Disaster Recovery, Security & Fraud Management
10 Disaster Recovery, Security & Fraud Management
10.1 Business Continuity Management
10.2 Security Management
10.3 Fraud Management
10.4 Audit Management
10.5 Insurance Management
10.6 Revenue Assurance Management
10.1.1 Create Business Continuity Plan
10.1.2 Create Disaster Recovery Plan
10.1.3 Define Business Continuity Triggers
10.1.4 Define Disasters
10.2.1 Content Security
10.2.2 Service Security
10.2.3 Information Security
10.2.4 Systems Security
10.2.5 Password Management
10.2.6 User Control
10.3.1 Customer Fraud Management
10.3.2 Employee Fraud Management
10.3.3 Contractor Fraud Management
10.3.4 Supplier-Partner Fraud Management
10.3.5 Whistleblower Management
10.4.1 Services Audit Management
10.4.2 Resource Audit Management
10.4.3 Accounts Audit Management
10.4.4 Customer Audit Management
10.4.5 Employee Audit Management
10.4.6 Contracts Audit Management
10.4.7 Supplier-Partner Audit Management
10.4.8 Content Audit Management
10.4.9 Process Audit Management
10.5.1 Property Insurance Management
10.5.2 Service Liability Insurance Management
10.5.3 Employee Liability Insurance Management
10.5.4 Employee Health Insurance Management
10.5.5 Fleet Insurance Management
10.5.6 Stock Insurance Management
10.5.7 Self Insurance Management
10.5.8 Business Interruption Insurance Management
10.5.9 Employment Practices Liability Insurance Management
10.5.10 Key Employee Insurance Management
10.6.1 Support Revenue Assurance Operations
10.6.2 Manage Revenue Assurance Operations
10.6.3 Manage Revenue Assurance Policy Framework
10.6.4 Network Integrity Management
10.6.5 Call Data Record Integrity Management
10.6.6 Interconnect Dispute Management
10.6.7 Billing System Integrity Management
10.1.1.1 Identify & Record Key Internal Personnel
10.1.1.2 Identify & Record Key Internal Backups
10.1.1.3 Identify Potential Telecommuters
10.1.1.4 Identify & Record Key External Contacts
10.1.1.5 Identify & Record Critical Equipment
10.1.1.6 Identify & Locate Critical Documents
10.1.1.7 Identify Contingency Equipment Options
10.1.1.8 Identify Contingency Location
10.1.1.9 Construct A ''How-to'' Guide
10.1.1.10 Collate Business Continuity Information
10.1.1.11 Test Business Continuity Plan
10.1.1.12 Publish Business Continuity Plan
10.1.2.1 Undertake Risk Analysis
10.1.2.2 Establish Budget
10.1.2.3 Develop Disaster Recovery Plan
10.1.2.4 Define Disaster Recovery Plan Testing Schedule
10.1.2.5 Test Disaster Recovery Plan
10.1.2.6 Define Disaster Recovery Plan Review Schedule
10.1.2.7 Publish Disaster Recovery Plan
10.1.3.1 Define Service Availability Triggers
10.1.3.2 Define Product Availability Triggers
10.1.3.3 Define Human Resource Availability Triggers
10.1.3.4 Define Network Availability Triggers
10.1.3.5 Define Finance Availability Triggers
10.1.3.6 Define Supplier-Partner Availability Triggers
10.1.3.7 Define Support Systems Availability Triggers
10.1.3.8 Define Customer Availability Triggers
10.1.3.9 Define Trigger Priorities
10.1.4.1 Define Geo-Physical Disasters
10.1.4.2 Define Natural Disasters
10.1.4.3 Define Man-Made Disasters
10.1.4.4 Assign Disaster Risk Probabilities
10.1.4.5 Rank Disaster By Impact
10.1.4.6 Define Disaster Ranking Review Schedule
10.2.1.1 Define Content Security Policy
10.2.1.2 Mitigate Cross Site Scripting
10.2.1.3 Mitigate Clickjacking
10.2.1.4 Mitigate Packet Sniffing Attacks
10.2.1.5 Define Penetration Testing Policy
10.2.1.6 Define Security Auditing Policy
10.2.1.7 Define End Point Security Policy
10.2.1.8 Define Content Filtering Policy
10.2.1.9 Define Firewall Policy
10.2.1.10 Define VPN & Remote Access Policy
10.2.1.11 Define eMail Security Policy
10.2.1.12 Define Data Leakage Prevention Policy
10.2.1.13 Define Intrusion Detection Policy
10.2.1.14 Define Patch Management Policy
10.2.1.15 Define Document Security Levels
10.2.1.16 Identify Stakeholders
10.2.1.17 Produce Draft Content Security Policy
10.2.1.18 Obtain Stakeholder Agreement
10.2.1.19 Publish Content Security Policy
10.2.2.1 Define Service Security Policy
10.2.2.2 Identify Service Delivery Locations
10.2.2.3 Identify Internal Service Users
10.2.2.4 Identify External Service Users
10.2.2.5 Define Service Policy Implementation Template
10.2.2.6 Define Firewall Configuration Requirements
10.2.3.1 Define Information Security Policy
10.2.3.2 Undertake Information Risk Analysis
10.2.3.3 Instigate Risk Management
10.2.3.4 Mitigate Packet Sniffing Attacks
10.2.3.5 Define Penetration Testing Policy
10.2.3.6 Define Security Auditing Policy
10.2.3.7 Define End Point Security Policy
10.2.3.8 Define Information Filtering Policy
10.2.3.9 Define Firewall Policy
10.2.3.10 Define VPN & Remote Access Policy
10.2.3.11 Define eMail Security Policy
10.2.3.12 Define Information Leakage Prevention Policy
10.2.3.13 Define Intrusion Detection Policy
10.2.3.14 Define Document Security Levels
10.2.3.15 Identify Stakeholders
10.2.3.16 Produce Draft Information Security Policy
10.2.3.17 Obtain Stakeholder Agreement
10.2.3.18 Publish Information Security Policy
10.2.4.1 Define Systems Security Policy
10.2.4.2 Identify Physical Risks
10.2.4.3 Identify Operational Risks
10.2.4.4 Instigate Risk Management Programme
10.2.4.5 Define System Penetration Testing Policy
10.2.4.6 Define System Security Auditing Policy
10.2.4.7 Define End Point Security Policy
10.2.4.8 Define VPN & Remote Access Policy
10.2.4.9 Define Intrusion Detection Policy
10.2.4.10 Identify Stakeholders
10.2.4.11 Produce Draft Systems Security Policy
10.2.4.12 Obtain Stakeholder Agreement
10.2.4.13 Publish Systems Security Policy
10.2.5.1 Employee Password Management
10.2.5.2 Customer Password Management
10.2.5.3 Contractor Password Management
10.2.5.4 Supplier-Partner Password Management
10.2.6.1 Define User Control Policy
10.2.6.2 Identify User Control Requirements
10.2.6.3 Identify User Control Regulations
10.2.6.4 Identify Stakeholders
10.2.6.5 Construct User Control Processes
10.2.6.6 Obtain Stakeholder Agreement
10.2.6.7 Publish User Control Policy
10.2.6.8 Implement User Control Processes
10.3.1.1 Determine Fraud Tolerance Level
10.3.1.2 Determine Fraud Management Policies
10.3.1.3 Identify Fraud Process Requirements
10.3.1.4 Determine Customer Identity Management Process
10.3.1.5 Determine Customer Identity Data Storage Process
10.3.1.6 Determine Account Hand-Off Policies
10.3.1.7 Determine Collection Agent Selection Process
10.3.1.8 Identify Stakeholders
10.3.1.9 Produce Draft Customer Fraud Management Policy
10.3.1.10 Obtain Stakeholder Agreement
10.3.1.11 Publish Customer Fraud Management Policy
10.3.2.1 Determine Employee Screening Policy
10.3.2.2 Define Employee Credit Checking Policy
10.3.2.3 Define Transaction Handling Policies
10.3.2.4 Define Accounts Access & Checking Policies
10.3.2.5 Define Incoming Cheque Handling Policy
10.3.2.6 Define Customer Complaint 2nd Level Review Policy
10.3.2.7 Define Whistleblower Reporting Strategy
10.3.2.8 Define Outgoing Cheque Authorisation Levels
10.3.2.9 Define Employee Fraud Insurance Level Required
10.3.2.10 Monitor Internal Communication Policies
10.3.2.11 Identify Stakeholders
10.3.2.12 Produce Draft Employee Fraud Management Policy
10.3.2.13 Obtain Stakeholder Agreement
10.3.2.14 Publish Employee Fraud Management Policy
10.3.3.1 Define Contractor Background Check Policy
10.3.3.2 Define Contract Reference Verification Policy
10.3.3.3 Audit Contract History
10.3.3.4 Implement Contractor Database
10.3.3.5 Define Conflict-Of-Interest Resolution Policy
10.3.3.6 Define Contract Delivery Metrics
10.3.3.7 Define Contract Termination Policy
10.3.3.8 Identify Stakeholders
10.3.3.9 Produce Draft Contractor Fraud Management
10.3.3.10 Obtain Stakeholder Agreement
10.3.3.11 Publish Contractor Fraud Management Policy
10.3.4.1 Define Supplier-Partner Background Check Policy
10.3.4.2 Define Supplier-Partner Reference Verification Policy
10.3.4.3 Audit Supplier-Partner Relationship History
10.3.4.4 Implement Supplie-Partner Database
10.3.4.5 Define Conflict-Of-Interest Resolution Policy
10.3.4.6 Define Supplier-Partner Delivery Metrics
10.3.4.7 Define Supplier-Partner Termination Policy
10.3.4.8 Identify Stakeholders
10.3.4.9 Produce Draft Supplier-Partner Fraud Management
10.3.4.10 Obtain Stakeholder Agreement
10.3.4.11 Publish Supplier-Partner Fraud Management Policy
10.3.5.1 Define Whistleblower Protection Programme
10.3.5.2 Allocate Whistleblower Management Resources
10.3.5.3 Select Whistleblower Management Team
10.3.5.4 Develop Whistleblower Reporting Structure
10.3.5.5 Initiate Whistleblower Programme
10.3.5.6 Define Whistleblower Investigation Processes
10.3.5.7 Initiate Whistleblower Investigation Processes
10.3.5.8 Identify Stakeholders
10.3.5.9 Report Whistleblower Identification Findings
10.3.5.10 Develop Action Plan
10.3.5.11 Obtain Stakeholder Agreement
10.3.5.12 Implement Action Plan
10.4.1.1 Define Auditable Services
10.4.1.2 Identify Relevant Inventories
10.4.1.3 Baseline Inventories
10.4.1.4 Copy Inventory Data
10.4.1.5 Identify & Document Installed Services
10.4.1.6 Compare with Inventory Data
10.4.1.7 Document Discrepancies
10.4.1.8 Identify Stakeholders
10.4.1.9 Report Discrepancies
10.4.1.10 Develop Corrective Activity Plans
10.4.1.11 Obtain Stakeholder Agreement
10.4.1.12 Update Appropriate Inventories
10.4.2.1 Define Auditable Resources
10.4.2.2 Identify Relevant Inventories
10.4.2.3 Baseline Inventories
10.4.2.4 Copy Inventory Data
10.4.2.5 Identify & Document Installed Resources
10.4.2.6 Compare with Inventory Data
10.4.2.7 Document Discrepancies
10.4.2.8 Identify Stakeholders
10.4.2.9 Report Discrepancies
10.4.2.10 Develop Corrective Activity Plans
10.4.2.11 Obtain Stakeholder Agreement
10.4.2.12 Update Appropriate Inventories
10.4.3.1 Define Audit Criteria
10.4.3.2 Identify Potential Auditors
10.4.3.3 Review Auditors
10.4.3.4 Agree Terms & Conditions
10.4.3.5 Select Auditing Organisation
10.4.3.6 Identify Stakeholders
10.4.3.7 Instigate Audit
10.4.3.8 Review Audit Findings
10.4.3.9 Create Corrective Action Plan
10.4.3.10 Obtain Stakeholder Agreement
10.4.3.11 Implement Corrective Action Plan
10.4.3.12 Review Results
10.4.3.13 Publish Audit Findings
10.4.3.14 Publish Corrective Action Plan Results
10.4.4.1 Define Customers To Be Audited
10.4.4.2 Define Audit Structure
10.4.4.3 Define Audit Timescales
10.4.4.4 Create Audit Documentation
10.4.4.5 Identify Stakeholders
10.4.4.6 Distribute Audit Documentation
10.4.4.7 Collate & Analyse Audit Results
10.4.4.8 Report Audit Findings
10.4.4.9 Define Activity Plans
10.4.4.10 Obtain Stakeholder Agreement
10.4.4.11 Implement Activity Plans
10.4.5.1 Define Audit Scope
10.4.5.2 Define Audit Implementation Process
10.4.5.3 Define Audit Owners
10.4.5.4 Determine Appropriate Regulation Requirements
10.4.5.5 Schedule Audit
10.4.5.6 Implement Audit
10.4.5.7 Document Audit Results
10.4.5.8 Identify Stakeholders
10.4.5.9 Publish Audit Results
10.4.5.10 Obtain Stakeholder Agreement
10.4.6.1 Establish Pre-Contract Investigation Strategy
10.4.6.2 Establish Sampling Strategy For Current Contracts
10.4.6.3 Establish Pre-Signing Investigations Strategy
10.4.6.4 Establish Post-Completion Investigation Strategy
10.4.6.5 Establish General Investigations Strategy
10.4.6.6 Produce Draft Report
10.4.6.7 Identify Stakeholders
10.4.6.8 Obtain Stakeholder Agreement
10.4.6.9 Define Corrective Activities Plan
10.4.6.10 Publish Audit Results
10.4.7.1 Determine Audit Structure Requirements
10.4.7.2 Determine Audit Content Requirements
10.4.7.3 Determine Audit Baselines
10.4.7.4 Request Supplier-Partner Participation
10.4.7.5 Agree Audit Location & Timing
10.4.7.6 Undertake Audit
10.4.7.7 Report Draft Findings
10.4.7.8 Review With Supplier-Partner
10.4.7.9 Agree Resolution Activity List
10.4.7.10 Identify Stakeholders
10.4.7.11 Publish Supplier-Partner Audit Report
10.4.7.12 Obtain Stakeholder Agreement
10.4.7.13 Schedule Future Audits
10.4.8.1 Define Content Audit Methodology
10.4.8.2 Declare Content Manager
10.4.8.3 Define Content Audit Documentation Style
10.4.8.4 Identify Content Source
10.4.8.5 Audit Content
10.4.8.6 Identify Stakeholders
10.4.8.7 Publish Audit Results
10.4.8.8 Determine Corrective Actions
10.4.8.9 Produce Action Plan
10.4.8.10 Obtain Stakeholder Agreement
10.4.8.11 Implement Action Plan
10.4.9.1 Plan Process Audit
10.4.9.2 Announce Process Audit
10.4.9.3 Initialise Process Audit
10.4.9.4 Process Audit Survey
10.4.9.5 Review Internal Control Structure
10.4.9.6 Prepare Process Audit Programme
10.4.9.7 Undertake Transaction Testing
10.4.9.8 Manage Informal Feedback
10.4.9.9 Summarise Process Audit Results
10.4.9.10 Draft Process Audit Report
10.4.9.11 Define Process Audit Exit Conference
10.4.9.12 Publish Draft Process Audit Report
10.4.9.13 Identify Stakeholders
10.4.9.14 Incorporate Stakeholder Comments
10.4.9.15 Publish Final Process Audit Report
10.4.9.16 Produce Corrective Activity List
10.4.9.17 Obtain Stakeholder Agreement
10.5.1.1 Define Insurable Perils
10.5.1.2 Calculate Real Estate Value
10.5.1.3 Calculate Contents Value
10.5.1.4 Define Loss Prevention Strategies
10.5.1.5 Define Claims Process
10.5.1.6 Calculate Insurance Cover Required
10.5.1.7 Identify Available Policies
10.5.1.8 Select Appropriate Policy
10.5.1.9 Identify Stakeholders
10.5.1.10 Obtain Stakeholder Agreement
10.5.1.11 Recommend Policy Purchase
10.5.2.1 Determine Internet Liability Risk
10.5.2.2 Determine Past Service Liability Risk
10.5.2.3 Establish Service Effectiveness Monitoring Programme
10.5.2.4 Establish Repairs Effectiveness Monitoring Programme
10.5.2.5 Monitor Service Effectiveness
10.5.2.6 Monitor Repairs Effectiveness
10.5.2.7 Determine Service Failure Risks
10.5.2.8 Determine Repairs Failure Risks
10.5.2.9 Calculate Insurance Requirements
10.5.2.10 Identify Insurance Providers
10.5.2.11 Select Appropriate Policy
10.5.2.12 Identify Stakeholders
10.5.2.13 Obtain Stakeholder Agreement
10.5.2.14 Recommend Insurance Policy Purchase
10.5.3.1 Determine Regulatory Requirements
10.5.3.2 Assess Business Activities Against Regulations
10.5.3.3 Determine Insurance Requirements
10.5.3.4 Identify Potential Insurance Providers
10.5.3.5 Select Appropriate Insurance Policy
10.5.3.6 Identify Stakeholders
10.5.3.7 Obtain Stakeholder Agreement
10.5.3.8 Recommend Insurance Policy Purchase
10.5.4.1 Define Opt-Out Policy
10.5.4.2 Create Opt Out Documentation
10.5.4.3 Define Recipient Limitations
10.5.4.4 Define Coverage Limitations
10.5.4.5 Define Employee Contribution Levels
10.5.4.6 Identify Health Insurance Offer Rate
10.5.4.7 Identify Health Insurance Eligibility Rate
10.5.4.8 Identify Health Insurance Enrollment Rate
10.5.4.9 Identify Health Insurance Enrollment-When-Eligible Rate
10.5.4.10 Determine Overall Health Insurance Requirements
10.5.4.11 Identify Potential Insurance Providers
10.5.4.12 Select Appropriate Insurance Policy
10.5.4.13 Identify Stakeholders
10.5.4.14 Obtain Stakeholder Agreement
10.5.4.15 Recommend Insurance Policy Purchase
10.5.4.16 Submit For Internal Publication
10.5.5.1 Record Fleet Details
10.5.5.2 Record Driver History
10.5.5.3 Identify Driver License Levels
10.5.5.4 Define Driver Training Requirements
10.5.5.5 Define Insurance Cover Requirements
10.5.5.6 Define Excess Liability Limits
10.5.5.7 Define Garaging Policy
10.5.5.8 Review Current Insurance Cover
10.5.5.9 Identify Requirement Changes
10.5.5.10 Identify Policy Providers
10.5.5.11 Select Policy Providers
10.5.5.12 Identify Stakeholders
10.5.5.13 Obtain Stakeholder Agreement
10.5.5.14 Recommend Fleet Insurance Policy Purchase
10.5.6.1 Determine Loss Protection Values
10.5.6.2 Determine Loss Protection Period
10.5.6.3 Monitor Stop Loss Orders
10.5.6.4 Regrade Stop Loss Orders
10.5.6.5 Identify Insurance Required
10.5.6.6 Identify Potential Insurers
10.5.6.7 Select Preferred Insurer
10.5.7.1 Determine Self-Insured Retention Limit
10.5.7.2 Determine Loss Fund Limit
10.5.7.3 Identify Potential Tax Benefits
10.5.7.4 Determine Limit Funding Rates
10.5.7.5 Identify Specific Excess Policy Suppliers
10.5.7.6 Identify Aggregate Excess Insurance Requirements
10.5.7.7 Identify Stakeholders
10.5.7.8 Recommend Self Insurance Policy
10.5.7.9 Obtain Stakeholder Approval
10.5.8.1 Identify Insurable Revenue Sources
10.5.8.2 Identify Insurable Business Activities
10.5.8.3 Identify Inter-group Sales
10.5.8.4 Define Indemnity Periods
10.5.8.5 Select Insured Amount
10.5.8.6 Identify Overhead Reduction Potential
10.5.8.7 Identify Increased Cost Of Working
10.5.8.8 Identify Claims Preparation Fees
10.5.8.9 Determine Property Renovation Costs
10.5.8.10 Identify Post Event Payroll Requirements
10.5.8.11 Determine 3rd Party Risk Exposure
10.5.8.12 Determine Utilities Reliance Risks
10.5.8.13 Select Claims Adjuster
10.5.8.14 Identify Records Restoration Requirements
10.5.8.15 Define Payout Variables
10.5.8.16 Identify Special Cases
10.5.8.17 Determine Cash Flow Loss Risks
10.5.8.18 Identify Buffer Slack
10.5.8.19 Identify Product Launch Delay Costs
10.5.8.20 Identify Stakeholders
10.5.8.21 Recommend Business Interruption Insurance Cover
10.5.8.22 Identify Suitable Policy Provider
10.5.8.23 Recommend Policy Purchase
10.5.8.24 Obtain Stakeholder Agreement
10.5.9.1 Quantify Sexual Harassment Risk
10.5.9.2 Quantify Discrimination Risk
10.5.9.3 Quantify Wrongful Termination Risk
10.5.9.4 Quantify Breach Of Employment Contract Risk
10.5.9.5 Quantify Negligent Evaluation Risk
10.5.9.6 Quantify Failure To Employ Risk
10.5.9.7 Quantify Failure To Promote Risk
10.5.9.8 Quantify Wrongful Discipline Risk
10.5.9.9 Quantify Deprivation Of Career Opportunity Risk
10.5.9.10 Quantify Wrongful Infliction Of Emotional Distress Risk
10.5.9.11 Quantify Mismanagement Of Employee Benefit Plans Risk
10.5.9.12 Determine Overall Risk
10.5.9.13 Monitor Employee Hiring Programme
10.5.9.14 Monitor Employee Screening Programme
10.5.9.15 Monitor Corporate Policy Distribution Programme
10.5.9.16 Monitor Discrimination Reporting Programme
10.5.9.17 Monitor Supervisor Behavior Guidance Programme
10.5.9.18 Develop Dispute Resolution Programme
10.5.9.19 Identify Stakeholders
10.5.9.20 Obtain Stakeholder Agreement
10.5.9.21 Publish Dispute Resolution Programme
10.5.9.22 Identify Appropriate Insurance Cover
10.5.9.23 Recommend Appropriate Insurance Cover
10.5.10.1 Key Employee Definition
10.5.10.2 Key Employee Value Determination
10.5.10.3 Key Employee Team Impact Assessment
10.5.10.4 Key Employee Loss Tolerance Factor
10.5.10.5 Key Employee Policy Provider Assessment
10.5.10.6 Key Employee Policy Provider Selection
10.5.10.7 Identify Stakeholders
10.5.10.8 Obtain Stakeholder Agreement
10.5.10.9 Implement Key Employee Insurance Policy
10.6.1.1 Establish Revenue Data Collection Channels
10.6.1.2 Establish Revenue Assurance Information Requirements
10.6.1.3 Establish Revenue Assurance Systems
10.6.1.4 Revenue Trend Analysis
10.6.1.5 Define Revenue Assurance Thresholds
10.6.1.6 Establish Revenue Assurance Processes
10.6.2.1 Track & Manage Revenue Assurance Trouble Resolution
10.6.2.2 Create Revenue Assurance Trouble Report
10.6.2.3 Monitor Revenue Assurance Controls
10.6.2.4 Assess Revenue Assurance Trouble
10.6.2.5 Resolve Revenue Assurance Trouble
10.6.2.6 Report Revenue Assurance Trouble Resolution
10.6.2.7 Close Revenue Assurance Trouble Report
10.6.3.1 Define Assured Revenue Streams
10.6.3.2 Define Total Expected Revenue
10.6.3.3 Define Coverage Levels
10.6.3.4 Define Unit Structures
10.6.3.5 Define Revenue Assurance Process Requirements
10.6.3.6 Define Revenue Assurance Technology Requirements
10.6.3.7 Define Revenue Assurance Organisational Requirements
10.6.3.8 Identify Stakeholders
10.6.3.9 Produce Revenue Assurance Policy Framework
10.6.3.10 Obtain Stakeholder Agreement
10.6.3.11 Publish Revenue Assurance Policy Framework
10.6.4.1 Define Network Deployment Strategy
10.6.4.2 Define Network Management Strategy
10.6.4.3 Identify Regulatory Requirements
10.6.4.4 Define Over-Provisioning Solution Strategy
10.6.4.5 Define Under-Provisioning Solution Strategy
10.6.4.6 Define Network Integrity Expectations
10.6.4.7 Identify Stakeholders
10.6.4.8 Obtain Stakeholder Agreement
10.6.4.9 Construct Network Integrity Policy
10.6.4.10 Publish Network Integrity Policy
10.6.5.1 Define Data Type Strategy
10.6.5.2 Define Data Storage Strategy
10.6.5.3 Identify Regulatory Requirements
10.6.5.4 Define Data Duplication Solution Strategy
10.6.5.5 Define Missing Data Solution Strategy
10.6.5.6 Define Data Record Integrity Expectations
10.6.5.7 Identify Stakeholders
10.6.5.8 Obtain Stakeholder Agreement
10.6.5.9 Construct Data Record Integrity Policy
10.6.5.10 Publish Data Record Integrity Policy
10.6.6.1 Define Dispute Negotiation Process
10.6.6.2 Set Up Dispute Negotiation Team
10.6.6.3 Identify Clearing House Partners
10.6.6.4 Identify Legal Possibilities
10.6.6.5 Identify Stakeholders
10.6.6.6 Obtain Stakeholder Agreement
10.6.6.7 Obtain Partner Dispute Settlement Process Agreement
10.6.6.8 Agree Arbitration Structure
10.6.7.1 Define Billing Strategy
10.6.7.2 Define Charging Strategy
10.6.7.3 Identify Regulatory Requirements
10.6.7.4 Define Overcharging Solution Strategy
10.6.7.5 Define Undercharging Solution Strategy
10.6.7.6 Define Billing System Integrity Expectations
10.6.7.7 Identify Stakeholders
10.6.7.8 Obtain Stakeholder Agreement
10.6.7.9 Construct Billing Systems Integrity Policy
10.6.7.10 Publish Billing Systems Integrity Policy