Course Detail()

UTAP Funding, CCF Funding

7.00 CPE Hours (Category 1, Category 2, Category 3, Category 4, Others)
Live Webinar




Programme Objective

To examine the ethical and legal duties of employees, contractors and external parties in relation to the protection of company secrets and databases

Programme Outline

  • Threats to secrets and database – internal sources (employees and contractors) and external sources (hackers, industrial espionage agents, business rivals)

  • Ethical duties of employees – honesty, fidelity, fair value for pay, integrity, avoiding conflicts of interests

  • Ensuring ethical conduct of employees – selection, induction, training, education, reinforcement, publicity of responses to unethical conduct

  • Dealing with employee’s ethical breaches – employee handbook, codes of conduct, shaming, blacklisting

  • Fiduciary duties of directors and officers – to act in employer’s interests, not to use company assets, monies or business opportunities for own benefit, to reveal wrongdoings of other employees, full and frank disclosure, section 157 of the Companies Act

  • Prevention of Corruption Act – benefits, corrupt intent, famous local cases (Peter Lim, Ng Boon Gay and Teh Tsun Hang), punishment, extra-territorial effect

  • Response to external threats – criminal law (conspiracy, abetment, computer crime laws), intellectual property laws, Computer Misuse and Cybersecurity Act

  • Civil remedies to external threats – torts of trespass, breach of confidence, conspiracy, foreign threats, use of Mareva injunctions and Anton Piller orders

  • Contractual protection of secrets – cybersecurity policies, restraint of trade clauses  (scope covering georgraphical extent, prohibited activities, length of restraint) – trade secrets (classification and protection) – customer relationship – public policy - incentive payments
     

Pre-requisites

Please take note of the following admission requirements:

  • Trainings will be conducted on Zoom platform, thus video camera and microphone are compulsory
  • Mandatory for video camera to be turned on throughout the course
  • Display your official name (as per NRIC) in Zoom, to facilitate attendance taking


Training Methodology

Lecture style, with case studies
 

Closing Date for Registration

1 week before programme or until full enrolment

Intended For

A Foundation to Intermediate level programme intended for both practicing and non-practising accountants. Professionals who would like to understand more about the ethical and legal duties of employees, contractors and external parties in relation to the protection of company secrets and databases are welcome to attend.

Schedule & Fees

Testimonial

Funding

1] UTAP Funding

1] NTUC Union Training Assistance Programme (UTAP)
UTAP (Union Training Assistance Programme) is an individual skills upgrading account for NTUC members.

To find out more on the UTAP funding and support validity period please click here.

Should you have queries on the funding scheme, you can email to UTAP@e2i.com.sg or call NTUC Membership Hotline at 6213-8008

 

1] CCF Training Grant

Charities Capability Fund (CCF) Training Grant provides co-funding for local training courses to help charities comply with regulatory requirements and build good governance standards.

Period of CCF pre-approval: 15 August 2024  to 13 August 2025


Eligibility Criteria

CCF funding is for eligible charities' staff (who have served in the Charities for at least 6 months with an official designation).

CCF Grants Coverage & Quantum

 

Funding Quantum

Nett Course Fees Payable (incl. GST)

Singaporeans/ PRs


 

Member: $233.60

Non-Member: $280.80

(80% of course fee)

Member: $63.66

Non-Member: $76.52

Employment Pass/ Work Permit Holders / S Pass Holders

Member: $174.60

Non-Member: $210.60

(60% of course fee)

Member: $127.31

Non-Member: $153.04

For Pre-approved Courses: Participants will pay the training provider the net course fees (after CCF funding). The training provider will claim the CCF approved funding directly from the CCF Secretariat.

Note:

  1. CCF applications are subject to NCSS approval and only Board members/ staff in key governance and management areas with approved CCF applications are eligible for CCF funding.
  2. The Applicant with approved CCF application (or “CCF-eligible participant”) pays the amount of course fees less CCF funding to ISCA. Payment can be made by corporate/individual means.
  3. The Applicant has to create an ISCA Corporate Account here if they do not have an existing corporate account.

 

During the Course:

  • CCF-eligible participant to achieve minimum 75% attendance, and pass all assessments, if any.
  • All CCF-eligible participants are to complete a CCF Training Evaluation Form at the end of the course.
  • For course conducted online, CCF-eligible participants are to switch on their video function and display their full name.
  • All CCF-eligible participants must prepare their mobile phone with their Singpass app to scan their attendance twice a day.

Programme Facilitator(s)




Programme Objective

To examine the ethical and legal duties of employees, contractors and external parties in relation to the protection of company secrets and databases

Programme Outline

  • Threats to secrets and database – internal sources (employees and contractors) and external sources (hackers, industrial espionage agents, business rivals)

  • Ethical duties of employees – honesty, fidelity, fair value for pay, integrity, avoiding conflicts of interests

  • Ensuring ethical conduct of employees – selection, induction, training, education, reinforcement, publicity of responses to unethical conduct

  • Dealing with employee’s ethical breaches – employee handbook, codes of conduct, shaming, blacklisting

  • Fiduciary duties of directors and officers – to act in employer’s interests, not to use company assets, monies or business opportunities for own benefit, to reveal wrongdoings of other employees, full and frank disclosure, section 157 of the Companies Act

  • Prevention of Corruption Act – benefits, corrupt intent, famous local cases (Peter Lim, Ng Boon Gay and Teh Tsun Hang), punishment, extra-territorial effect

  • Response to external threats – criminal law (conspiracy, abetment, computer crime laws), intellectual property laws, Computer Misuse and Cybersecurity Act

  • Civil remedies to external threats – torts of trespass, breach of confidence, conspiracy, foreign threats, use of Mareva injunctions and Anton Piller orders

  • Contractual protection of secrets – cybersecurity policies, restraint of trade clauses  (scope covering georgraphical extent, prohibited activities, length of restraint) – trade secrets (classification and protection) – customer relationship – public policy - incentive payments
     

Pre-requisites

Please take note of the following admission requirements:

  • Trainings will be conducted on Zoom platform, thus video camera and microphone are compulsory
  • Mandatory for video camera to be turned on throughout the course
  • Display your official name (as per NRIC) in Zoom, to facilitate attendance taking


Training Methodology

Lecture style, with case studies
 

Closing Date for Registration

1 week before programme or until full enrolment

Intended For

A Foundation to Intermediate level programme intended for both practicing and non-practising accountants. Professionals who would like to understand more about the ethical and legal duties of employees, contractors and external parties in relation to the protection of company secrets and databases are welcome to attend.

Programme Facilitator(s)


No course instances or course instance sessions available.