This site uses cookies for its functionality, if you want to learn more or opt out of all or some cookies href="/ita/pag/informativa_cookies_privacy/66/">click here.
By closing this banner or clicking any of its elements, you consent to the use of cookies.

Management System

1.Model

Declines and communicates the principles to which the Organizations are inspired. The application of the Code of Ethics is an effective means to prevent illegal behavior by those who work in the name and on behalf of the company, because it introduces a clear and explicit definition of the ethical and social responsibilities of shareholders, managers, middle managers, employees, and suppliers to different groups of stakeholders.


2.Investigations

It allows you to manage the entire investigation management cycle from the definition of the project, the feasibility analysis, the assignment and management of the activities and the relative responsibility, the upload of the documentation, the closure and the final balance. Enables management of approval and information workflows.


3.Sensitive Activities

Apply the regulatory update for the identification and definition of corporate activities at risk of crime. It systematizes and enables an analysis of company activities, decision-making processes and the internal control system. On the basis of the analysis, the subjects, the activities and the categories of operations for which there is a risk of committing the offenses envisaged by the Decree will be identified. It allows the analysis and evaluation of existing procedures containing sensitive activity. It produces the General Risk Assessment Framework for each type of crime, associating it to the process and its manager before and after the preventive measures adopted or to be adopted. The Risk Map of Crimes represents the summit's commitment in the management and control of Sensitive Activities.


4.Protocols

Build/update the Crime Prevention Protocols.


5.Surveillance (Supervisory Board)

Ensures the tracking and reporting of the entire supervisory process. Defines/updates the Supervisory Plan, convenes and manages SB meetings. It supports the activity of the Supervisory Board through a flow of information and data differentiated by the type of sensitive activities and the identified risks and crimes. The Platform allows access to external SB members.


6.Review

Predisposition survey and preventive, review report.

Integration

Integrated Flows

The Management System is completed through the procedural flows shown alongside. The flows allow integration with other management systems. For example, in the Audit flow it is possible to manage Environmental, Health and Safety, Quality, Energy, etc. audits.


Flow Rules and Laws for the management of legal requirements by company managers

It allows to produce the regulatory framework, the systematization of the provisions contained in the provisions and to assess the legislative compliance by identifying methods of verification and control and those responsible. Regulatory schedule with sending notifications of prescriptions to managers.


Authorization Management Flow

It allows to manage the authorization from the identification, to the assignment of responsibility. Creates the authorization framework, allows management of the related activities and creates the authorization register. Schedule with notification of notice and registration of the accomplishment with upload of documentation.

Other Processes

Management of data flow to Supervisory Body 

It is possible to make the platforms or management tools already existing in the Company with KRCTM dialogue, in order to have a single "control center" available for the verification activities of the Managers and the Supervisory Body.

Privacy

In KRCTM the data processing, the technical measures of prevention and the controls, the offices in charge and the persons in charge of the treatments are identified. Risk (PIA), residual risk and treatment actions are analyzed and assessed. The informative and the treatment register are generated. The right to be forgotten is managed.