University certificate
The world's largest school of business”
Why study at TECH?
Master all sales processes in the pharmaceutical industry and boost your career with TECH"
Why Study at TECH?
TECH is the world's largest 100% online business school. It is an elite business school, with a model based on the highest academic standards. A world-class center for intensive managerial skills education.
TECH is a university at the forefront of technology, and puts all its resources at the student's disposal to help them achieve entrepreneurial success"
At TECH Global University
Innovation |
The university offers an online learning model that balances the latest educational technology with the most rigorous teaching methods. A unique method with the highest international recognition that will provide students with the keys to develop in a rapidly-evolving world, where innovation must be every entrepreneur’s focus.
"Microsoft Europe Success Story", for integrating the innovative, interactive multi-video system.
The Highest Standards |
Admissions criteria at TECH are not economic. Students don't need to make a large investment to study at this university. However, in order to obtain a qualification from TECH, the student's intelligence and ability will be tested to their limits. The institution's academic standards are exceptionally high...
95% of TECH students successfully complete their studies.
Networking |
Professionals from countries all over the world attend TECH, allowing students to establish a large network of contacts that may prove useful to them in the future.
100,000+ executives prepared each year, 200+ different nationalities.
Empowerment |
Students will grow hand in hand with the best companies and highly regarded and influential professionals. TECH has developed strategic partnerships and a valuable network of contacts with major economic players in 7 continents.
500+ collaborative agreements with leading companies.
Talent |
This program is a unique initiative to allow students to showcase their talent in the business world. An opportunity that will allow them to voice their concerns and share their business vision.
After completing this program, TECH helps students show the world their talent.
Multicultural Context |
While studying at TECH, students will enjoy a unique experience. Study in a multicultural context. In a program with a global vision, through which students can learn about the operating methods in different parts of the world, and gather the latest information that best adapts to their business idea.
TECH students represent more than 200 different nationalities.
Learn with the best |
In the classroom,TECH’s teaching staff discuss how they have achieved success in their companies, working in a real, lively, and dynamic context. Teachers who are fully committed to offering a quality specialization that will allow students to advance in their career and stand out in the business world.
Teachers representing 20 different nationalities.
TECH strives for excellence and, to this end, boasts a series of characteristics that make this university unique:
Analysis |
TECH explores the student’s critical side, their ability to question things, their problem-solving skills, as well as their interpersonal skills.
Academic Excellence |
TECH offers students the best online learning methodology. The university combines the Relearning methodology (the most internationally recognized postgraduate learning methodology) with Harvard Business School case studies. A complex balance of traditional and state-of-the-art methods, within the most demanding academic framework.
Economy of Scale |
TECH is the world’s largest online university. It currently boasts a portfolio of more than 10,000 university postgraduate programs. And in today's new economy, volume + technology = a ground-breaking price. This way, TECH ensures that studying is not as expensive for students as it would be at another university.
At TECH, you will have access to the most rigorous and up-to-date case analyses in academia”
Syllabus
The program's syllabus has been designed by the teaching team in accordance with TECH and based on quality criteria: originality, thoroughness, innovation and specialities. In this way, it has been possible to develop 1,500 hours of the best theoretical, practical and additional content focused on Corporate Compliance and its areas of action in the current regulatory context. In addition, the graduate will be able to access it from any device with an Internet connection thanks to its convenient 100% online format, which gives the experience a plus in terms of time flexibility and face-to-face attendance.
Through knowledge of the Annual International Compliance Plan, you will be able to effectively advise any company, raising its activity to the pinnacle of good practice”
Syllabus
The content of the Professional master’s degree in Corporate Compliance has been developed by the teaching team taking as a reference the latest developments in the sector. Thus, it has been possible to create an intensive program through which the graduate will attend a comprehensive and 100% online specialization in the area of Compliance Responsibility.
It is an experience distributed over 1,500 hours of diverse content, including use cases and additional audiovisual material that will allow the graduate to delve in a personalized way into aspects such as the regulatory framework in Compliance, the elements of business management in the current context or the different types that exist for the prevention of money laundering or for the elimination of the financing of terrorism.
In this way, the student will obtain a series of professional competencies that will elevate their talent to the maximum, placing them at the top of the sector due to their specialized handling of risk mitigation tools in the current offline and online market. All this will serve as a significant asset for the achievement of the managerial job you have always wanted, being able to demonstrate their involvement and commitment to business ethics through a work based on compliance with international regulations of Corporate Compliance.
This Professional master’s degree takes place over 12 months and is divided into 10 modules:
Module 1. Corporate Compliance. Regulatory Framework
Module 2. Business Management Elements of Compliance
Module 3. Criminal Compliance
Module 4. Compliance as a control function: prevention of money laundering and terrorist financing
Module 5. Compliance and data protection
Module 6. Labor Compliance
Module 7. Compliance to mitigate cybersecurity risks and the use of technologies in the company
Module 8. Competition Intellectual Rights Compliance
Module 9. Financial Compliance
Module 10. Sectorial Compliances
Where, When and How is it Taught?
TECH offers the possibility of developing this Professional master’s degree in Corporate completely online. Over the course of 12 months, you will be able to access all the contents of this program at any time, allowing you to self-manage your study time.
Module 1. Corporate Compliance. Regulatory Framework
1.1. Corporate Compliance. Development in Organizations
1.1.1. Corporate Compliance
1.1.2. Compliance and Regulatory Compliance
1.1.3. Compliance within Organizations
1.2. Compliance function and requirements
1.2.1. Compliance culture
1.2.2. Position in the organization
1.2.3. Reference terms of the Compliance function
1.2.4. Interaction With Other Function
1.3. Industry standards and best practices (ISO rules)
1.3.1. ISO 37301
1.3.2. UNE 19601:2017 on Criminal Compliance Management Systems
1.3.3. ISO 37001 Anti-bribery management systems standard
1.3.4. UNE-/ IEC 27000 Standards. Information Security Management System (ISMS)
1.3.5. UNE-/ IEC 20000 Standards. IT Service Management System (ITSMS)
1.4. Internal regulations of the organizations
1.4.1. Hierarchy of policies
1.4.2. The rule of rules or rule 0
1.4.3. Ethical Codes
1.4.4. Structuring and production
1.4.5. Revision and updating
1.4.6. Advertising and Communication
1.5. Ethics in the Compliance Framework
1.5.1. Business ethics
1.5.2. Theories of Business Ethics
1.5.3. Ethical performance and reputational impact
1.6. Compliance leadership and culture
1.6.1. Leadership in organizations: importance of tone at the top
1.6.2. Development of a control structure: the three lines of defense
1.6.3. Metrics of effective leadership in Compliance
1.7. Prevention of conflicts of interest in the corporate framework
1.7.1. Conflicts of interest in the corporate framework
1.7.2. Types of conflicts of interest
1.7.3. Conflict Management interest rate
1.8. Compliance officer
1.8.1. Compliance officer profile
1.8.2. Compliance officer in Spanish regulation
1.8.3. Interaction With Other Functions
1.9. Compliance officer Tasks
1.9.1. Compliance officer Tasks
1.9.2. The problem of their heterogeneity
1.9.3. Structures of compliance tasks
1.10. Responsibility of the compliance officer
1.10.1. Responsibility of senior management in Compliance
1.10.2. Responsibility of the compliance officer
1.10.3. Responsibility of the rest of the organization regarding Compliance
Module 2. Business Management Elements of Compliance
2.1. Leadership. Planning. Operation Evaluation. Improvement of procedures
2.1.1. Philosophies behind Compliance cycles: PDCA
2.1.2. Philosophies behind Compliance cycles: Kaizen
2.1.3. Philosophies behind Compliance cycles:
2.2. Communication Training. Sensitization in the Company
2.2.1. Philosophies behind Compliance cycles:
2.2.2. Communication Structure in Compliance
2.2.3. Personnel Training
2.2.4. Internalization of Compliance
2.3. Monitoring. Procedure. Plan: execution of the plan
2.3.1. Compliance monitoring and testing
2.3.2. Differences with audit functions
2.3.3. Compliance plan design
2.3.4. Design of the monitoring and testing program
2.3.5. Plan implementation and execution
2.3.6. Reporting of results
2.4. Disciplinary measures and incentives for the implementation of compliance programs
2.4.1. Compliance as a function of control and identification of misconduct
2.4.2. Relationship with human resources and management
2.4.3. Incentive and disciplinary system
2.5. Compliance Plans Records
2.5.1. Record keeping of compliance plans
2.5.2. Content information
2.5.3. Record keeping procedure
2.6. Annual Compliance Plan
2.6.1. Elements of the annual compliance plan
2.6.2. Design of the annual compliance plan its approval
2.6.3. Monitoring of the annual Compliance plan
2.6.4. Annual Compliance Plan Report
2.7. Information and results reporting
2.7.1. Management Information (MI): SMART information
2.7.2. Internal reports generated by the Compliance Function
2.7.3. External reports generated by the Compliance Function
2.8. Corporate Compliance Good Governing
2.8.1. International and local background
2.8.2. Corporate Compliance. Good governance: keys
2.8.3. Increased focus on ESG Compliance
2.9. Compliance department relationship with other departments of the organization
2.9.1. Relationship with senior management
2.9.2. Relation with the Committee of Compliance
2.9.3. Relationship with the third line of defense: internal audit
2.9.4. Relationship with the first line of defense: business and support functions
2.9.5. Relationship with the second line of defense: Risk
Module 3. Criminal Compliance
3.1. Corporate Compliance. International regulation
3.1.1. U.S. regulation. Importance of the Federal Sentencing Guidelines
3.1.2. Regulation in the European Union countries
3.1.3. Cases of liability of legal entities in Latin America
3.2. Liability of the legal person prior to the criminal code:Contentious-Administrative Law
3.2.1. Liability of the legal person in Contentious-Administrative Law
3.2.2. Relationship between Administrative Law and Criminal Law in Compliance matters
3.2.3. Cases of overlapping: environmental infringements
3.3. Reforms to the Criminal Code regarding the criminal liability of legal persons
3.3.1. Criminal Code prior to the 2010 reform
3.3.2. 2010 reform
3.3.3. Subsequent minor reforms
3.4. Mitigating and exonerating conditions with scope of liability
3.4.1. Mitigating and exonerating factors. Concept
3.4.2 Mitigating elements
3.4.3. Exonerating elements
3.5. Prosecutor's clarification of roles and responsibilities
3.5.1. The Prosecutor's Circular
3.5.2. The problems of the compliance officer
3.5.3. Clarification of roles and responsibilities
3.6. Development of Corporate Defense manuals
3.6.1. Elements of the Corporate Defense manual
3.6.2. Roles in the development of plans
3.6.3. Risk map: assessment of the risks to which the entity is exposed
3.6.4. Production of the Corporate Defense manual. Steps
3.7. Risk map: assessment of the risks to which the entity is exposed
3.7.1. The Risk Map
3.7.2. Elements of the risk map
3.7.3. Elements of the risk map
3.8. Control frameworks, design and structures for implementation
3.8.1. Control as a mitigant of inherent risk
3.8.2. Policy design and training as mitigating factors
3.8.3. Control structures: a priori/ posteriori, manual/automated
3.9. Governance: committees and responsibilities
3.9.1. Committees as risk managers
3.9.2.. Roles and Responsibilities
3.9.3. Effectiveness of committees
3.10. Role design. Practical Example
3.10.1. Mapping of applicable criminal types and scenarios
3.10.2. Roles and Responsibilities
3.10.3. Assignment of probability and risk: calculation of inherent risk
3.10.4. Evaluation of the control framework and calculation of residual risk
Module 4. Compliance as a control function: prevention of money laundering and terrorist financing
4.1. Financial crime: impact, elements and phases
4.1.1. The threat of financial crime in the economy. Pillars
4.1.2. Impact in the Economy
4.1.3. Money Laundering
4.1.4. Funding of Terrorism
4.1.5. Phases of Money Laundering and Terrorist Financing
4.2. Institutions and regulations in the prevention of money laundering and terrorist financing
4.2.1. Regulatory and supervisory focus on financial crime issues
4.2.2. Institutions and international legal frameworks of reference
4.2.3. Local institutions and legal frameworks of reference
4.3. Prevention of Money Laundering
4.3.1. Direct activities
4.3.2. Principal (financial sector)
4.3.3. Secondary (other sectors)
4.3.4. Indirect activities: service providers to entities subject to the direct money laundering prevention regime. Gaps
4.4. Program for the prevention of money laundering and financing of terrorism. Implementation and implications
4.4.1. Financial crime program. Pillars
4.4.2. Design of policies and procedures. Implementation and adaptation of systems
4.4.3. Financial crime program. Principles
4.5. Compliance as a support function
4.5.1. Compliance as a support function
4.5.2. Design of financial crime manuals and policies
4.5.3. Development of communication and training strategies
4.6. Compliance as a control function I: identification and verification
4.6.1. Identification of customers and counterparties
4.6.2. Risk-based approach: verification and periodic reviews
4.6.3. Requirements for the last beneficiary
4.7. Compliance as a control function II: Monitoring and suspected
4.7.1. Types of suspicious transactions
4.7.2. Monitoring design
4.7.3. Monitoring flow
4.7.4. Types of suspicious transactions
4.8. Compliance as a Control Function III: Terrorist financing and international financial sanctions: filtering tools
4.8.1. Filtering of operations related to international financial sanctions
4.8.2. List controls
4.8.3. Extraterritoriality: the case of the American supervisor (OFAC)
4.9. New technologies in financial crime
4.9.1. Evolution of Finances: FinTech and cryptoassets
4.9.2. Technological Revolution. Risks and Opportunities
4.9.3. Advances in controls: RegTech
4.10. Tax Compliance: tax evasion structures detection
4.10.1. Tax Compliance. Detection of tax evasion structures
4.10.2. International Tax Compliance Regulations: FATCA and CRS
4.10.3. Tax evasion structures: Panama Papers
Module 5. Compliance and data protection
5.1. Europe Data Protection Regulation
5.1.1. Europe Data Protection Regulation
5.1.2. The Regulation General Data Protection Regulation
5.1.3. Follow-up by other jurisdictions: the Californian Case and the Chinese Regulation
5.2. AEPD Guidelines
5.2.1. Data Protection Law: Organic Law 3/2018, of December 5th on Personal Data Protection and guarantee of digital rights
5.2.2. Development guides
5.2.3. Legal reports and rulings
5.3. Principles Relating to the Processing of Personal Data
5.3.1. Lawfulness, transparency and fairness
5.3.2. Purpose
5.3.3. Data Minimization
5.3.4. Accuracy
5.3.5. Limitation of the conservation period
5.3.6. Security/Safety
5.3.7. Active liability or proven liability
5.4. Informed consent to the processing of personal data
5.4.1. Requirements to be met by consent
5.4.2. Tacit and explicit consent
5.4.3. Taxonomy of consent under GDPR
5.5. Rights of data subjects in relation to their personal data
5.5.1. Access
5.5.2. Rectifier
5.5.3. Opposition
5.5.4. Suppression
5.5.5. Treatment limitation
5.5.6. Portability
5.5.7. Not to be subject of automated individualized decisions
5.5.8. Information
5.5.9. Shengen rights
5.6. The figures of data controller and data protection officer
5.6.1. Concept of data controller
5.6.2. Concept of co-responsible
5.6.3. Concept of manager
5.6.4. Legal structures: model agreements
5.7. Data protection compliance by design and by default
5.7.1. Reason for the novelty of GDPR in these two cases
5.7.2. Data protection compliance by design and their impact
5.7.3. Data protection by default
5.8. Measures for complying with data protection obligations
5.8.1. Processing Activities Register
5.8.2. Inventory of treatment activities
5.8.3. Risk assessment for the rights and freedoms of data subjects that could result from the processing of personal data
5.8.4. Execution of data protection impact assessments
5.8.5. Prior consultation
5.8.6. Security of data processing
5.8.7. Notification of personal data breaches to the controlling authority
5.8.8. Communication of personal data breaches to data subjects
5.8.9. Code of Conduct
5.9. The Data Protection Officer
5.9.1. Profile and requirements of the protection officer
5.9.2. Independence of protection officer data
5.1.3. Relation with the function of Compliance
5.10. International Data Transfers
5.10.1. International data transfers: bilateral contracts
5.10.2. Binding Corporate Rules (BCR)
5.10.3. Data protection codes of conduct
Module 6. Labor Compliance
6.1. Labor Compliance. General Framework
6.1.1. Labor Compliance
6.1.2. Regulatory sources
6.1.3. Human resources or Compliance
6.2. Labor Compliance Program
6.2.1. Program Objectives
6.2.2. Differences with labor auditing and legal advice
6.2.3. Compliance planning
6.2.4. Compliance implementation process
6.3. Gender Equality Plans
6.3.1. Regulation Equality Plans
6.3.2. Elements of the equality plan
6.3.3. Design and implementation of the equality plan
6.4. Compliance with compensation records. Wage Gap
6.4.1. Compliance with compensation records
6.4.2. Compliance plan design
6.4.3. Implementation of the compliance plan
6.5. Gift and meal management compliance
6.5.1. Importance of control: conflicts of interest, prevention of bribery and corruption
6.5.2. Design of gift and meal management policies and their implementation
6.5.3. First and second line of defense of operational controls
6.6. Internal code of conduct and compliance
6.6.1. Infractions and sanctions system
6.6.2. Workers' Statute
6.6.3. Compliance Training
6.7. Crime prevention in the workplace
6.7.1. Mapping and implementation
6.7.2. Scenarios
6.7.3. Preventive Measures
6.8. Reporting channels and protection protocols against harassment and discrimination
6.8.1. Problem of the responsibility of the whistleblower channel: Compliance vs. Human Resources
6.8.2. Protection protocols against harassment and discrimination
6.8.3. Preventive and detective controls. Measures to be implemented
6.9. Processing of personal datain the workplace: the case of video-surveillance and time control
6.9.1. Ethics in the Technological World
6.9.2. Labor controls in the technological world AEPD Guidelines
6.9.3. Implementation of the obligation of time and attendance control
6.10. Law to the Digital Disconnecting
6.10.1. The right to digital disconnection Origin
6.10.2. Disconnection as a digital right of individuals
6.10.3. Implementation measures and case law
Module 7. Compliance to mitigate cybersecurity risks and the use of technologies in the company.
7.1. Technological compliance in the business environment
7.1.1. Digital Compliance. Evolution of Compliance in the technological era
7.1.2. Regulatory framework of the digital environment
7.1.3. Coordination of Compliance with other areas (CISO)
7.2. Use of technological means in the company
7.2.1. General rules for implementation and use
7.2.2. Hardware rules. Software rules
7.2.3. Electronic media rules. Visual media and geolocation rules
7.3. Use of Social Networks in business field
7.3.1. Social networking and internet use policy
7.3.2. Confidentiality of business information and social networks
7.3.3. Social Media Campaigns
7.4. Operational risk management: business continuity and disaster recovery planning
7.4.1. Business Continuity Plans
7.4.2. Disaster Recovery Plan
7.4.3. Third-party agreements
7.4.4. Suppliers and subcontractors
7.5. Classification of business information
7.5.1. Classification of Information
7.5.2. Control measures of the information according to its sensitivity
7.5.3. Data incident management procedure
7.6. Cybersecurity Essential element of corporate protection
7.6.1. Regulatory Framework
7.6.2. Framework control and cybersecurity
7.6.3. Development of internal tests and audits: penetration tests
7.6.4. Cybersecurity incidents
7.6.5. Post-mortem, notification and remediation
7.7. Controls on third parties: splitting in technology value chains
7.7.1. Digital operational resilience act. The Future
7.7.2. Framework contracts and service level agreements. Importance
7.7.3. Audits and due diligence of technology counterparties
7.8. Electronic contracting, consumer protection and digital signature. New issues
7.8.1. Electronic contracting Electronic Signature and digital signature
7.8.2. Digital consumer protection: DMA and DSA
7.8.3. Digital Identity
7.9. RegTech: preventive technologies in Compliance
7.9.1. Preventive controls
7.9.2. Compliance by design: controls in the development of systems
7.9.3. Technological preventive compliance guides
7.10. RegTech: Detectable technologies in Compliance
7.10.1. Monitoring Systems
7.10.2. Incident and analysis detection
7.10.3. Internal, customer and regulatory reports
Module 8. Competition and Intellectual Rights Compliance
8.1. Competition Compliance Activity. European Regulatory Framework
8.1.1. Compliance with Competence
8.1.2. European Regulations
8.1.3. Doctrine and jurisprudence
8.1.4. Supervision
8.2. Fundamental Elements of characterization
8.2.1. Free competition restriction
8.2.2. Vertical restraints
8.2.3. Horizontal restraints
8.2.4. Collusion
8.3. CNMC's practice in relation to compliance programs
8.3.1. Developments in CNMV practice
8.3.2. Ex ante program resolutions
8.3.3. Ex post program resolutions
8.4. Effective compliance programs. CNMC evaluation criteria
8.4.1. Summary of main components
8.4.2. Self-diagnostic meter
8.4.3. Reporting meter
8.5. The Cartel and the Lobby. Example: the Chilean Lobby Law
8.5.1. Chilean Lobby Law
8.5.2. Cartel cases
8.5.3. Lobbying cases
8.6. Public procurement and anticorruption
8.6.1. Characterization elements
8.6.2. Extraterritorial international regulations: FCPA and UK Bribery Act
8.6.3. Other agents: international transparency and its corruption perception index
8.7. New technologies for competition risk mitigation. Pricing instructions, information and exclusion strategies
8.7.1. Basis for evaluation
8.7.2. Information with competitive scope
8.7.3. Planning and risk mitigation strategy in competition
8.8. Legal framework for compliance with intellectual rights
8.8.1. Regulations
8.8.2. Contents
8.8.3. Aspects of particular consideration
8.9. Risk delimitation
8.9.1. Particular study of the scope of development of intellectual rights
8.9.2. Risk delimitation
8.9.3. Aspects in the praxis for planning and control
8.10. Unlawful acts in the context of intellectual rights
8.10.1. Detection
8.10.2. Protection Scope
8.10.3. Infringement policy
Module 9. Financial Compliance
9.1. Risk structures in Financial Compliance
9.1.1. Compliance Risks
9.1.2. Reputational risks
9.1.3. Regulatory risks
9.1.4. Conduct risks
9.1.5. Financial crime Risk
9.2. Consumer and investor protection
9.2.1. Consumer protection: channels for queries and complaints
9.2.2. Special focus groups: financial inclusion and vulnerability
9.2.3. Cases Wells Fargo and the Bankia case
9.3. MiFID II. European regulations on Financial Markets
9.3.1. MiFID II: objectives, impact and general framework
9.3.2. Product catalogue
9.3.3. Customer Classification
9.3.4. Securities Market Law
9.4. Investment instruments: controls. Appropriateness and suitability
9.4.1. Product governance
9.4.2. Suitability and convenience test
9.4.3. Distribution: communication and advertising campaigns
9.4.4. Compliance controls and monitoring
9.5. Market manipulation
9.5.1. European Regulation Market Abuse Directive (MAD) and Market Abuse Regulation (MAR)
9.5.2. Market Abuse. Pillars
9.5.3. Sanctioned behaviors
9.6. Privileged information in the financial markets
9.6.1. Privileged information
9.6.2. Risk events
9.6.3. Control systems
9.7. Controls on the contracting of financial products by remote means
9.7.1. The risk of using remote means
9.7.2. Protection controls for institutions
9.7.3. Consumer protection controls
9.8. Cross-border transactions in finance
9.8.1. Globalization: licensing versus access
9.8.2. Business licenses and jurisdictions with cross-border services mappings
9.8.3. Design of mitigating factor matrices
9.9. Regulatory Change Management
9.9.1. Regulatory Change Management
9.9.2. Follow-up of regulatory developments and initiatives
9.9.3. Mapping and analysis of required actions
9.9.4. Coordination and implementation
9.10. Compliance Project Management
9.10.1. Compliance as a project manager
9.10.2. Pillars in Compliance Project Management
9.10.3. Compliance project life cycle
Module 10. Sector Compliance
10.1. Compliance in Contracting
10.1.1. Compliance in Contracting
10.1.2. Public and private contracting
10.2.3. Compliance in public recruitment
10.2. Regulatory compliance in the environmental area
10.2.1. The Objectives of Agenda 2030
10.2.2. The scandals: Dielselgate
10.2.3. False reports: Green Washing
10.2.4. The metrics and reporting problem
10.3. Advocacy and compliance activity
10.3.1. Lawyers as advisors to regulated entities
10.3.2. Lawyers as regulated entities
10.3.3. Data protection in the legal profession
10.4. The food sector in the compliance activity
10.4.1. Transparency to consumers and users
10.4.2. The problem of fractioning in the value chain and relocations
10.4.3. Sector Particularities
10.5. Regulatory compliance in the health and safety sector
10.5.1. Confidentiality and Data Protection
10.5.2. Conflict of interest management
10.5.3. Sector Particularities
10.6. Regulatory compliance in energy
10.6.1. Role of the energy sector. Controls
10.6.2. Prevention of bribery and corruption. Risk
10.6.3. Oil and gas: Trade Finance Compliance. International financial sanctions
10.7. Regulatory compliance in the pharmaceutical sector
10.7.1. Compliance in the pharmaceutical sector
10.7.2. Compliance in industrial property
10.7.3. Self-regulation and advertising self-control
10.8. Regulatory compliance in small and medium companies
10.8.1. SMEs: obligation versus resources
10.8.2. Compliance Program for SMEs.. Components
10.8.3. Efficient Management
10.9. Regulatory compliance in listed companies and other types of companies
10.9.1. Origins: Enron case and the emergence of SOX regulations in the United States
10.9.2. Good corporate governance: benchmark reports and remuneration
10.9.3. Other types of companies: cooperatives
10.10. Compliance in the framework of consumer relations
10.10.1. Consumer protection regulations
10.10.2. Risk analysis in the provision of consumer services
10.10.3. Planning and control of consumer compliance systems
Make the most of this opportunity to learn about the latest advances in this subject to apply it to your daily practice"
Professional Master's Degree in Corporate Compliance
In today's business world, risk management and transparency have become essential elements for the success and sustainability of organisations. In this context, the Professional Master's Degree in Corporate Compliance created by TECH Global University, emerges as the ideal option for those professionals who wish to acquire the knowledge and skills necessary to ensure regulatory and ethical compliance within companies. We have established a 100% online postgraduate course, where participants have the facility to manage their schedules and download exclusive study material. This degree combines a solid theoretical foundation with practical approaches to address today's challenges in the field of corporate compliance. Throughout the program, students will gain an in-depth understanding of legal and regulatory frameworks as well as best practices in business ethics.
The programme is designed to give students a thorough understanding of the legal and regulatory frameworks, as well as best practices in business ethics.
Get to know Corporate Compliance
One of the highlights of this Professional Master's Degree is its multidisciplinary approach. Students will have the opportunity to explore areas such as law, accounting, risk management, business ethics and corporate social responsibility. This will enable them to understand the complexity of today's challenges and develop effective strategies to mitigate risks and foster an ethical business environment. Upon completion of the program, graduates will be prepared to play key roles in the field of compliance management in organisations across a variety of sectors. They will be able to advise on policies and procedures, design business ethics programs, assess or mitigate legal risks, and promote a culture of compliance throughout the enterprise.