OE POSSIBLE EVENT TYPES (ONE ANSWER

US 20050027649A1
(19) United States
(12) Patent Application Publication (10) Pub. N0.: US 2005/0027649 A1
(43) Pub. Date:
Cech
(54) EVENT TYPER
Feb. 3, 2005
Publication Classi?cation
(76) Inventor: Richard Cech, New York, NY (US)
(51)
Int.(IL7 ........................... ../\63F 9/24;z\63F 13/00;
G06F 17/00; G06F 19/00;
G061I 17/60
Correspondence Address:
(52)
DOCKET ADMINISTRATOR
LOWENSTEIN SANDLER PC
65 LIVINGSTON AVENUE
67)
(22) Filed:
ABSTRACT
Amethod of categorizing risk events is presented. Aminimal
list of predetermined questions is presented to a user seeking
to “type” a risk event. The questions are probative regarding
the event, but non-intuitive compared to traditional ques
ROSELAND, NJ 07068 (US)
(21) Appl. No.:
[LS.CL .............................................................. ..705os
10/789,583
tions that elicit an event narrative. The ansWers to the
questions de?ne “attributes of the event”. The method maps
the ansWers to lists of possible event types. Each successive
ansWer generates another list of possible event types. The
lists of possible event types are then combined to yield one
Feb. 27, 2004
or more common event types for the occurrence of a risk
Related US. Application Data
event being typed. In the preferred embodiment, ?ve ques
tions have been found to be sufficient to type most, if not all,
(60)
Provisional application No. 60/450,800, ?led on Feb.
28, 2003. Provisional application No. 60/450,809,
preferably one event type that is recorded for each risk event
?led on Feb. 27, 2003.
occurrence.
event occurrences. The result is one or more event types,
QUESTIONS ARE POSEO TO
PARTY TYPING A RISK EVENT
T
EVENT TYPER RECEIVES
ANSWERS TO THE QUESTIONS
1
VENT TYPER NAPS ANSWERS TO LISTS
fatocK A
/BLOCK B
farm 0
OE POSSIBLE EVENT TYPES (ONE ANSWER
PER QUESTION. ONE LIST PER ANSWER)
1
T
FUNCTIONAL RESULT IS ONE OR MORE fstocK 0
EVENT TYPES IS ASSIGNED TO THE EVENT
ACTION IS TAKEN BASED ON
ONE OR MORE EVENT TYPINGS
fatocx E
Patent Application Publication
Feb. 3, 2005 Sheet 1 0f 10
FIG. 1
14%
_/15
\E?“
13
11
\W
FIG. 2
Q
_/23
/24
22
[21
FIG. 3
1Q
(9
32
US 2005/0027649 A1
Patent Application Publication
Feb. 3, 2005 Sheet 2 of 10
US 2005/0027649 A1
FIG. 4
QUESTIONS ARE POSED TO
PARTY TYPING A RISK EVENT
_,»BLOEK A
T
EVENT TYPER RECEIVES
ANSWERS TO THE QUESTIONS
T
EVENT TYPER NAPS ANSWERS TO LISTS ,/'BLOCK O
OF POSSIBLE EVENT TYPES TONE ANSWER
PER QUESTION. ONE LIST PER ANSWER]
I
FUNCTIONAL RESULT IS ONE OR MORE ,/-BLOCK 0
EVENT TYPES IS ASSIGNED TO THE EVENT
1
ACTION IS TAKEN BASED ON
ONE OR MORE EVENT TYPINOS
fBLOCK E
Patent Application Publication
Feb. 3, 2005 Sheet 4 0f 10
US 2005/0027649 A1
FIG. 6A
DECISION MAPPINGS OF COR "EVENT TYPER' :
OUESTION 1
EVENT TYPE:
THEFT/FRAUD (EXTERNAL)
THEF FRAUD (EXTERNAL)
THEFT/FRAUD (EXTERNAL)
THEFT/FRAUD (EXTERNAL)
THEFT/FRAUD (EXTERNAL)
THEFT/FRAUD (INTERNAL)
THEFT/FRAUD (INTERNAL)
UNAUTHORIZED TRADING
INFORMATION SECURITY
PERSONAL SAFETY
PERSONAL
PERSONAL
PERSONAL
EMPLOYEE
SAFETY
SAFETY
SAFETY
RELATIONS
DIVERSITY! DISCRIMINATION
DIVERSITY! DISCRIMINATION
NATURAL DISASTER
NATURAL DISASTER
TERRORISM! POLITICAL
MALICIOUS DAMAGE
MALICIOUS DAMAGE
MALICIOUS DAMAGE
MALICIOUS DAMAGE
MALICIOUS DAMAGE
MALICIOUS DAMAGE
MALICIOUS DAMAGE
DISCLOSURE. SUITABILITY G FIDUCIARY
IMPROPER BUSINESS PRACTICES (BY FIRM)
IMPROPER BUSINESS PRACTICES (BY FIRM)
IMPROPER BUSINESS PRACTICES (BY FIRM)
IMPROPER BUSINESS PRACTICES (AS VICTIM)
TAX VIOLATION
ADVISORY ACTIVITIES
SPONSORSHIP & SELECTION
REGULATORY MONITORING / REPORTING
TRANSACTION PROCESSING
CLIENT ACCOUNT ERROR
SYSTEM FAILURE
VENDOR DISPUTE
IINTTIATOR:
EMPLOYEE (EXTERNAL)
J
EXTERNAL PERSON / ANYBODY
CLIENT
PARTNER CO-VENTURER
UNKNOWN
EMPLOYEE (INTERNAL)
EMPLOYEE (INTERNAL) w/CONFEDERATES
EMPLOYEE (INTERNAL)
HACKER
EMPLOYEE (INTERNAL)
EXTERNAL PERSON / ANYBODY
CLIENT
UNKNOWN
EMPLOYEE (INTERNAL)
EMPLOYEE (INTERNAL)
EMPLOYEE (INTERNAL) w/CONFEDERATES
EXTERNAL FORCE (NATURAL)
EXTERNAL FORCE (INFRASTRUCTURE)
TERRORIST/ ACTIVIST
EMPLOYEE (INTERNAL)
EMPLOYEE (INTERNAL) w/CONFEDERATES
EMPLOYEE (EXTERNAL)
EXTERNAL PERSON / ANYBODY
CLIENT
PARTNER CO-VENTURER
HACKER
EMPLOYEE (INTERNAL)
EMPLOYEE (INTERNAL)
EMPLOYEE
CLIENT
EMPLOYEE
EMPLOYEE
EMPLOYEE
EMPLOYEE
EMPLOYEE
EMPLOYEE
EMPLOYEE
(INTERNAL) w/CONFEDERATES
(EXTERNAL)
(INTERNAL)
(INTERNAL)
(INTERNAL)
(INTERNAL)
(INTERNAL)
(INTERNAL)
COMPUTER OR DATA SYSTEM
EMPLOYEE (EXTERNAL)
Patent Application Publication
Feb. 3, 2005 Sheet 5 0f 10
US 2005/0027649 A1
FIG. 68
DECISION MAPPINGS OF COR "EVENT TYPER' :
QUESTION 2
(EVENT TYPE:
THEFT/FFAUD (EXTERNAL)
THEFT/FRAUD (INTERNAL)
UNAUTHORIZED TRADING
INFORMATION SECURITY
INFORMATION SECURITY
INFORMATION SECURITY
PERSONAL SAFETY
EMPLOYEE RELATIONS
DIVERSITY! DISCRIMINATION
NATURAL DISASTER
TERRORISM! POLITICAL
TERRORISM! POLITICAL
MALICIOUS DAMAGE
DISCLOSURE. SUITABILITY C FIDUCIARY
IMPROPER BUSINESS PRACTICES (BY FIRM)
IMPROPER BUSINESS PRACTICES (AS VICTIM)
TAX VIOLATION
ADVISORY ACTIVITIES
SPONSORSHIP C SELECTION
REGULATORY MONITORING I REPORTING
TRANSACTION PROCESSING
CLIENT ACCOUNT ERROR
SYSTEM FAILURE
VENDOR DISPUTE
(BENzFIT TC .V]TIATOR:
PEPSONAL BEAE I)
PERSONAL BENEFIT
PERSONAL BENEFIT
PERSONAL BENEFIT
NON-FINANCIAL PERSONAL BENEFIT! MOTIVE
BENEFIT TO ANOTHER FIRM
NO BENEFIT INTENDED! MISTAKE
BENEFIT TO FIRM
NON-FINANCIAL PERSONAL BENEFIT! MOTIVE
NO BENEFIT INTENDED! MISTAKE
PERSONAL BENEFIT
NON-FINANCIAL PERSONAL BENEFIT! MOTIVE
NON-FINANCIAL PERSONAL BENEFIT! MOTIVE
BENEFIT TO FIRM
BENEFIT TO FIRM
'
BENEFIT TO ANOTHER FIRM
BENEFIT TO FIRM
BENEFIT TO FIRM
BENEFIT TO FIRM
NO BENEFIT INTENDED! MISTAKE
NO BENEFIT INTENDED! MISTAKE
NO BENEFIT INTENDED! MISTAKE
NO BENEFIT INTENDED! MISTAKE
BENEFIT TO FIRM
Patent Application Publication
Feb. 3, 2005 Sheet 6 0f 10
US 2005/0027649 A1
F16. bL'
DECISION MAPPINGS OF COR "EVENT TYPER' :
QUESTION 3
[ET_E_NT TYPE:
THEFT/FRAUD
THEFT/FRAUD
THEFT/FRAUD
THEFT/FRAUD
THEFT/FRAUD
THEFTIFRAUD
(EXTERNAL)
(EXTERNAL)
(EXTERNAL)
(INTERNAL)
(INTERNAL)
(INTERNAL)
)IMPACTED:
UNAUTHORIZED TRADING
INFORMATION SECURITY
INFORMATION SECURITY
INFORMATION SECURITY
PERSONAL SAFETY
PERSONAL SAFETY
PERSONAL SAFETY
EMPLOYEE RELATIONS
FIRM I SHAREHOLDERS
CLIENT
ANOTHER FIRM
FIRM ! SHAREHOLDERS
CLIENT
MEMBER OF GENERAL PUBLIC I ANYBODY
FIRM ! SHAREHOLDERS
FIRM I SHAREHOLDERS
EMPLOYEE
CLIENT
EMPLOYEE
CLIENT
MEMBER OF GENERAL PUBLIC I ANYBODY
EMPLOYEE
DIVERSITY! DISCRIMINATION
DIVERSITY! DISCRIMINATION
DIVERSITY! DISCRIMINATION
EMPLOYEE
NATURAL DISASTER
NATURAL DISASTER
NATURAL DISASTER
NATURAL DISASTER
TERRORISM! POLITICAL
TERRORISM! POLITICAL
TERRORISM! POLITICAL
TERRORISM! POLITICAL
MALICIOUS DAMAGE
MALICIOUS DAMAGE
MALICIOUS DAMAGE
MALICIOUS DAMAGE
MALICIOUS DAMAGE
DISCLOSURE. SUITABILITY 8 FIDUCIARY
IMPROPER BUSINESS PRACTICES (BY FIRM)
IMPROPER BUSINESS PRACTICES (BY FIRM)
IMPROPER BUSINESS PRACTICES (BY FIRM)
IMPROPER BUSINESS PRACTICES (BY FIRM)
IMPROPER BUSINESS PRACTICES (BY FIRM)
IMPROPER BUSINESS PRACTICES (BY FIRM)
IMPROPER BUSINESS PRACTICES (AS VICTIM)
EMPLOYEE
TAX VIOLATION
ADVISORY ACTIVITIES
SPONSORSHIP C SELECTION
REGULATORY MONITORING ! REPORTING
REGULATORY MONITORING I REPORTING
TRANSACTION PROCESSING
TRANSACTION PROCESSING
TRANSACTION PROCESSING
CLIENT ACCOUNT ERROR
SYSTEM FAILURE
SYSTEM FAILURE
SYSTEM FAILURE
VENDOR DISPUTE
VENDOR DISPUTE
CLIENT
'
MEMBER OF GENERAL PUBLIC I ANYBODY
FIRM / SHAREHOLDERS
CLIENT
MULTIPLE
FIRM I SHAREHOLDERS
EMPLOYEE
CLIENT
MULTIPLE
FIRM I SHAREHOLDERS
EMPLOYEE
CLIENT
MEMBER OF GENERAL PUBLIC I ANYBODY
MULTIPLE
CLIENT
FIRM I SHAREHOLDERS
EMPLOYEE
CLIENT
ANOTHER FIRM
MEMBER OF GENERAL PUBLIC I ANYBODY
REGULATORY! PUBLIC OR GOVERNMENTAL INTEREST
FIRM I SHAREHOLDERS
REGULATORY! PUBLIC OR GOVERNMENTAL INTEREST
CLIENT
FIRM ! SHAREHOLDERS
MEMBER OF GENERAL PUBLIC I ANYBODY
REGULATORY! PUBLIC OR GOVERNMENTAL INTEREST
FIRM ! SHAREHOLDERS
CLIENT
ANOTHER FIRM
CLIENT
FIRM ! SHAREHOLDERS
CLIENT
ANOTHER FIRM
FIRM ! SHAREHOLDERS
ANOTHER FIRM
4|
Patent Application Publication
Feb. 3, 2005 Sheet 7 0f 10
US 2005/0027649 A1
FIG. ED
DEBISIDN MAPPINGS 0F COR 'EvENT IYPER“ 1
(IUESTIDN 4
(EVENT Y’E:
TE EFT/FFAUD (EXTERNAL)
THEFT/FRAUD (EXTERNAL)
THEFT/FRAUD (EXTERNAL)
THEFT/FRAUD (EXTERNAL)
THEFT/FRAUD (EXTERNAL)
THEFT/FRAUD (INTERNAL)
THEFT/FRAUD (INTERNAL)
THEFT/FRAUD (INTERNAL)
THEFT/FRAUD (INTERNAL)
UNAUTRDRIZED TRADINB
INEDRNATIDN SEDURITY
INEDRNATIDN SECURITY
INEDRNATIDN SECURITY
PERSONAL SAFETY
ENPLDYEE RELATIDNS
ENPLDYEE RELATIDNS
DIVERSITY! DISCRIMINATION
DIYERSITY/ DISCRIMINATION
NATUHAL DISASTER
NATURAL DISASTER
NATURAL DISASTER
NATURAL DISASTER
NATURAL DISASTER
NATURAL DISASTER
TERRDRISN/ PDLITIDAL
TERRDRISN/ POLITICAL
TERRDRISN/ POLITICAL
TERRDRISN/
TERRDRISN/
TERRDRISN/
TERRDRISN/
PDLITIcAL
POLITICAL
POLITICAL
POLITICAL
TERRDRISN/ POLITICAL
MALICIOUS DAMAGE
MALICIOUS DAMAGE
MALICIOUS DAMAGE
DISCLOSURE. SUITABILITY S EIDUcIARY
INPRDPER BUSINESS PRACTICES (BY EIRN)
INPRDPER BUSINESS PRACTICES (BY EIRN)
INPRDPER BUSINESS PRAcTIcES (BY EIRN)
INPRDPER BUSINESS PRACTICES (BY EIRN)
INPRDPER BUSINESS PRACTICES (BY EIRN)
INPRDPER BUSINESS PRAcTIcES (BY EIRN)
INPRDPER BUSINESS PRACTICES (AS vIcTIN)
INPRDPER BUSINESS PRACTICES (AS vIcTIN)
INPRDPER BUSINESS PRACTICES (AS VICTIM)
IN=A:T TYPE:
)
EINANDIAL (DIRECT)
FINANCIAL (INDIRECT. TO CLIENT I 3RD PARTY)
TRADING / MARKET IMPACT
PHYSICAL INJURY
PHYSICAL OR INTELLECTUAL PROPERTY LOSS I DAMAGE
FINANCIAL (DIRECT)
FINANCIAL (INDIRECT. TO CLIENT I 3RD PARTY)
PHYSICAL OR INTELLECTUAL PROPERTY LOSS I DAMAGE
FINE / PENALTY
TRADING I MARKET IMPACT
FINANCIAL (DIRECT)
FINANCIAL (INDIRECT. TO CLIENT / 3RD PARTY)
HUMAN. PERSONAL. PRIVACY RIGHTS
PHYSICAL INJURY
FINANCIAL (DIRECT)
FINANCIAL (INDIRECT, TO CLIENT I 3RD PARTY)
PHYSICAL INJURY
HUMAN. PERSONAL. PRIVACY RIGHTS
FINANCIAL (INDIRECT. T0 CLIENT I 3RD PARTY)
TRADING I MARKET IMPACT
PHYSICAL INJURY
PHYSICAL OR INTELLECTUAL PROPERTY LOSS I DAMAGE
FAILED RECOURSE
MULTIPLE
FINANCIAL (DIRECT)
FINANCIAL (INDIRECT. TO CLIENT I 3RD PARTY)
TRADING I MARKET IMPACT
PHYSICAL INJURY
HUMAN. PERSONAL. PRIVACY RIGHTS
PHYSICAL OR INTELLECTUAL PROPERTY LOSS I DAMAGE
FAILED RECOURSE
MULTIPLE
FINANCIAL (DIRECT)
FINANCIAL (INDIRECT, TO CLIENT I 3RD PARTY)
PHYSICAL OR INTELLECTUAL PROPERTY LOSS I DAMAGE
FINANCIAL (INDIRECT. TO CLIENT I 3RD PARTY)
FINANCIAL (DIRECT)
FINANCIAL (INDIRECT. T0 CLIENT I 3RD PARTY)
TRADING I MARKET IMPACT
HUMAN. PERSONAL. PRIVACY RIGHTS
PHYSICAL OR INTELLECTUAL PROPERTY LOSS l DAMAGE
FINE I PENALTY
FINANCIAL (DIRECT)
TRADING I MARKET IMPACT
PHYSICAL OR INTELLECTUAL PROPERTY LOSS I DAMAGE
Patent Application Publication
Feb. 3, 2005 Sheet 8 0f 10
US 2005/0027649 A1
FIG. 6E
DECISION MAPPINGS OF COR ‘EVENT TYPER':
QUESTION 4 (PART II)
EVENT TYPE:
1 IM ACT TYPE:
)
TAX VICLATION
TAX VIOLATION
TAX VIOLATION
ADVISORY ACTIVITIES
SPONSORSHIP C SELECTION
SPONSORSHIP 8 SELECTION
FIVANCIAL (DIRECT)
FINE I PENALTY
MULTIPLE
FINANCIAL (INDIRECT, TO CLIENT / 3RD PARTY)
FINE / PENALTY
FAILED RECOURSE
REGULATORY MONITORING / REPORTING
TRANSACTION PROCESSING
TRANSACTION PROCESSING
TRANSACTION PROCESSING
TRANSACTION PROCESSING
TRANSACTION PROCESSING
CLIENT ACCOUNT ERROR
SYSTEM FAILURE
SYSTEM FAILURE
SYSTEM FAILURE
SYSTEM FAILURE
VENDOR DISPUTE
FINE / PENALTY
FINANCIAL (DIRECT)
FINANCIAL (INDIRECT. TO
TRADING / MARKET IMPACT
FAILED RECOURSE
MULTIPLE
FINANCIAL (INDIRECT. TO
FINANCIAL (DIRECT)
FINANCIAL (INDIRECT. TO
TRADING / MARKET IMPACT
MULTIPLE
FINANCIAL (INDIRECT, TO
CLIENT I 3RD PARTY)
CLIENT / 3RD PARTY)
CLIENT / 3RD PARTY)
CLIENT / 3RD PARTY)
Patent Application Publication
Feb. 3, 2005 Sheet 9 0f 10
US 2005/0027649 A1
FIG. 6F
DECISION MAPPINGS OF COR "EVENT TYPER' :
IENT TYRE:
THEFT/FRAUD (EXTERNAL)
THEFT/FRAUD (EXTERNAL)
THEFT/FRAUD (EXTERNAL)
THEFT/FRAUD (EXTERNAL)
THEFT/FRAUD (EXTERNAL)
THEFT/FRAUD (INTERNAL)
THEFT/FRAUD (INTERNAL)
THEFT/FRAUD (INTERNAL)
THEFT/FRAUD (INTERNAL)
THEFT/FRAUD (INTERNAL)
UNAUTHORIZED TRADING
UNAUTHORIZED TRADING
UNAUTHORIZED TRADING
INFORMATION SECURITY
INFORMATION SECURITY
INFORMATION SECURITY
PERSONAL SAFETY
PERSONAL SAFETY
EMPLOYEE RELATIONS
DIVERSITY! DISCRIMINATION
DIVERSITY! DISCRIMINATION
DIVERSITY! DISCRIMINATION
DIVERSITY! DISCRIMINATION
NATURAL DISASTER
NATURAL DISASTER
NATURAL DISASTER
TERRORISM! POLITICAL
TERRORISM! POLITICAL
TERRORISM! POLITICAL
MALICIOUS DAMAGE
MALICIOUS DAMAGE
MALICIOUS DAMAGE
MALICIOUS DAMAGE
MALICIOUS DAMAGE
MALICIOUS DAMAGE
MALICIOUS DAMAGE
MALICIOUS DAMAGE
DISCLOSURE. SUITABILITY 8 FIDUCIARY
DISCLOSURE. SUITABILITY 8 FIDUCIARY
IMPROPER BUSINESS PRACTICES (BY FIRM)
IMPROPER BUSINESS PRACTICES (BY FIRM)
IMPROPER BUSINESS PRACTICES (BY FIRM)
IMPROPER BUSINESS PRACTICES (BY FIRM)
IMPROPER BUSINESS PRACTICES (BY FIRM)
IMPROPER BUSINESS PRACTICES (AS VICTIM)
IMPROPER BUSINESS PRACTICES (AS VICTIM)
IMPROPER BUSINESS PRACTICES (AS VICTIM)
QUESTION 5
TDU' Y TYRE
ORDINAFY CONTRACTUAL! COMMERCIAL COUNTERPARTY
MEMBER OF GENERAL PUBLIC! ORDINARY CITIZEN
NOT SURE! NOT APPLICABLE
EMPLOYEE CONDUCTING INTERNAL, NON-FIDUCIARY TASK
INV MANAGER! FIDUCIARY! TRUSTEE! DUTY OF CARE
NOT SURE! NOT APPLICABLE
ORDINARY CONTRACTUAL! COMMERCIAL COUNTERPARTY
INV MANAGER! FIDUCIARY! TRUSTEE! DUTY OF CARE
MEMBER OF GENERAL PUBLIC! ORDINARY CITIZEN
EMPLOYEE CONDUCTING INTERNAL. NON-FIDUCIARY TASK
MEMBER OF GENERAL PUBLIC! ORDINARY CITIZEN
EMPLOYEE CONDUCTING INTERNAL. NON-FIDUCIARY TASK
NOT SURE! NOT APPLICABLE
MEMBER OF GENERAL PUBLIC! ORDINARY CITIZEN
NOT SURE! NOT APPLICABLE
EMPLOYEE CONDUCTING INTERNAL. NON-FIDUCIARY TASK
MEMBER OF GENERAL PUBLIC! ORDINARY CITIZEN
NOT SURE! NOT APPLICABLE
EMPLOYER
MEMBER OF GENERAL PUBLIC! ORDINARY CITIZEN
EMPLOYEE CONDUCTING INTERNAL. NON-FIDUCIARY TASK
CONTRACTUAL! COMMERCIAL COUNTERPARTY
MEMBER OF GENERAL PUBLIC! ORDINARY CITIZEN
NO HOLE OR RESPONSIBILITY
NOT SURE! NOT APPLICABLE
EMPLOYEE CONDUCTING INTERNAL. NON-FIDUCIARY TASK
MEMBER OF GENERAL PUBLIC! ORDINARY CITIZEN
NOT SURE! NOT APPLICABLE
NOT SURE! NOT APPLICABLE
MEMBER OF GENERAL PUBLIC! ORDINARY CITIZEN
VICARIOUS RESPONSIBILITY FOR EMPLOYEE, AGENT, ETC.
PARTY TO SPECIFICALLY NEGOTIATED CONTRACT
EMPLOYEE CONDUCTING INTERNAL. NON-FIDUCIARY TASK
INV MANAGER! FIDUCIARY! TRUSTEE! DUTY OF CARE
ORDINARY CONTRACTUAL! COMMERCIAL COUNTERPARTY
UNDER DUTY TO DISCLOSE! OFFER SUITABLE DEALS
INV MANAGER! FIDUCIARY! TRUSTEE! DUTY OF CARE
UNDER DUTY TO DISCLOSE! OFFER SUITABLE DEALS
MEMBER OF GENERAL PUBLIC! ORDINARY CITIZEN
ORDINARY CONTRACTUAL! COMMERCIAL COUNTERPARTY
PARTY TO SPECIFICALLY NEGOTIATED CONTRACT
NOT SURE! NOT APPLICABLE
EMPLOYEE CONDUCTING INTERNAL. NON-FIDUCIARY TASK
ORDINARY CONTRACTUAL! COMMERCIAL COUNTERPARTY
PARTY TO SPECIFICALLY NEGOTIATED CONTRACT
NOT SURE! NOT APPLICABLE
Patent Application Publication
Feb. 3, 2005 Sheet 10 0f 10
US 2005/0027649 A1
FIG. 66,
DECISION MAPPINGS OF COR 'EVENT TYPER' :
OUESTION 5 (PART II)
LEVENT TYPE:
TAX VIOLATION
TAX VIOLATION
ADVISORY ACTIVITIES
ADVISORY ACTIVITIES
ADVISORY ACTIVITIES
SPONSORSHIP 8 SELECTION
REGULATORY MONITORING /
REGULATORY MONITORING /
REGULATORY MONITORING !
REGULATORY MONITORING /
REGULATORY MONITORING I
TRANSACTION PROCESSING
TRANSACTION PROCESSING
TRANSACTION PROCESSING
CLIENT ACCOUNT ERROR
SYSTEM FAILURE
SYSTEM FAILURE
SYSTEM FAILURE
SYSTEM FAILURE
SYSTEM FAILURE
SYSTEM FAILURE
SYSTEM FAILURE
VENDOR DISPUTE
VENDOR DISPUTE
[DUTY TYPE:
I
NOT SUFE! NOT APPLICABLE
MEMBER OF GENERAL PUBLIC! ORDINARY CITIZEN
INV MANAGER! FIDUCIARY! TRUSTEE! DUTY OF CARE
PARTY TO SPECIFICALLY NEGOTIATED CONTRACT
ORDINARY CONTRACTUAL! COMMERCIAL COUNTERPARTY
REPORTING
REPORTING
REPORTING
REPORTING
REPORTING
EMPLOYEE CONDUCTING INTERNAL.‘ NON—FIDUCIARY TASK
UNDER DUTY TO DISCLOSE! OFFER SUITABLE DEALS
ORDINARY CONTRACTUAL! COMMERCIAL COUNTERPARTY
EMPLOYEE CONDUCTING INTERNAL. NON-FIDUCIARY TASK
VICARIOUS RESPONSIBILITY FOR EMPLOYEE. AGENT. ETC
NOT SURE! NOT APPLICABLE
EMPLOYEE CONDUCTING INTERNAL. NON-FIDUCIARY TASK
ORDINARY CONTRACTUAL! COMMERCIAL COUNTERPARTY
PARTY TO SPECIFICALLY NEGOTIATED CONTRACT
EMPLOYEE CONDUCTING INTERNAL, NON-FIDUCIARY TASK
MEMBER OF GENERAL PUBLIC! ORDINARY CITIZEN
NOT SURE! NOT APPLICABLE
NO ROLE 0R RESPONSIBILITY
PARTY TO SPECIFICALLY NEGOTIATED CONTRACT
EMPLOYEE CONDUCTING INTERNAL. NON-FIDUCIARY TASK
ORDINARY CONTRACTUAL! COMMERCIAL COUNTERPARTY
INV MANAGER! FIDUCIARY! TRUSTEE! DUTY OF CARE
ORDINARY CONTRACTUAL! COMMERCIAL COUNTERPARTY
PARTY TO SPECIFICALLY NEGOTIATED CONTRACT
Feb. 3, 2005
US 2005/0027649 A1
EVENT TYPER
is needed is a standard Way for all banks to report risk event
types, preferably using industry standard categories.
CROSS REFERENCE TO RELATED
APPLICATIONS
[0001] This application claims the bene?t of US. Provi
sional Applications Ser. No. 60/450,800 ?led Feb. 28, 2003
and Ser. No. 60/450,809 ?led Feb. 27, 2003. The 60/450,800
and 60/450,809 applications are incorporated by reference
herein.
FIELD OF THE INVENTION
[0002]
This invention relates to methods of categorizing
risk, and more particularly to a method of typing risk events
based on prede?ned factors.
[0003]
SUMMARY OF THE INVENTION
[0009] A neW method of categorizing risk events is pre
sented. A minimal list of predetermined questions is pre
sented to a user seeking to “type” a risk event. The questions
are probative regarding the event, but non-intuitive com
pared to traditional questions that elicit a narrative of an
event occurrence. The ansWers to the questions de?ne
“attributes” of the event occurrence. The method maps the
ansWer to each question to a list of possible event types.
Each successive ansWer generates another list of possible
event types. The lists of possible event types are then
combined to yield one or more common event types for the
BACKGROUND OF THE INVENTION
risk event occurrence being typed. In the preferred embodi
ment, ?ve questions have been found to be suf?cient to type
Risk events, such as operational losses, occur rou
event types, preferably one event type that is recorded for
tinely in business. Risk events are occurrences that have
actual or potential ?nancial impact on an organization,
typically impact in eXcess of a de?ned threshold. Risk events
that have adverse consequences to an organization are of
particular importance as they can cause economic loss and
loss of reputation to the organization. Examples of these
types of risk events are theft (by organization outsiders or
employees), employee errors, ?res that destroy records
and/or capital equipment, terrorism and natural disasters.
[0004] Businesses such as ?nancial organizations track
operational losses caused by occurrences of risk events, and
analyze and categorize them. Managers reporting such
losses attempt to accurately de?ne event types. Event typing
most, if not all, event occurrences. The result is one or more
each risk event occurrence. Based on the event type from
one or more event typings, an organization can take actions
including risk event minimization, compliance With risk
event reporting requirements, and establishing appropriate
reserves to protect against future possible risk events.
BRIEF DESCRIPTION OF THE DRAWINGS
[0010]
The advantages, nature and various additional fea
tures of the invention Will appear more fully upon consid
eration of the illustrative embodiments noW to be described
in detail in connection With the accompanying draWings. In
the draWings:
can be useful for reporting the event to the appropriate part
[0011]
of the organization, for storing the event categorization for
business risk event statistics recording, and for the predic
performing the inventive method;
tion of future risk events.
[0012]
[0005] Risk event reporting is of particular importance to
banks. Banks allocate reserves as required by international
FIG. 1 shoWs suitable hardWare environments for
FIG. 2 shoWs a softWare environment suitable for
event typing;
[0013]
FIG. 3 shoWs a Venn diagram illustrating event
convention as contingencies against various types of poten
type selection;
tial risk events. The amount of these allocations is based in
part on past occurrences of risk events. Event typing of past
[0014]
risk event occurrences can also affect insurance policies
related to risks.
FIG. 4 shoWs the steps to perform event typing in
accordance With one embodiment of the invention;
[0015]
FIG. 5 shoWs a graphical user interface suitable for
event typing; and
[0006]
It is important that standardized risk event report
ing be implemented. In part, this is because some reserves
spread risk among many organizations. Standardized risk
event typing can also help to foster an environment that Will
alloW for industry Wide analysis of risk events. Industry
Wide standard risk event reporting Would likely lead to more
meaningful and successful plans to loWer the occurrence of
undesirable risk events.
[0007] The Basel Accord is an international agreement
related to international banking practices. Standardization of
[0016] FIGS. 6A-6G shoW tables of the event types as
mapped to ansWers to questions 1-5.
[0017] It is to be understood that the draWings are for the
purpose of illustrating the concepts of the invention and are
not to scale. It is also understood that all application code,
other frameWork code, database programs, and data that can
be used to implement the inventive method reside on com
puter readable media and run on one or more computer
systems including standard computer components and oper
risk event reporting is one area of interest of the Basel
ating systems as knoWn in the art. Furthermore the invention
Working group. The Institute of Finance Industry group (IIF)
of the Basel Internal Technical Working Group (ITWG) has
can be implemented on a standalone computer, a client
computer communicating With a server computer, or the
adopted industry standards for the assessment of risk events.
softWare modules necessary to implement the inventive
[0008]
method can be distributed among computers on an intranet
or on the Internet. The inventive method can be performed
The problem is that reporters of risk events Within
organizations, and betWeen different organizations, report
event types in non-standard Ways, Which makes later orga
nization Wide or industry Wide analysis more difficult. What
by softWare Written in programming languages as knoWn in
the art, including, but not limited to, object oriented lan
guages such as C++, Java or J2EE.
Feb. 3, 2005
US 2005/0027649 A1
DETAILED DESCRIPTION
[0018]
FIG. 1 shows a hardware con?guration suitable for
use as an event typer. Standalone computer 11 is associated
with non-volatile memory 12. Computer 11 can also be
of the questions. The inventors realiZed that questions
related to speci?c attributes of an event can uniquely de?ne
the event without the need for a typical full descriptive
narrative which must then be analyZed by an expert in risk
such as a hard-drive. The event typer can wholly reside on
event typing.
[0023] The preferred embodiment of the event typer uses
?ve questions to arrive at ?ve answers regarding “attributes”
of the risk event. The ?ve speci?c questions of the preferred
embodiment are merely illustrative of questions useful to
computer 11 with all of the event attributes saved to memory
illicit a minimal set of information needed to arrive at a
connected to network 13 via an intranet or the Internet 14.
Network 13 can be wired or wireless. Another computer 15
can be a server on the network 13 and/or the Internet 14.
Computer 15 is associated with non-volatile memory 16,
12 and the event typer program residing in memory 12. Or,
some of all of the event data such as event attributes may be
stored in a remote memory, such as memory 16. In another
embodiment, computer 11 can merely act as a terminal, with
the event typer program running remotely on one or more
computers connected to the network (not shown) and event
data can be saved to one or more memory storage areas on
the network (not shown).
[0019]
The program code to perform the event typer
function can be a standalone program communicating only
with its own local memory for storing and retrieving event
data. FIG. 2 shows a typical embodiment where the event
typer can be a module, or subprogram 21 of an organiZa
tion’s larger risk management computer system 20. In this
con?guration, main program 22 can call functions in one or
more sub-modules as illustrated by modules 23 and 24
(providing different functions than event typer). The event
typer can also be con?gured as a module in a national or
international reporting system program.
[0020] The inventors realiZed that very speci?c questions
small set of identifying event types. To the best of the
inventor’s knowledge, the ?ve questions of the preferred
embodiment are an example of an optimiZed set of questions
that can be used to identify industry standard event types.
[0024] The answer to each question can be mapped to a list
of possible event types for that answer. FIG. 3 shows the
mapped set of event types as a Venn diagram. Here ellipse
31 represents the list of possible event types 37 generated by
mapping the answer to question 1. Similarly, 32 represents
the mapped list from answer 2, 33 represents the mapped list
from answer 3, 34 represents the mapped list from answer 4,
and 35 represents the mapped list from answer 5. It can then
be seen that hatched intersection area 36 represents one or
more event types 37 of the event being typed. Thus, the
functional result of an event type can be arrived at by ?nding
the common event type(s) that appear in the mapped lists of
event types. In the preferred embodiment, the combination
of attribute choices and the corresponding mapped lists of
possible event types, almost always results in only one
common event type.
of an event that can achieve rapid and standardiZed event
[0025] The attributes associated with each risk event can
be conveniently recorded to a computer media for long term
or permanent storage. This is particularly useful since events
typing. The answers to the questions de?ne predetermined
can then be “re-typed” en mass at a later time should the
characteristics or “attributes” of a risk event occurrence.
standard question set or typing conventions change.
[0026] FIG. 4 shows the method steps of the inventive
about a risk event can be used to create an attribute model
These questions are different than those that are typically
used to bring out the entire narrative of a risk event.
[0021]
Risk events are typically adverse occurrences that
process. First questions are posed to a party with a need to
type a risk event (Block A). The event typer receives
have a negative ?nancial, or potential negative ?nancial
answers for identifying the nature of the initiator of the
impact on an organiZation. Examples of risk events that can
expiring option, employee disputes over compensation
event, any bene?t to the initiator, the impact caused by the
event, the nature of the impact, and the initiator’s role in the
event (Block B). The answer to each question (the attribute)
including severance packages, embeZZlement of funds, natu
ral disasters including related power losses, failure to com
is then mapped to a list of possible event types that correlate
to the attribute (Block C). Next, the lists are compared to
ply with banking regulations including resultant ?nes, loss
derive only those event types 37 that are common to all lists
affect a ?nancial organiZation are: failure to exercise an
of funds do to identity theft, unauthoriZed trading activities
(Block D) as illustrated by intersection 36 of Venn diagram
including improper trades made for personal gain, money
30 of FIG. 3. And ?nally, one or more actions are taken
based on the resultant event type, such as, but not limited to,
laundering including ?nes as a consequences of failure to
detect it, theft of trade secrets from a competitor, theft of
money from ATM machines by employees, failure to state
reporting the event, collating statistics of various event
types, planning strategies to reduce the number of adverse
material facts in offering materials for ?nancial instruments,
violations of environmental laws including resulting ?nes,
and employee misconduct including diversity and discrimi
events, or planning event contingency reserve amounts
nation issues. These are but a few examples of risk events.
resultant list of possible event types for that question can be
Some organiZations may choose to type and report risk
events above some threshold level of impact to the organi
compared with the list resulting from the previous question
Zation, for example, those occurrences of risk events that can
result in losses of over $20,000.
questions. Only the remaining common answers need then
be compared to the possible event types associated with the
next question. Using the latter method, the results are the
[0022] An important aspect of the inventive event typer is
that the attributes (the answers to the questions) are not event
(Block
[0027] Alternatively, after each successive question, the
and reduced to the event types in common between the two
same as those arrived at when all event lists are compared
types. They are rather key characteristics, that when taken as
for common elements only after answering all questions.
a whole, can be important to identifying a risk event type.
[0028] In one embodiment, the questions and their corre
sponding answers are independent of the other questions.
Another important aspect of the invention is the formulation
Feb. 3, 2005
US 2005/0027649 A1
After the answers to each question are mapped to lists of
event types (each list corresponding to one answer to each
question), the resultant event is determined by ?nding the
event types that are common to all mappings. Preferably
only one event type results from the elimination process. In
a second embodiment, there can be additional logic recog
niZing that choices to previous questions can in some cases
limit the ?eld of possible answers to successive questions.
Disallowed answers to successive questions can be disabled
or removed. For example, some of the list of possible
answers can be “grayed out” such that they are still visible
to the user, but inactive and not available for selection. Or,
the logic could cause the list of possible answers to succes
sive questions to become truncated depending on one or
more previous answers or combinations of previous
answers.
[0029]
THE FIVE QUESTIONS WITH ANSWERS OF
THE PREFERRED EMBODIMENT
[0033]
[0035] Employee (external); Client; Member of Gen
eral Public (“External Person”)/Anybody;
[0036] Computer or Data System (while operated
correctly); Hacker; Terrorist/Activist;
[0037] Partner, Co-Venturer; External Force (Natu
[0038]
[0039] Answers (choices): Personal Bene?t; Non
Financial Personal Bene?t/Motive (Including politi
cal bene?t, personal desire to in?ict malicious dam
age or deprivation of others’ personal rights, etc.);
attribute, of the event. For each question only one possible
Bene?t to Firm (To get or maintain business,
improve the terms of a transaction, avoid competi
tion, etc., even if initiator moved by hope or larger
bonus, etc.); Bene?t to Another Firm; No Bene?t
answer may be selected. Once selected, each answer can be
[0030]
ral); External Force (Infrastructure); or Don’t Know.
Question 2: What was Bene?t to Initiator? (What
was Initiator’s action directed to achieve?);
Each question prompts the user for an answer, or
mapped to a list of event types. The mapping associates the
chosen answer (or attribute) with standardiZed events cor
relating to that answer. The lists of event types that correlate
to each answer can be pre-determined by experts in the ?eld
of risk management.
Question 1: Who (What) Initiated the Event?
[0034] Answers (choices): Employee (internal);
Employee (Internal) with Confederates;
Intended/Mistake; or Don’t Know.
[0040] Question 3: Who (what) was Impacted?
[0041] Answers
(choices):
Firm/Shareholders;
Employee; Client; Another Firm; Member of Gen
FIG. 5 shows one embodiment of a user interface
50 according to the invention. The questions are displayed,
for example, as question 1 51. Pull down menus, as for
example the list of choices 52 for the answer to question 1
eral Public/Anybody; Regulatory/Public or Govern
mental Interest; Multiple; or Don’t Know.
[0042] Question 4: What was Nature of Impact? (select the
(not shown pulled down with the choices showing). In this
embodiment, after answering ?ve questions, the user selects
most speci?c that applies)
[0043] Answers (choices): Financial (direct); Finan
cial (indirect, to client/3rd Party); Trading/Market
the screen button “Find Event Type Matches”54 to ?nd the
common event type from the mapped lists of possible event
types corresponding to the answer chosen for each question.
The common event is then displayed in results window 53.
Impact; Physical Injury; Human, Personal, Privacy
Rights; Physical or Intellectual Property Loss/Dam
age; Fine/Penalty; Failed Recourse; Multiple; or
Don’t Know.
[0031] FIGS. 6A-6G show the mappings from answers
1-5 to lists of event types according to the preferred embodi
ment. Here the event typer is optionally referred to in one
embodiment as the corporate operational risk (COR) event
typer. For each question, the party seeking to type an event
is permitted to choose only one answer. For each answer
chosen, FIGS. 6A-6G show the mapping to a list of event
types that correspond to the answer for a given question. The
order in which the questions are asked and answered is
unimportant. At the completion of the questions, the result
ant event type or types are those events that are common to
all of the mappings. In other words for an event type to be
the functional result as the standardiZed event type for the
characteriZation of a particular risk event, that type must
have appeared in all of the mappings from the answers to the
?ve questions.
[0032] The inventors discovered that ?ve questions can be
sufficient to yield the correct standardiZed event types for all
risk events that have been considered to date. The ?ve
questions of the preferred embodiment provide answers that
become the attributes of the event. The ?ve questions of the
preferred embodiment are: 1) Who initiated the risk event?
[0044]
Question 5: What was the Initiator’s role/level of
responsibility/legal duty in the event? (select the most
speci?c that applies) Answers (choices): Member of General
Public/Ordinary CitiZen; Ordinary Contractual/Commercial
Counterparty; Employee Conducting Internal, Non-Fidu
ciary Task;
[0045] Employer; Party to Speci?cally Negotiated
Contract; Under Duty to Disclose/Offer Suitable
Deals; Investment Manager/Fiduciary/Trustee/Duty
of Care; Vicarious Responsibility for employee,
agent, etc; No Role or Responsibility; or Don’t
Know.
EXAMPLES
[0046] The following 14 examples illustrate answers to the
5 questions regarding exemplary risk events and the event
types selected for those scenarios by one embodiment of the
event typer. It is to be understood that these scenarios are not
intended to limit the nature of risk event scenarios that can
be typed by the event typer, but are merely illustrative of the
typing process.
[0047] For the ?rst example, the mapping process is
shown in detail. The answers to the ?ve questions are
2) What was the bene?t to the initiator? 3) Who or what was
impacted by the event? 4) What was the nature or the
mapped to possible event types using the mapping tables of
impact? 5) What was the initiator’s role or duty?
event type lists are found to yield one or more (preferably
FIG. 6. Then the common event types of the ?ve mapped
Feb. 3, 2005
US 2005/0027649 A1
one) standardized event type(s) suitable to describe that
particular occurrence of a risk event. The same principle of
In another embodiment, the user can be informed of the
proper event type as soon as only one event type has been
selection applies to the remainder of the examples and Whilst
not shoWn, can be conveniently derived from the FIG. 6
identi?ed and can be relieved of ansWering the remainder of
the questions. Of course there may situations yielding no
tables as is done in the ?rst tWo examples.
event type (null set) after all of the questions are ansWered,
and this situation too, can be informative. Anull ansWer may
Example 1
mean there is a yet unde?ned risk event, or it can mean that
cise an expiring option, the client representative became
the event presented no risk at all to the entity typing its oWn
risks.
distracted and failed to make the call. The client refused to
[0061] It should also be noted, that an important advantage
recognize the exercise When it Was ?nally made several
hours late.
of attribute models is that the attributes for each risk event
can be stored aWay inde?nitely. This can be particularly
[0048]
Although noti?ed in advance of the need to exer
[0049]
Question 1: Who (What) Initiated the Event?
[0050] =>AnsWer (A1): Employee (Internal)
[0051] A1 mapping to possible event types: Theft/Fraud
(internal); UnauthoriZed Trading; Personal Safety;
Employee Relations; Diversity/Discrimination; Malicious
Damage; Disclosure, Suitability & Fiduciary; Improper
Business Practices (by ?rm); Tax Violation; Advisory
Activities; Sponsorship & Selection; Regulatory Monitor
ing/Reporting; Transaction Processing; and Client Account
Error.
[0052] After only ansWering one question, the list of
possible event types is as listed above, and cannot yet be
further limited.
[0053]
Question 2: What Was Bene?t to Initiator? (What
Was Initiator’s action directed to achieve?)
[0054] =>AnsWer
No Bene?t Intended/Mistake
A2 mapping to possible event types: Personal
Safety; Natural Disaster; Regulatory Monitoring/
Reporting; Transaction Processing; Client Account
Error; and System Failure.
[0055] After ansWering the second question, a number of
proffered event types that resulted from the A1 mapping can
advantageous if the de?nitions of standardiZed event types
change. In the case of such a change, all of the prior events,
along With their attributes can be run through a program (a
neW set of rules or mappings) to change the events according
to the neW rules. It can thus be seen that had all of the
questions in this example not been ansWered, even Where
unnecessary under the prevailing model, later re-classi?ca
tion of prior events might be impossible.
[0062]
As event types have been narroWed to one at
question 3, it might be unnecessary to continue With this
example, but as just discussed, it can still be useful to assign
all ?ve attributes to a given risk event. Therefore We
continue the example 1 illustration With Question 4:
[0063]
Question 4: What Was Nature of Impact? (select the
most speci?c that applies)
[0064] =>AnsWer (A4): Financial (direct)
[0065]
The event types mapped to A4are: Theft/Fraud
(external); Theft/Fraud (internal); Information Security;
Employee Relations; Terrorism/Political; Malicious Dam
age; Improper Business Practices (by ?rm); Improper Busi
ness Practices (as victim); Tax Violation; Transaction Pro
cessing; and System Failure.
noW be eliminated as possible event types for this risk event
[0066] It can be seen that Transaction Processing remains
as the single selected event type for this risk event folloWing
occurrence: A1 mapping to possible event types reduced by
question 4.
the A2 mapping (all ansWers not shoWn in A2 are elimi
nated): Personal Safety, Regulatory Monitoring/Reporting,
Transaction Processing, Client Account Error.
[0056] Question 3: Who (What) Was Impacted?
[0057] =>AnsWer
Firm/Shareholders
[0058] According to FIG. 5C, A3maps to possible event
types: Theft/Fraud (external); Theft/Fraud (internal); Unau
thoriZed Trading; Information Security; Natural Disaster;
Terrorism/Political; Malicious Damage; Improper Business
[0067] Question 5: What the Initiator’s role/level of
responsibility/legal duty in the event? (select the most
speci?c that applies)
[0068] =>AnsWer
Employee Conducting Inter
nal, Non-Fiduciary task.
[0069]
The possible event types that map to A5are: Theft/
Fraud (external); Theft/Fraud (internal); UnauthoriZed Trad
ing; Information Security; Diversity/Discrimination; Terror
ism/Political; Malicious Damage; Improper Business
Practices (by ?rm); Improper Business Practices (as victim);
Sponsorship & Selection; Transaction Processing; System
Monitoring/Reporting;
failure; and Vendor Dispute.
Account Error; and System Failure.
[0059]
[0070] Again, the only surviving event type in common
With all ?ve lists is Transaction Processing. And, because
Transaction Processing exists in all ?ve lists, the null set
While the comparisons and reductions can be done
in various Ways as Will be apparent to those skilled in the art,
for illustrative purposes, the elimination process can
progress by continuing to eliminate possible event types
from the original (noW reduced) A1 list: Transaction Pro
cessing.
[0060] Here it can be seen that after ansWering only three
of the ?ve questions, the proper event type has been selected.
In one embodiment of the invention, the comparison process
is not done until after all ?ve questions have been ansWered.
Practices (by ?rm); Sponsorship & Selection; Regulatory
Transaction Processing;
Client
ansWer is avoided.
Example 2
[0071] A terminated employee ?led suit, claiming she Was
guaranteed a salary and bonus during the year. But in fact
she Was dismissed in a merger-related doWnsiZing and
offered a smaller severance package. A1: Employee (Inter
Feb. 3, 2005
US 2005/0027649 A1
(indirect, to client/3rd Party) Task; A5: Employer—Event
Type: Employee Relations.
No member of the bank pro?ted personally from the illegal
activity. A1: Employee (Internal); A2: No Bene?t Intended/
Mistake; A3: Regulatory/Public or Governmental Interest;
Example 3
A4: Fine/Penalty; A5: Employee Conducting Internal, Non
Fiduciary Task—Event Type: Regulatory, Monitoring &
nal); A2: Bene?t to Firm; A3: Employee; A4: Financial
[0072] Aretail employee used the bank’s “house account”
Reporting
system to open a checking account. He diverted tWo incom
ing Wire transfers into the account, quickly moving the
Example 10
proceeds to an offshore repository. He then boarded a plane
[0079] The bank sues a competitor for utiliZing trade
secrets provided it by an employee Who the information With
him When he left the ?rm. A1: Employee (External); A2:
Bene?t to Another Firm; A3: Firm/Shareholders; A4: Intel
and left the country. The employee’s present Whereabouts
are unknoWn. A1: Employee (Internal); A2: Personal Ben
e?t; A3: Firm/Shareholders; A4: Financial (direct); A5 :
Employee Conducting Internal, Non-Fiduciary Task—Event
Type: Theft/Fraud (Internal).
Example 4
[0073] A squirrel strayed into the main poWer grid for the
northeastern United States, electrocuting itself and causing
a six-hour poWer blackout. Money Was lost When several
partially executed trades Were later completed at different
market prices. A1: External Force (natural); A2: No Bene?t
Intended/Mistake; A3: Firm/Shareholders; A4: Trading/
Markets Impact; A5: No Role or Responsibility—Event
Type: Natural Disaster.
lectual Property Loss; A5: Ordinary Contractual/Commer
cial Counter party—Event Type: Improper Business Prac
tices (?rm as victim) Or, one could also look at this as
employee theft.
Example 11
[0080] In 2001, employees of an armored car service that
?lled ATM machines for multiple banks in the southWest
region of the US, diverted $203,000 for their oWn use. A1:
Employee (External); A2: Personal Bene?t; A3: Firm/Share
holders; A4: Financial (direct); A5: Employee Conducting
Internal, Non-Fiduciary Task—Event Type: Theft/Fraud
Example 5
[0074] Holdings in a private banking client’s managed
(external).
investment account exceeded the agreed-upon limit for
high-yield paper. Client account losses Were reimbursed. Al:
[0081] Abrokerage ?rm pays $6M to settle claims regard
ing allegations that real estate limited partnership offering
Employee (Internal); A2: Bene?t to Firm; A3: Client; A4:
Financial (indirect, to 3rd party); A5: Inv. Manager/Fidu
ciary/etc.—Event Type: Disclosure, Suitability & Fiduciary.
Example 6
Example 12
materials omitted to state material facts. A1: Employee
(Internal); A2: Bene?t to the Firm; A3: Client; A4: Financial
(indirect, to 3rd party); A5: Under Duty to Disclose/Offer
Suitable Deals—Event Type: Disclosure, Suitability & Fidu
c1ary.
[0075] A computer hacker gained access to the banks
credit card records and obtained enough information to
commit “identity theft” on several clients. Recognizing its
failure to effectively prevent access, the bank absorbed the
resulting losses. A1: Hacker; A2: Personal Bene?t; A3:
Client; A4: Financial (indirect, to 3rd party); A5: Not
Sure—Event Type: Info/Systems Security.
Example 7
[0076] A trader sold securities oWned by the bank at a
price that Was $500,000 beloW market value, to a company
in Which she had a personal interest. The company imme
Example 13
[0082] Aregional US bank agrees to pay a civil penalty to
the State of California for not dealing properly With the
testing Wastes created by the bank’s environmental consult
ant at a borroWer’s property A1: Employee (Internal) [inc.
Agents]; A2: No Bene?t Intended/Mistake; A3: Regulatory/
Public or Governmental Interest; A4: Fine/Penalty; A5 : Not
Sure/Not Applicable—Event Type: Regulatory, Monitoring
& Reporting.
Example 14
diately re-sold the securities at fair value and made $500,
000. A1: Employee (Internal); A2: Personal Bene?t; A3:
Firm/Shareholders; A4: Trading/Market Impact; A5:
[0083] A court ?nds that a ?nancial institution created a
“hostile environment” that led to sexual discrimination
Employee Conducting Internal, Non-Fiduciary Task—Event
Type: UnauthoriZed Trading.
“escort girls” to a ?rm Christmas party, referring to female
Example 8
employees as “hot totty,” etc. A1: Employee (Internal); A2:
Non-Financial Personal Bene?t/Motive; A3: Employee; A4:
Human, Personal, Privacy Rights; A5: Member of General
[0077] The bank faces NASD ?nes for taking excessive
commissions from big investors for IPO shares. A1:
Employee (Internal); A2: Bene?t to Firm; A3: Client; A4:
Financial (indirect, to 3rd party); A5 : Ordinary Contractual/
Commercial Counter party—Event Type: Improper Busi
ness Practices (by ?rm).
against the plaintiff, by making sexist comments, inviting
Public/Ordinary CitiZen—Event Type: Diversity/Discrimi
nation.
What is claimed:
1. A method of doing business subject to a risk event
comprising the steps of:
Example 9
[0078] Banking regulators impose a ?ne for failure to
providing questions to solicit ansWers that de?ne
attributes of the risk event;
detect and prevent a series of money laundering transactions.
obtaining the ansWers to the questions;
Feb. 3, 2005
US 2005/0027649 A1
inputting the answers into a computer programmed to: 1)
store the answers in the form of the attributes of the risk
event, 2) map each answer to a list of possible event
types corresponding to each answer, thereby generating
a mapped list for each answer, and 3) compare the
mapped lists to determine an event type of the risk
event; and
taking action based on the determined event type.
2. The method of claim 1 wherein the computer is
programmed to provide a user interface for providing the
questions to an event reporter, and for receiving the answers
to the questions from the event reporter, wherein each of the
questions have only one answer that can be selected from a
list of answers for the question, and wherein the selected
answer becomes an attribute assigned to the risk event being
reported.
3. The method of claim 1 wherein the computer is
programmed to store the answers in the form of attributes of
the event including, who or what initiated the event, what
was the bene?t to the initiator, who or what was impacted by
action by and employee, illegal action by the organiZation,
and failure to take a required action.
13. A computer-assisted method of categoriZing a risk
event comprising the steps of:
providing questions to solicit answers that de?ne
attributes of the risk event;
obtaining the answers to the questions;
inputting the answers into a computer programmed to: 1)
store the answers in the form of the attributes of the risk
event, 2) map each answer to a list of possible event
types, thereby generating a mapped list for each
answer, and 3) compare all of the mapped lists to
determine an event type of the risk event; and
displaying the event type.
14. A system for typing risk events comprising:
a computer programmed for event typing;
a user interface for posing questions regarding an event to
an event reporter, and for receiving responses to the
the event, the nature of the impact, and the initiator’s role in
questions from the event reporter, each of the questions
the event.
having only one answer that can be selected from a list
4. The method of claim 1 wherein the taking action
comprises taking action based on a statistical analysis of past
typed events, including the risk event.
5. The method of claim 1 wherein the taking action
comprises taking preventive steps to reduce events of the
event type.
6. The method of claim 1 wherein the step of providing
of answers for the question, wherein the selected
questions further comprises providing a question regarding
who or what initiated the event.
7. The method of claim 1 wherein the step of providing
questions further comprises providing a question regarding
what was the bene?t to the initiator.
8. The method of claim 1 wherein the step of providing
questions further comprises providing a question regarding
who or what was impacted.
9. The method of claim 1 wherein the step of providing
answer becomes an attribute assigned to the event
being reported;
a look up table to generate a list of mapped possible event
types for each answer;
wherein the programmed computer selects one or more
event types common to the lists of mapped possible
event types, and a user of the system takes an action
based on the event type presented by the system.
15. The system of claim 14 further comprising a non
volatile memory.
16. The system of claim 15 wherein the memory records
the attributes associated with the event.
17. The system of claim 15 wherein the memory records
events, attributes and statistics regarding recorded event
questions further comprises providing a question regarding
types.
the nature of the impact of the event.
10. The method of claim 1 wherein the step of providing
18. The system of claim 14 wherein the questions com
prise one or more questions regarding the event selected
questions further comprises providing a question regarding
from the group of questions consisting of: who initiated the
the initiator’s role and level of responsibility and legal duty
event, what was the bene?t to the initiator, who was
in the event.
impacted, what was the damage to the impacted party, and
what was the initiator’s role/responsibility regarding the
11. The method of claim 1 wherein the computer is
programmed to map each answer to a list of possible event
types that include one or more of the following event types:
impacted party.
theft/fraud, unauthoriZed trading, information security, per
types for each answer comprise one or more event types
19. The system of claim 14 wherein the possible event
sonal safety, employee relations, diversity/discrimination,
selected from the group of event types consisting of: theft/
natural disaster, terrorism/political, malicious damage, dis
closure suitability & ?duciary, improper business practices,
taX violation, advisory actions, sponsorship & selection,
regulatory monitoring/reporting, transaction processing, cli
fraud, unauthoriZed trading, information security, personal
safety, employee relations, diversity/discrimination, natural
disaster, terrorism/political, malicious damage, disclosure
suitability & ?duciary, improper business practices, taX
violation, advisory actions, sponsorship & selection, regu
latory monitoring/reporting, transaction processing, client
ent account error, system failure, vendor dispute, and event
type “unknown”.
12. The method of claim 1 wherein the risk event com
prises one of the events selected from the group consisting
of third party theft, employee theft, third party fraud,
employee fraud, natural disaster, physical injury, illegal
account error, system failure, vendor dispute, and event type
“unknown”.