Sipes, Elizabeth Kemery; James, Joshua; Zetoony, David - In: Journal of Investment Compliance 17 (2016) 3, pp. 55-59
evaluating a bounty program. Design/methodology/approach This article is divided into three parts: how to design a document … bounty program. The information is presented in narrative form as well as through a series of practical checklists, questions … bounty programs. Originality/value This article includes practical guidance regarding document retention policies, incident …