Carregant...
Miniatura

Tipus de document

Treball de fi de grau

Data de publicació

Llicència de publicació

cc-by-nc-nd (c) Sandra Màrquez Postigo, 2024
Si us plau utilitzeu sempre aquest identificador per citar o enllaçar aquest document: https://hdl.handle.net/2445/214556

Criminal compliance system: implementation of a compliance model in the information technology security sector

Títol de la revista

ISSN de la revista

Títol del volum

Recurs relacionat

Resum

The concept of Compliance has gone from being a new trend in business management to consolidating itself as a key resource in those organisations committed to ethical integrity, good governance and long-term sustainability. This work explores, through a literature review, the intricate landscape of criminal compliance in the IT security sector by examining its main legal framework, its fundamental components, the essential steps for the design and implementation of a criminal compliance system (CCS) and the main challenges companies may face. The analysis emphasizes how effective compliance programmes serve as a critical bulwark against criminal activity, mitigating risks, safeguarding reputation and fostering a culture of ethical conduct. Particularly, it addresses the unique challenges and opportunities presented by the rapidly evolving field of cybersecurity, underlining the critical role of robust CCS in mitigating cybercrime risks. It is therefore an arduous process that requires proactivity, effort and sufficient investment of resources, involvement, ongoing commitment and continuous training by all members involved as well as multidisciplinary professionals with sufficient subject- matter expertise and experience to correct mistakes, make improvements and adapt to the changing world of compliance, specially, in cyberspace.

Descripció

Treballs Finals de Grau de Dret. Universitat de Barcelona. Curs: 2023-2024. Tutor: Dr. Javier Cigüela Sola

Citació

Citació

MÀRQUEZ POSTIGO, Sandra. Criminal compliance system: implementation of a compliance model in the information technology security sector. [consulta: 11 de desembre de 2025]. [Disponible a: https://hdl.handle.net/2445/214556]

Exportar metadades

JSON - METS

Compartir registre