Corruption, Corruption, Bribery, Bribery: The Non Violent Killer of a Society

COVID 19 has brought about hardship for millions of people across the world. In an article I wrote for the PECB for their PECB Insights Magazine, I have addressed Business Continuity, Risk Bearing Capacity (RBC) and Cloud Security. Today I am going to address Bribery and Corruption.

These two issues are dear to my heart, my business and our intrinsic values.

As many of you know, I was a Senior Officer in the Policing service, with the rank of Brigadier. Well, this came with huge responsibilities and one of these responsibilities was to be the Presiding Officer in most of the Corruption and Bribery cases reported against Police Officials. Thus, I had the authority to determine, based on the evidence, if the Police employee service shall be terminated. I had the same responsibility as an Executive of a Global Project, between 2007 and 2013. This is decision time!! And there was no running away from this. This is part of the Leadership responsibility bestowed on each and every person, official and office-bearer.

President Ramaphosa, the President of South Africa, has issued a letter to the ruling party where he has announced the Zero Tolerance approach needed to curb corruption, specifically Corruption and Bribery linked to providing critical assets and protective equipment, where front line workers, etc are dying as a result of the shortage of these essentials.

Well, I want to challenge business and industry. Have you heard of the ISO 37001? If not, this is an international standard for companies to adopt in the global fight against Bribery and Corruption.

ISO 37001 standard provides requirements for establishing, implementing, maintaining, reviewing and improving an anti-bribery management system. This standard is designed for all types of organizations from any sector and for any type of bribery they may face. Apart from this, it can also be implemented as a standalone standard or be integrated with other management systems. This standard is designed to for all types of organizations, any type of sector and any type of bribery risk it faces, and apart from that it can be implemented as a standalone or can also be integrated into an overall management system.

Well, as you by this time know, Crest Advisory Africa is in the forefront of leading the industry in not only International Training, but implementation of ISO Management Systems and Auditing of these systems as a Third Part Audit (TPA) provider.

We do the whole value chain, from Training of your

  • Executives (Introduction, 1 day: In-House or Virtual),
  • Training of Heads of Departments and specific management and supervision levels (Foundation, 2 days: In-house and Virtual)
  • Training of International Certified Lead Implementers: 5 Days: In-House or Virtual and
  • Training of International Certified Lead Auditor: 5 Days: In-House or Virtual
  • To international Certification

Book your seat here or contact us on iso@crestadvisoryafrica.com to set up an appointment to discuss this further.

We will use this information to contact you about this enquiry only and not for marketing purposes.
Share the Love

One Response

  1. We at Bonalesedi Training College are in dire need of funds to train the underprivilege children in our area and in rural areas how could you partner with us

Leave a Reply

Table of Contents

Click here to download this article.

More Quality Articles

What is risk? There’s a lot of research into all types of risk, but in my experience, I have found that most people and organisations don’t completely gras…
There are 7 Critical Steps to Pass Audits. Carina takes your through these steps.
Introduction Enterprise Risk Management (ERM) is describing a Risk Matrix (ERM Risk Matrix) as a tool for ranking and displaying risks by defining ranges for consequ…
What is a Compliance Management System (CMS)? For organizations seeking growth and long-term success, adhering to compliance obligations is not an option, is a must…
What is ISO 18788? ISO 18788 specifies the requirements and provides guidance for organizations that conduct or contract security operations.Moreover, it provide…
Information Security Management Network segregation is the tool used for dividing a network into smaller parts which are called subnetworks or network segments. Yo…
Information Security Management The popularity of the terms “data controller” and “data processor” has sharply increased in recent years. In part because of the sig…
The ability to predict what the future holds and choosing effectively among varying alternatives lies at the centre of contemporary societies and organizations. Ri…
“Food Safety” refers to the prevention, elimination and control of foodborne diseases at the stage of consumption. In a globalized world, the impact of food safety ha…
Six Sigma Benefits Reducing Waste Improving Time Management Increase Customer Loyalty Boost Employee Motivation Higher Revenues and Lower Costs Six Sigma has prov…
As the threat of energy-resource depletion has emerged, the global demand for energy is increasing constantly. Provided that billions of people still have no access…
Is your Business protected against a breach of data and software? Are you Internationally Certified to be able to prevent hackers from stealing your organization’s v…
The education industry has gone through tremendous changes over the last decades in terms of educational opportunities, teaching methods, availability of reading…
The Three P(’s)illars of Sustainability The concept of the “triple bottom line” was firstly introduced in 1994 by John Elkington, with the idea of organizations pre…
A politically inclined attack or just a ‘simple’ lack of security awareness? Whatever the case, the cyber-attack that hit Marriott was huge. This was the joint second…
%d bloggers like this: