SFT 6.2 Compliance with Redbrick

Shortcuts in the system are not efficiency. They are violations.


What System Abuse Looks Like

These are serious breaches — not “small fixes”.

  • Using privileged information as if it is public data
  • Editing or forging documents to change facts
  • Forging client signatures
  • Getting clients to sign blank or incomplete forms

If the process is bypassed, the system is compromised.


What This Really Means

  • You are manipulating the process
  • You are exposing the client to risk
  • You are exposing the company to liability

“Just to make it faster” is NOT a valid reason.


Redbrick Standard

  • No shortcuts
  • No bypassing checks and controls
  • No assumptions about “this one should be fine”
  • Follow the full process — every time

Controls exist to protect you, the client, and the business.


Corporate Governance

Respect the system. Respect the structure.

  • Follow compliance requirements strictly
  • Do not undermine internal controls
  • Do not treat checks as optional

If you don’t respect the system, you cannot be trusted within it.


Consequences

  • Immediate termination
  • Regulatory and legal action
  • Loss of reputation and career impact

Wrong is wrong — even if it “works”.

Scroll to Top