University certificate
The world's largest school of business”
Why study at TECH?
Corporate Compliance is not only a legal obligation, but also a smart business strategy that promotes integrity and long-term success"

In the current context, characterized by instability and constant challenges in the business landscape, Corporate Compliance emerges as a fundamental pillar for companies seeking to consolidate their activities and project themselves safely into the future. Indeed, rapid technological evolution and unpredictable economic changes demand the implementation of robust compliance programs that protect organizations from taking on unnecessary liabilities. And, of course, highly qualified professionals in this field are in high demand.
This is the origin of this Hybrid professional master’s degree in Corporate Compliance, with the aim of qualify students in the knowledge and techniques necessary to excel in the field of Corporate Compliance. The program will address a wide range of topics, such as criminal compliance and specific offenses against the Treasury, free competition, labor, cybersecurity and data management.
In addition, a thorough exploration of Regulatory Compliance Systems, whose importance lies in defining business obligations, and ComplianceSystems, whose function is to safeguard the company from potential liabilities, will be offered.
Special attention will also be given to the design of specific compliance programs for different industry sectors. This approach will prepare graduates to apply their knowledge in practical situations, enhancing specific skills and enabling them to develop compliance programs tailored to the needs of each company. Highlighting the early detection of risks and the effective management of resources, this program is an indispensable tool for entrepreneurs and managers.
For this reason, TECH offers a solid education that combines theoretical study with practical application. In other words, graduates will be able to interact with experts in the sector and carry out real case studies to develop their practical skills. Likewise, the flexibility that characterizes this program will allow students to combine their studies with their professional responsibilities, maximizing their learning and applicability in the working world.
You will delve into risk anticipation and mitigation, protecting the company and optimizing both its resources and reputation, by avoiding legal repercussions or damage to the corporate image"
This Hybrid professional master’s degree in Corporate Compliance contains the most complete and up-to-date program on the market. The most important features include:
- Development of more than 100 case studies presented by Corporate Compliance experts and experienced university professors
- Their graphic, schematic and practical contents provide essential information on those disciplines that are indispensable for professional practice
- All of this will be complemented by theoretical lessons, questions to the expert, debate forums on controversial topics, and individual reflection assignments
- Content that is accessible from any fixed or portable device with an Internet connection
- Furthermore, you will be able to carry out a internship in one of the best Companies
Through the Corporate Compliance approach, you will accurately analyze the risks faced by the company, which will allow an adequate strategic planning”
In this proposal for a Hybrid professional master’s degree, of a professionalizing nature and hybrid learning modality, the program is aimed at updating Corporate Compliance professionals who perform their functions in companies and other institutions, and who require a high level of qualification. The contents are based on the latest scientific evidence, and oriented in a didactic way to integrate theoretical knowledge in the practice of Corporate Compliance, and the theoretical-practical elements will facilitate the updating of knowledge.
Thanks to its multimedia content elaborated with the latest educational technology, they will allow the Corporate Compliance professional a situated and contextual learning, that is, a simulated environment that will provide an immersive learning programmed to prepare in real situations. This program is designed around Problem-Based Learning, whereby the professional must try to solve the different professional practice situations that arise throughout the program. For this purpose, the students will be assisted by an innovative interactive video system created by renowned and experienced experts.
This Hybrid professional master’s degree will allow you to exercise in simulated environments, providing you with immersive learning programmed to prepare in real situations"

You will update your knowledge through the Hybrid professional master’s degree in Corporate Compliance, in a practical way and adapted to your needs"
Syllabus
This Hybrid professional master’s degree in Corporate Compliance is composed of a first part, completely online, in which students will have access to all the didactic content they need to specialize in this subject. During this period, they will be equipped with the most innovative techniques for monitoring and testing corporate activities. In addition, they will develop new skills that will optimize their daily practice.

Your career goals will be closer when you complete this refresher program"
Module 1. Corporate Compliance. Regulatory Framework
1.1. Corporate Compliance. Development in Organizations
1.1.1. Corporate Compliance
1.1.2. Compliance and Regulatory Compliance
1.1.3. Compliance within Organizations
1.2. Compliance Function and Requirements
1.2.1. Compliance Culture
1.2.2. Position in the Organization
1.2.3. Reference Terms of the Compliance Function
1.2.4. Interaction with Other Function
1.3. Industry Standards and Best Practices (ISO Rules)
1.3.1. ISO 37301
1.3.2. UNE 19601:2017 on Criminal Compliance Management Systems
1.3.3. ISO 37001 Anti-Bribery Management Systems Standard
1.3.4. UNE-/ IEC 27000 Standards. Information Security Management System (ISMS)
1.3.5. UNE-/ IEC 20000 Standards. IT Service Management System (ITSMS)
1.4. Internal Regulations of the Organizations
1.4.1. Hierarchy of Policies
1.4.2. The Rule of Rules or Rule 0
1.4.3. Ethical Codes
1.4.4. Structuring and Production
1.4.5. Revision and Updating
1.4.6. Advertising and Communication
1.5. Ethics in the Compliance Framework
1.5.1. Business Ethics
1.5.2. Theories of Business Ethics
1.5.3. Ethical Performance and Reputational Impact
1.6. Compliance Leadership and Culture
1.6.1. Leadership in Organizations: Importance of Tone at the Top
1.6.2. Development of a Control Structure: the Three Lines of Defense
1.6.3. Metrics of Effective Leadership in Compliance
1.7. Prevention of Conflicts of Interest in the Corporate Framework
1.7.1. Conflicts of Interest in the Corporate Framework
1.7.2. Types of Conflicts of Interest
1.7.3. Conflict Management Interest Rate
1.8. Compliance Officer
1.8.1. Compliance Officer Profile
1.8.2. Compliance Officer Regulation
1.8.3. Interaction With Other Function
1.9. Compliance Officer Tasks
1.9.1. Compliance officer Tasks
1.9.2. The Problem of Their Heterogeneity
1.9.3. Structures of Compliance Tasks
1.10. Responsibility of the Compliance Officer
1.10.1. Responsibility of Senior Management in Compliance
1.10.2. Responsibility of the compliance officer
1.10.3. Responsibility of the Rest of the Organization Regarding Compliance
Module 2. Business Management Elements of Compliance
2.1. Leadership. Planning. Operation Evaluation. Improvement of Procedures
2.1.1. Philosophies Behind ComplianceCycles: PDCA
2.1.2. Philosophies behind Compliance cycles: Kaizen
2.1.3. Leadership: ComplianceRisk Appetite Design
2.2. Communication. Training. Sensitization in the Company
2.2.1. ComplianceInformation and Message
2.2.2. Communication Structure in Compliance
2.2.3. Personnel Training
2.2.4. Internalization of Compliance
2.3. Monitoring. Procedure. Plan: Execution of the Plan
2.3.1. ComplianceMonitoring and Testing
2.3.2. Differences with Audit Functions
2.3.3. CompliancePlan Design
2.3.4. Design of the Monitoring and Testing Program
2.3.5. Plan Implementation and Execution
2.3.6. Reporting of Results
2.4. Complaint and Investigation Channels in ComplianceProcedures
2.4.1. Whistleblowing Channels: European Regulation
2.4.2. Types of Whistleblowing Channels
2.4.3. Design of Whistleblowing Channels. Components
2.4.4. Flows and Processes in Whistleblowing Cases
2.5. Disciplinary Measures and Incentives for the Implementation of Compliance Programs
2.5.1. Complianceas a Function of Control and Identification of Misconduct
2.5.2. Relationship with Human Resources and Management
2.5.3. Incentive and Disciplinary System
2.6. Record Keeping of CompliancePlans
2.6.1. Record Keeping of CompliancePlans
2.6.2. Content Information
2.6.3. Record Keeping Procedure
2.7. Annual Compliance Plan
2.7.1. Elements of the Annual CompliancePlan
2.7.2. Design of the Annual CompliancePlan its Approval
2.7.3. Monitoring of the Annual Compliance Plan
2.7.4. Annual Compliance Plan Report
2.8. Information and Results Reporting
2.8.1. Management Information (MI): SMART Information
2.8.2. Internal Reports Generated by the ComplianceFunction
2.8.3. External Reports Generated by the ComplianceFunction
2.9. Corporate Compliance. Good Governing
2.9.1. International and Local Background
2.9.2. Corporate Compliance. Good Governance: Keys
2.9.3. Increased Focus on ESG Compliance
2.10. Compliance Department Relationship with Other Departments of the Organization
2.10.1. Relationship with Senior Management
2.10.2. Relation with the Committee of Compliance
2.10.3. Relationship with the Third Line of Defense: Internal Audit
2.10.4. Relationship with the First Line of Defense: Business and Support Functions
2.10.5. Relationship with the Second Line of Defense: Risk
Module 3. Criminal Compliance
3.1. Corporate Compliance. International Regulation
3.1.1. U.S. Regulation. Importance of the Federal Sentencing Guidelines
3.1.2. Regulation in the European Union Countries
3.1.3. Cases of Liability of Legal Entities in Latin America
3.2. Liability of the Legal Person Prior to the Criminal Code: Contentious-Administrative Law
3.2.1. Liability of the Legal Person in Contentious-Administrative Law
3.2.2. Relationship between Administrative Law and Criminal Law in Compliance Matters
3.2.3. Cases of Overlapping: Environmental Infringements
3.3. Reforms to the Criminal Code Regarding the Criminal Liability of Legal Persons
3.3.1. Criminal Code Prior to the 2010 Reform
3.3.2. 2010 Reform
3.3.3. Subsequent Minor Reforms
3.4. Mitigating and Exonerating Conditions with Scope of Liability
3.4.1. Mitigating and Exonerating Factors. Concept
3.4.2. Mitigating Elements
3.4.3. Exonerating Elements
3.5. Prosecutor's Clarification of Roles and Responsibilities
3.5.1. The Prosecutor's Circular
3.5.2. The Problems of the Compliance Officer
3.5.3. Clarification of Roles and Responsibilities
3.6. Development of Corporate DefenseManuals
3.6.1. Elements of the Corporate DefenseManual
3.6.2. Roles in the Development of Plans
3.6.3. Risk Map: Assessment of the Risks to which the Entity is Exposed
3.6.4. Production of the Corporate DefenseManual. Steps
3.7. Risk Map: Assessment of the Risks to which the Entity is Exposed
3.7.1. The Risk Map
3.7.2. Elements of the Risk Map
3.7.3. Elements of the Risk Map
3.8. Control Frameworks, Design and Structures for Implementation
3.8.1. Control as a Mitigant of Inherent Risk
3.8.2. Policy Design and Training as Mitigating Factors
3.8.3. Control Structures: a Priori/ Posteriori, Manual/Automated
3.9. Governance: Committees and Responsibilities
3.9.1. Committees as Risk Managers
3.9.2. Roles and Responsibilities
3.9.3. Effectiveness of Committees
3.10. Role Design. Practical Example
3.10.1. Mapping of Applicable Criminal Types and Scenarios
3.10.2. Roles and Responsibilities
3.10.3. Assignment of Probability and Risk: Calculation of Inherent Risk
3.10.4. Evaluation of the Control Framework and Calculation of Residual Risk
Module 4. Compliance as a Control Function: Prevention of Money Laundering and Terrorist Financing
4.1. Financial Crime: Impact, Elements and Phases
4.1.1. The Threat of Financial Crime in the Economy. Pillars
4.1.2. Impact in the Economy
4.1.3. Money Laundering
4.1.4. Funding of Terrorism
4.1.5. Phases of Money Laundering and Terrorist Financing
4.2. Institutions and Regulations in the Prevention of Money Laundering and Terrorist Financing
4.2.1. Regulatory and Supervisory Focus on Financial Crime Issues
4.2.2. Institutions and International Legal Frameworks of Reference
4.2.3. Local Institutions and Legal Frameworks of Reference
4.3. Prevention of Money Laundering
4.3.1. Direct Activities
4.3.2. Principal (Financial Sector)
4.3.3. Secondary (Other Sectors)
4.3.4. Indirect Activities: Service Providers to Entities Subject to the Direct Money Laundering Prevention Regime. Gaps
4.4. Program for the Prevention of Money Laundering and Financing of Terrorism. Implementation and Implications
4.4.1. Financial Crime Program. Pillars
4.4.2. Design of Policies and Procedures. Implementation and Adaptation of Systems
4.4.3. Financial Crime Program. Principles
4.5. Compliance as a Support Function
4.5.1. Compliance as a Support Function
4.5.2. Design of Financial Crime Manuals and Policies
4.5.3. Development of Communication and Training Strategies
4.6. Compliance as a Control Function I: Identification and Verification
4.6.1. Identification of Customers and Counterparties
4.6.2. Risk-based Approach: Verification and Periodic Reviews
4.6.3. Requirements for the Last Beneficiary
4.7. Compliance as a Control Function II: Monitoring and Suspected
4.7.1. Types of Suspicious Transactions
4.7.2. Monitoring Design
4.7.3. Monitoring Flow
4.7.4. Types of Suspicious Transactions
4.8. Compliance as a Control Function III: Terrorist Financing and International Financial Sanctions: Filtering Tools
4.8.1. Filtering of Operations Related to International Financial Sanctions
4.8.2. List Controls
4.8.3. Extraterritoriality: the Case of the American Supervisor (OFAC)
4.9. New Technologies in Financial Crime
4.9.1. Evolution of Finances: FinTech and Cryptoassets
4.9.2. Technological Revolution. Risks and Opportunities
4.9.3. Advances in Controls: RegTech
4.10. Tax Compliance: Detection of Tax Evasion Structures
4.10.1. Tax Compliance. Detection of Tax Evasion Structures
4.10.2. International Tax Compliance Regulations: FATCA and CRS
4.10.3. Tax Evasion Structures: Panama Papers
Module 5. Compliance and Data Protection
5.1. Europe Data Protection Regulation
5.1.1. Europe Data Protection Regulation
5.1.2. The Regulation General Data Protection Regulation
5.1.3. Follow-up by Other Jurisdictions: the Californian Case and the Chinese Regulation
5.2. AEPD Guidelines
5.2.1. Data Protection Law: Organic Law 3/2018, of December 5th on Personal Data Protection and Guarantee of Digital Rights
5.2.2. Development Guides
5.2.3. Legal Reports and Rulings
5.3. Principles Relating to the Processing of Personal The Data
5.3.1. Lawfulness, Transparency and Fairness
5.3.2. Purpose
5.3.3. Data Minimization
5.3.4. Accuracy
5.3.5. Limitation of the Conservation Period
5.3.6. Security/Safety
5.3.7. Active Liability or Proven Liability
5.4. Informed Consent to the Processing of Personal Data
5.4.1. Requirements to be Met by Consent
5.4.2. Tacit and Explicit Consent
5.4.3. Taxonomy of Consent Under GDPR
5.5. Rights of Data Subjects in Relation to their Personal Data
5.5.1. Access
5.5.2. Rectifier
5.5.3. Opposition
5.5.4. Suppression
5.5.5. Treatment Limitation
5.5.6. Portability
5.5.7. Not to be Subject of Automated Individualized Decisions
5.5.8. Information
5.5.9. Shengen Rights
5.6. The Figures of Data Controller and Data Protection Officer
5.6.1. Concept of Data Controller
5.6.2. Concept of Co-Responsible
5.6.3. Concept of Manager
5.6.4. Legal Structures: Model Agreements
5.7. Data Protection Compliance by Design and by Default
5.7.1. Reason for the Novelty of GDPR in these Two Cases
5.7.2. Data Protection Compliance by Design and their Impact
5.7.3. Data Protection by Default
5.8. Measures for Complying with Data Protection Obligations
5.8.1. Processing Activities Register
5.8.2. Inventory of Treatment Activities
5.8.3. Risk Assessment for the Rights and Freedoms of Data Subjects that Could Result from the Processing of Personal Data
5.8.4. Execution of Data Protection Impact Assessments
5.8.5. Prior Consultation
5.8.6. Security of Data Processing
5.8.7. Notification of Personal Data Breaches to the Controlling Authority
5.8.8. Communication of Personal Data Breaches to Data Subjects
5.8.9. Code of Conduct
5.9. The Data Protection Officer
5.1.1. Profile and Requirements of the Protection Officer
5.1.2. Independence of Protection Officer Data
5.1.3. Relation with the Function of Compliance
5.10. International Data Transfers
5.10.1. International Data Transfers: Bilateral Contracts
5.10.2. Binding Corporate Rules (BCR)
5.10.3. Data Protection Codes of Conduct
Module 6. Labor Compliance
6.1. Labor Compliance. General Framework
6.1.1. Labor Compliance
6.1.2. Regulatory Sources
6.1.3. Human Resources or Compliance
6.2. Labor Compliance Program
6.2.1. Program Objectives
6.2.2. Differences with Labor Auditing and Legal Advice
6.2.3. Compliance Planning
6.2.4. Compliance Implementation Process
6.3. Gender Equality Plans
6.3.1. Regulation Equality Plans
6.3.2. Elements of the Equality Plan
6.3.3. Design and Implementation of the Equality Plan
6.4. Compliance with Compensation Records. Wage Gap
6.4.1. Compliance with Compensation Records
6.4.2. Compliance Plan Design
6.4.3. Implementation of the Compliance Plan
6.5. Gift and Meal Management Compliance
6.5.1. Importance of Control: Conflicts of Interest, Prevention of Bribery and Corruption
6.5.2. Design of Gift and Meal Management Policies and their Implementation
6.5.3. First and Second Line of Defense of Operational Controls
6.6. Internal Code of Conduct and Compliance
6.6.1. Infractions and Sanctions System
6.6.2. Workers' Statute
6.6.3. Compliance Training
6.7. Crime Prevention in the Workplace
6.7.1. Mapping and Implementation
6.7.2. Scenarios
6.7.3. Preventive Measures
6.8. Reporting Channels and Protection Protocols against Harassment and Discrimination
6.8.1. Problem of the Responsibility of the Whistleblower Channel: Compliance vs. Human Resources
6.8.2. Protection Protocols against Harassment and Discrimination
6.8.3. Preventive and Detective Controls. Measures to be Implemented
6.9. Processing of Personal Data in the Workplace: the Case of Video-Surveillance and Time Control
6.9.1. Ethics in the Technological World
6.9.2. Labor Controls in the Technological World AEPD Guidelines
6.9.3. Implementation of the Obligation of Time and Attendance Control
6.10. Law to the Digital Disconnecting
6.10.1. The Right to Digital Disconnection Origin
6.10.2. Disconnection as a Digital Right of Individuals
6.10.3. Implementation Measures and Case Law
Module 7. Compliance to Mitigate Cybersecurity Risks and the Use of Technologies in the Company
7.1. Technological Compliance in the Business Environment
7.1.1. Digital Compliance. Evolution of Compliance in the Technological Era
7.1.2. Regulatory Framework of the Digital Environment
7.1.3. Coordination of Compliance with Other Areas (CISO)
7.2. Use of Technological Means in the Company
7.2.1. General Rules for Implementation and Use
7.7.2. Hardware Rules. Software Rules
7.7.3. Electronic Media Rules. Visual Media and Geolocation Rules
7.3. Use of Social Media in Business Field
7.3.1. Social Media and Internet Use Policy
7.3.2. Confidentiality of Business Information and Social Media
7.3.3. Social Media Campaigns
7.4. Operational Risk Management: Business Continuity and Disaster Recovery Planning
7.4.1. Business Continuity Plans
7.4.2. Disaster Recovery Plan
7.4.3. Third-Party Agreements
7.4.4. Suppliers and Subcontractors
7.5. Classification of Business Information
7.5.1. Classification of Information
7.5.2. Control Measures of the Information According to its Sensitivity
7.5.3. Data Incident Management Procedure
7.6. Cybersecurity Essential Element of Corporate Protection
7.6.1. Regulatory Framework
7.6.2. Framework Control and Cybersecurity
7.6.3. Development of Internal Tests and Audits: Penetration Tests
7.6.4. Cybersecurity Incidents
7.6.5. Post-Mortem, Notification and Remediation
7.7. Controls on Third Parties: Splitting in Technology Value Chains
7.7.1. Digital Operational Resilience Act. The Future
7.7.2. Framework Contracts and Service Level Agreements. Importance
7.7.3. Audits and Due Diligence of Technology Counterparties
7.8. Electronic Contracting, Consumer Protection and Digital Signature. New Issues
7.8.1. Electronic Contracting Electronic Signature and Digital Signature
7.8.2. Digital Consumer Protection: DMA and DSA
7.8.3. Digital Identity
7.9. RegTech: Preventive Technologies in Compliance
7.9.1. Preventive Controls
7.9.2. Compliance by Design: Controls in the Development of Systems
7.9.3. Technological Preventive Compliance Guides
7.10. RegTech: Detectable Technologies in Compliance
7.10.1. Monitoring Systems
7.10.2. Incident and Analysis Detection
7.10.3. Internal, Customer and Regulatory Reports
Module 8. Competition and Intellectual Rights Compliance
8.1. Competition Compliance Activity. European Regulatory Framework
8.1.1. Compliance with Competence
8.1.2. European Regulations
8.1.3. Doctrine and Jurisprudence
8.1.4. Supervision
8.2. Fundamental Elements of Characterization
8.2.1. Free Competition Restriction
8.2.2. Vertical Restraints
8.2.3. Horizontal Restraints
8.2.4. Collusion
8.3. CNMC's Practice in Relation to Compliance Programs
8.3.1. Developments in CNMV Practice
8.3.2. Ex Pre Program Resolutions
8.3.3. Ex Post Program resolutions
8.4. Effective Compliance Programs. CNMC Evaluation Criteria
8.4.1. Summary of Main Components
8.4.2. Self-Diagnostic Meter
8.4.3. Reporting Meter
8.5. The Cartel and the Lobby. Example: Chilean Lobby Law
8.5.1. Chilean Lobby Law
8.5.2. Cartel Cases
8.5.3. Lobbying Cases
8.6. Public Procurement and Anticorruption
8.6.1. Characterization Elements
8.6.2. Extraterritorial International Regulations: FCPA and UK Bribery Act
8.6.3. Other Agents: International Transparency and its Corruption Perception Index
8.7. New Technologies for Competition Risk Mitigation. Pricing Instructions, Information and Exclusion Strategies
8.7.1. Basis for Evaluation
8.7.2. Information with Competitive Scope
8.7.3. Planning and Risk Mitigation Strategy in Competition
8.8. Legal Framework for Compliance with Intellectual Rights
8.8.1. Regulations
8.8.2. Content
8.8.3. Aspects of Particular Consideration
8.9. Risk Delimitation
8.9.1. Particular Study of the Scope of Development of Intellectual Rights
8.9.2. Risk Delimitation
8.9.3. Aspects in the Praxis for Planning and Control
8.10. Unlawful Acts in the Context of Intellectual Rights
8.10.1. Detection
8.10.2. Protection Scope
8.10.3. Infringement Policy
Module 9. Financial Compliance
9.1. Risk Structures in Financial Compliance
9.1.1. Compliance Risks
9.1.2. Reputational Risk
9.1.3. Regulatory Risks
9.1.4. Conduct Risks
9.1.5. Financial Crime Risks
9.2. Consumer and Investor Protection
9.2.1. Consumer Protection: Channels for Queries and Complaints
9.2.2. Groups Requiring Special Attention: Financial Inclusion and Vulnerability
9.2.3. Cases: Wells Fargo and the Bankia Case
9.3. MiFID II. European Regulation on Markets in Financial Instruments
9.3.1. MiFID II: Objectives, Impact and General Framework
9.3.2. Product Cataloging
9.3.3. Client Classification
9.3.4. Securities Market Law
9.4. Investment Instruments: Controls. Appropriateness and Suitability
9.4.1. Product Governance
9.4.2. Suitability and Appropriateness Test
9.4.3. Distribution: Communication and Advertising Campaigns
9.4.4. Compliance Controls and Monitoring
9.5. Market Manipulation
9.5.1. European Regulation Market Abuse Directive (MAD) and Market Abuse Regulation (MAR)
9.5.2. Market Abuse. Pillars
9.5.3. Sanctioned Conducts
9.6. Privileged Information in the Financial Markets
9.6.1. Privileged Information
9.6.2. Risk Events
9.6.3. Control Systems
9.7. Controls on the Contracting of Financial Products by Remote Means
9.7.1. The Risk of Using Remote Means
9.7.2. Protection Controls for Institutions
9.7.3. Consumer Protection Controls
9.8. Cross-Border Transactions in Finance
9.8.1. Globalization: Licensing versus Access
9.8.2. Mappings of Business Licenses and Jurisdictions with Cross-Border Services
9.8.3. Design of Mitigating Factor Matrices
9.9. Regulatory Change Management
9.9.1. Regulatory Change Management
9.9.2. Follow-up of Regulatory Developments and Initiatives
9.9.3. Mapping and Analysis of Required Actions
9.9.4. Coordination and Implementation
9.10. Compliance Project Management
9.10.1. Compliance as a Project Manager
9.10.2. Pillars in Compliance Project Management
9.10.3. Compliance Project Life Cycle
Module 10. Sectorial Compliances
10.1. Compliance in Contracting
10.1.1. Compliance in Contracting
10.1.2. Public and Private Contracting
10.2.3. Compliance in Public Recruitment
10.2. Regulatory Compliance in the Environmental Area
10.2.1. The Objectives of Agenda 2030
10.2.2. The Scandals: Dielselgate
10.2.3. False Reports: Green Washing
10.2.4. The Metrics and Reporting Problem
10.3. Advocacy and Compliance Activity
10.3.1. Lawyers as Advisors to Regulated Entities
10.3.2. Lawyers as Regulated Entities
10.3.3. Data Protection in the Legal Profession
10.4. The Food Sector in the Compliance Activity
10.4.1. Transparency to Consumers and Users
10.4.2. The Problem of Fractioning in the Value Chain and Relocations
10.4.3. Sector Particularities
10.5. Regulatory Compliance in the Health and Safety Sector
10.5.1. Confidentiality and Data Protection
10.5.2. Conflict of Interest Management
10.5.3. Sector Particularities
10.6. Regulatory Compliance in Energy
10.6.1. Role of the Energy Sector. Controls
10.6.2. Prevention of Bribery and Corruption. Risk
10.6.3. Oil and Gas: Trade Finance Compliance. International Financial Sanctions
10.7. Regulatory Compliance in the Pharmaceutical Sector
10.7.1. Compliance in the Pharmaceutical Sector
10.7.2. Compliance in Industrial Property
10.7.3. Self-Regulation and Advertising Self-Control
10.8. Regulatory Compliance in Small and Median Companies
10.8.1. SMEs: Obligation versus Resources
10.8.2. Compliance Program for SMEs.. Components
10.8.3. Efficient Management
10.9. Regulatory Compliance in Listed Companies and Other Types of Companies
10.9.1. Origins: Enron Case and the Emergence of SOX Regulations in the United States
10.9.2. Good Corporate Governance: Benchmark Reports and Remuneration
10.9.3. Other Types of Companies: Cooperatives
10.10. Compliance in the Framework of Consumer Relations
10.10.1. Consumer Protection Regulations
10.10.2. Risk Analysis in the Provision of Consumer Services
10.10.3. Planning and Control of Consumer Compliance Systems

With the study of this intensive program you will increase your level of performance and abilities to practice as a Compliance Officer"
Hybrid Professional Master's Degree in Corporate Compliance
Nowadays, Corporate Compliance has become an essential tool for companies to ensure compliance with laws and regulations. Would you like to acquire the necessary skills to perform in this field? TECH Global University has the ideal option for you. Through an innovative Hybrid Professional Master's Degree in Corporate Compliance you will acquire the necessary knowledge to implement and maintain effective compliance programs in any business environment. In this online and on-site program, you will explore the regulatory and normative framework that governs corporate compliance in different industries and jurisdictions. You will learn about key laws and regulations (FCPA, Sarbanes-Oxley Act, GDPR) and how they apply to business practices. In addition, you will learn how to design, implement and evaluate compliance programs tailored to an organization's specific needs. You will discover how to identify and assess risks, establish policies or procedures, provide training and monitor ongoing compliance. In doing so, you will develop skills in risk management and internal auditing to identify, assess and mitigate compliance risks.
Learn all about Corporate Compliance
This program combines the flexibility of online learning and face-to-face interaction with professors and peers in a traditional classroom environment. As such, you will have the opportunity to participate in live or online deabtes in order to put into practice the knowledge acquired in the classroom. As you progress through the syllabus, you will understand the fundamental principles of corporate compliance, including the importance of regulatory compliance, the legal and ethical risks associated with non-compliance, and best practices in developing effective compliance programs. In addition, you will learn how to conduct risk assessments, internal controls design or implementation, and audits to ensure the effectiveness of the compliance program. Finally, you will understand the importance of business ethics and organizational culture in corporate compliance. In doing so, we will equip you with the skills and knowledge necessary to implement and maintain effective compliance programs that protect your organization and foster a culture of integrity and accountability. If you want to learn more, join us and make corporate compliance a priority. We look forward to seeing you!