Controls to COF mapping

How traditional controls evolve into engineered execution (illustrative)

Purpose. Readers often ask whether COF replaces controls. It does not. COF is how selected controls become executable and traceable at scale. This page shows examples of control intent expressed twice: first as a traditional control, then as a COF-enabled pattern. Your bank’s obligations and architecture will differ; use this as a design conversation aid, not a vendor spec.

Prerequisites. Read Controls framework and COF for DCA first.

Mapping table (examples)

Control needTraditional control patternCOF-enabled pattern
Stop DCA during hardshipPolicy plus manual suppression flag; ops checks spreadsheetsState activation for hardship; prohibition gate blocks placement and outbound; trace on override
Stop after recallRecall file plus manual kill list; hope vendor clears diallerRecall state plus event interception on contact engines; acknowledgement trace from vendor runtime
Prevent wrong default listingQA sample of listings; post-hoc fixesState-aware prohibition on bureau submission while protected; parameterised listing rules
Reconcile DCA stateDaily ops review; email escalationDual-state compare with exception detection, ageing, and automated holds on outbound when break exceeds threshold
Complaint overlap with enforcementManual pause instructionsArbitration between complaint clock and enforcement intent; explicit resume conditions
DCA1 to DCA2 explainabilityMeeting notes; partial dataDecision trace with proposed versus actual next strategy and rule version

Maturity progression

Most banks run a mixed model: some controls are manual but strong (small volume, expert team), some are automated but brittle (old batch files), and a few obligations are COF-aligned in modern stacks. The risk is invisible inconsistency: customers in similar circumstances treated differently because one path hit an engineered gate and another path relied on a busy team’s memory.

Maturity is not “COF everywhere tomorrow.” It is deliberate movement of high-risk obligations from detect after breach to prevent by construction, with logging that stands up in review.

Where this connects in the pack

Back to pack home