anti-corruption legislation. Analysis of situations related to conflict of interest. Investigation into “intrapreneurship.”
• Methods for conducting an investigation (verification) into cases of theft or misappropriation of material assets by an employee.
• Corporate fraud and methods for its investigation. The concept of legal and non-legal fraud.
• Methods for conducting investigations (inspections) into violations of enterprise information security. Investigation of situations related to the disclosure of commercial and other secrets protected by law.
• Inventory procedures. Features of conducting investigations in case of embezzlement, as well as evidence of guilty actions in the event of loss of confidence in financially responsible persons.
• Documentation of the results of the investigation (inspection). Formation of a list of cases.
• Interaction with government law enforcement agencies when investigating illegal actions of employees. Judicial practice of holding workers accountable.
Collection and analysis of information when assessing the reliability of counterparties
• External threats to enterprise security. Modern methods of unfair competition and ways to counter them. A general definition of the concepts “threat” and “external threat” from the point of view of enterprise security. The main external threats to enterprise security. Modern methods of unfair competition. The main ways to counteract unfair competition methods.
• Determining the possibility of negative consequences and their neutralization. Main types of negative consequences. Basic methods of neutralizing negative consequences.
• Business intelligence as a tool for achieving competitive advantage. Regulatory and legal framework for functioning. Sources of information when conducting business intelligence. "Business Intelligence" and "Competitive Advantage". The main goals and objectives of business intelligence. Business intelligence as a tool for competitive advantage. Regulatory and legal framework for functioning. Sources and methods of obtaining information when conducting business intelligence.
• The place of business intelligence in a comprehensive enterprise security system. Technical means of conducting business intelligence. Functional model of a typical security system. Technical means of conducting business intelligence.
• “Competitive wars”: strategy and tactics for survival in the market. Commercial espionage in modern conditions: subjects of conduct, methods and techniques of access to closed sources of information. Methods for identifying and localizing consequences. "Competitive wars", "strategy" and "tactics". Strategy and tactics for survival in the market, from the point of view of the security system. “Espionage” and “commercial espionage” Subjects of commercial espionage. The main ways to access closed sources of information. Basic methods for detecting acts of commercial espionage. Basic methods of localizing commercial espionage attacks.