DISS-CO-Main-logo
  • Smart Integrity Platform
    • Whistleblowing Software
    • Complaint Management
    • Whistleblowing System eLearning
  • Managed Services
    • Compliance Outsourcing
    • Whistleblowing System Implementation
    • Investigation Support
    • Compliance Management Systems
    • Enhanced Due Diligence
  • Resources
    • Blog
    • Podcast
    • White Paper
    • FAQ
    • Subscribe
  • About
    • Our Management
    • Our Mission & Vision
    • News
    • Events
  • Become a Partner
  • EN
    • DE
    • FR
    • ES
    • EL
    • IT
  • Login

Contact Info

    • info@diss-co.tech
whistleblowing system by DISS-CO

30. December 2022

  • By  benjamin
  • 0 comments

What is a whistleblowing software?

A whistleblowing software is a reporting channel that enables a whistleblower to submit information about breaches confidentially or anonymously. Such a reporting channel is part of the compliance management system and serves the early detection of breaches of rules and criminal offences.

What role does the Whistleblower Protection Act play in the choice of whistleblowing software?

The Whistleblower Protection Act (HinSchG) was passed in the Bundestag on 16 December 2022. The HinSchG stipulates that the whistleblower must be provided with suitable anonymous reporting channels. Furthermore, the possibility of appropriate communication between the internal reporting office and the anonymous whistleblower must be guaranteed. There is a need for a simple and secure whistleblowing software which, on the one hand, meets the legal requirements and, on the other hand, ensures the protection of the whistleblower as well as the secure and data protection-compliant processing of the sensitive data. The most suitable way to meet these requirements is to implement an anonymous and digital whistleblowing software.

What is a digital whistleblowing system?

Digital whistleblowing software allows a whistleblower to submit a web-based report of a violation anonymously or confidentially. The requirements are a browser and an intact internet connection.

What are the advantages of web-based software?

The so-called SaaS (Software as a Service) is cloud-based, does not require installation on the company’s end devices and enables simple and quick implementation. Further advantages are the reduced IT administration effort, as no own servers have to be operated and updates installed. The software ensures device- and location-independent access at all times. Data centres certified to the ISO 27001 standard guarantee data security through a professional IT security management system. Storage space can be expanded at any time. If requirements change, adjustments can be made to the software.

The high degree of flexibility, data security and protection of in-house IT resources make SaaS very attractive for companies and public authorities.

What are the advantages of a web-based whistleblowing software using the Smart Integrity Platform from DISS-CO as an example?

DISS-CO’s digital whistleblowing software is a secure web-based system with many selectable modules, integrations and customisation options. The software, which can also be used as complaint management software, offers dashboards and intuitive case management that stores sensitive personal and case-related data centrally, DSGVO compliant and unmanipulable. The whistleblower has the choice to submit an anonymous or confidential report. Through encrypted and anonymous communication, as required by the HinSchG, further information can be obtained from the whistleblower. Ensuring the anonymity of the whistleblower software also creates tremendous security and trust in the internal reporting office and the company. By removing the metadata of the file attachments, the whistleblower system ensures technical anonymisation. Internal communication as well as communication with consultants can also take place exclusively and encrypted on the platform. This reduces the data leakage risk. An individual authorisation concept can be used to regulate access within the organisation. If the internal reporting office is partially or completely outsourced, the external agents have access to the information via an authorisation concept. Persons assisting in the clarification of a case can easily and quickly obtain access for task management without having to view the entire case. This allows the person responsible for the case to maintain an overview of the tasks at all times and to define deadlines and dependencies. In addition, a Kanban board provides an overview of the status of pending and ongoing tasks. For audit security, all information is recorded and cannot be changed until the final deletion of the entire case. The software also reminds of the legal deadlines.

The central, secure and unmanipulable processing of information in connection with secure communication while respecting the anonymity of the person providing the information enables efficient case processing.

Whistleblowing System by DISS-CO
Learn more about the
#1 digital whistleblowing software

The disadvantages of the email solution as a corporate whistleblowing channel

1) Why do I have no control over my data

Many companies still provide a general email address for reporting breaches.

If the person providing the tip wants to remain anonymous, there is no way around an anonymous e-mail account. Creating an e-mail account with a private e-mail provider is very easy and free of charge nowadays. However, this method has several disadvantages and risks.

The emails are usually unencrypted, which creates a security risk for the company. In addition, employees are practically forced to transmit internal company information via a private email provider. The sensitive information could be tapped during transmission or afterwards. The usual US email providers, such as Google and Yahoo, transmit the data to servers in the US or elsewhere, or to subcontractors or affiliates, who in turn process and transmit information to their subcontractors and affiliates. For users, the strand of data processing is not transparent. If, for example, US authorities are involved in external investigations, the providers are obliged to cooperate and must transmit the information and e-mails to the authorities. The data subjects are not informed about the transfer. In both cases, the consequence is that sensitive internal company information is passed on and processed in an uncontrolled manner.

2) What are the risks for the persons providing the information

Employees also sometimes use their private devices, depending on the structure and IT policies of the company. Either because they do not need end devices such as laptops and smartphones for their work or because there is a bring-your-own policy or the use of private end devices for company purposes is not regulated. This poses a high risk for the data subject. In the past, there have been repeated whistleblower cases with criminal consequences for the whistleblower due to the transfer of company information into the private sphere. The data was transferred either physically or digitally for the purpose of transmission to external reporting bodies or to the press from the company environment, sometimes after the person suffered reprisals due to an internal report. It is not relevant whether, for example, one or more file folders are physically transferred or the data is transferred digitally to external storage media or by e-mail. What is relevant is the transfer itself. In addition, the scope of the transferred data is relevant.

Data transmissions via the company’s end devices and from the company network can be traced using various methods. This can reveal the identity of the anonymous whistleblower. More secure is the use of the web-based whistleblowing software Smart Intergity Platfom by DISS-CO and the application of the associated guidelines, which, among other things, prohibit tracking of the use of the specific URL by IT.

3) What is metadata and why is it important?

If file attachments are attached to the report, the metadata can be used to determine the identity of the person providing the information. The metadata is attached to each file and provides information about the author, the users and the history of the file, among other things. If the person providing the information is skilled enough to remove the metadata themselves, the information cannot be traced. We know from practice that only a small percentage of people who usually report whistleblowing have the technical knowledge or are willing to read up on it in detail. Therefore, DISS-CO’s whistleblowing software automatically removes the metadata from anonymous reports.

4) What are DLP tools?

In addition, for security reasons, some companies have so-called data loss prevention (DLP) tools in place that can record and monitor all actions. DLP tools can be used preventively to prevent data theft, but they are also very suitable for employee monitoring and can endanger the anonymity of the whistleblower. Whistleblowers are well advised to inform themselves in advance about the use of DLP tools if they wish to use the whistleblowing software for anonymous reporting.

5) Conclusion

Using an email address as an internal whistleblowing channel offers many risks for the company and the whistleblower. Sensitive information within the company is processed and forwarded externally in an uncontrolled manner, could be misused and cause financial and reputational damage. The possible negative consequences for the whistleblower reduce trust in the whistleblowing system, which leads to lower use of the whistleblowing software. This in turn leads to violations going undetected for longer.

By implementing a secure web-based whistleblowing software such as DISS-CO’s Smart Integrity Platform, companies and authorities can provide security to whistleblowers and uncover risks at an early stage.

Book a free demo
Tags:
Compliance, SaaS, Whistleblowing
  • Share:

Categories

  • AML/CFT
  • Analytics
  • Artificial Intelligence
  • Blockchain
  • BPDD
  • Business Partner Due Diligence
  • Compliance
  • Education
  • EU measures
  • EU Sanction
  • GDPR
  • Homepage
  • Industrie 4.0
  • Internet of Things
  • Investigation
  • Know Your Customer
  • KYC
  • Legislation
  • Regulators/Authorities
  • SaaS
  • Science
  • Supplier Due Diligence
  • Supply Chain
  • Uncategorized
  • Whistleblowing

Search

Categories

  • AML/CFT (1)
  • Analytics (1)
  • Artificial Intelligence (1)
  • Blockchain (5)
  • BPDD (1)
  • Business Partner Due Diligence (1)
  • Compliance (27)
  • Education (3)
  • EU measures (7)
  • EU Sanction (1)
  • GDPR (1)
  • Homepage (10)
  • Industrie 4.0 (1)
  • Internet of Things (1)
  • Investigation (8)
  • Know Your Customer (1)
  • KYC (1)
  • Legislation (3)
  • Regulators/Authorities (6)
  • SaaS (12)
  • Science (1)
  • Supplier Due Diligence (2)
  • Supply Chain (4)
  • Uncategorized (4)
  • Whistleblowing (22)

Popular Tags

AI AML analytics anonymous Blockchain CFT cloud based platforms compliance digital transformation EU Authority EU Directive Hinweisgebersystem Industrie 4.0 internal investigation Internet of Things (IoT) protection act Referentenentwurf Regulator smart integrity platform Software Supplychain whistle whistleblower protection act whistleblower Software whistleblowing Whistleblowing system whistleblowing tool

iso_1

Quick Link

  • Blog
  • Contact Us
  • Subscribe
  • FAQ
  • Privacy Policy
  • Terms & Conditions

Contact Info

    Legal Notice
    Mail: info[at]diss-co.tech

DISS-CO ® © 2023 All Rights Reserved

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Accept All Cookie SettingsRead More Reject All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
Powered by CookieYes Logo
  • +4940226392510
  • Contact Us
  • LinkedIn
  • Book a Free Demo
EN
EN
DE
FR
ES
IT
EL