{"id":1780,"date":"2004-11-24T00:00:00","date_gmt":"2004-11-24T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/11\/24\/companies-dig-deep-for-ethics-compliance\/"},"modified":"2021-12-30T11:39:58","modified_gmt":"2021-12-30T11:39:58","slug":"companies-dig-deep-for-ethics-compliance","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/11\/24\/companies-dig-deep-for-ethics-compliance\/","title":{"rendered":"Companies dig deep for ethics compliance"},"content":{"rendered":"<p>Businesses are spending more money to ensure compliance with ethics regulations such as the Sarbanes-Oxley Act, but they don&#8217;t always know what those dollars are accomplishing, a new study shows.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over the next two years, more than half of U.S. and European multinational companies expect to boost their spending on compliance by 23 percent, according to a new survey of business executives by management consultant PricewaterhouseCoopers.<\/p>\n<p>Nearly all respondents said they plan to make improvements to their company&#8217;s compliance efforts, with the average expenditure rising 9.9 percent.<\/p>\n<p>But 44 percent of senior executives said their companies do not have a clear view of its total compliance spending.<\/p>\n<p>Even at companies that do say they have a clear view, executives likely aren&#8217;t accounting for other costs, such as those for remediation, penalties, fines, lost revenue and lost management time.<\/p>\n<p>Thirty-two percent of executives described their compliance programs as &#8220;very efficient,&#8221; while 59 percent rated their programs as &#8220;somewhat inefficient.&#8221;<\/p>\n<p>The Sarbanes-Oxley Act, passed in 2002, is designed to prevent financial malpractice and accounting scandals.  A key provision of the law, Section 404, which took effect Nov. 15, requires publicly traded companies to put in place controls over the flow of financial information.<\/p>\n<p>&#8220;Companies are spending significant sums of money&#8211;even more than they realize&#8211;in order to improve compliance effectiveness and efficiency, but executives are finding that they are not receiving the return on investment they expected,&#8221; Dan DiFilippo, head of governance and compliance issues at PricewaterhouseCoopers, said in a statement.  &#8220;The risks are just too great for companies to operate with ineffective compliance programs.&#8221;<\/p>\n<p>External requirements and regulations account for 74 percent of total compliance costs, according to the survey.<\/p>\n<p>U.S. multinationals spend a higher percentage on external requirements than their European counterparts, while European companies spend a higher percentage on compliance with internal guidelines, including ethics rules, codes of conduct and risk management rules.  In the United States, compliance with Sarbanes-Oxley regulations accounts for 54 percent of total compliance spending.  In Europe, that figure is 12 percent.<\/p>\n<p>http:\/\/news.com.com\/Companies+dig+deep+for+ethics+compliance\/2100-1014_3-5465982.html?part=rss&#038;tag=5465982&#038;subj=news.1014.5<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1780","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1780","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1780"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1780\/revisions"}],"predecessor-version":[{"id":4267,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1780\/revisions\/4267"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1780"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1780"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1780"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}