Compliance Strategy

Regulatory Change Management: How to Track New Rules, Update Policies, and Stay Ahead of Compliance Deadlines

Table of Contents

TL;DR:

  • 92% of compliance professionals say their role has become harder; 77% still rely on manual processes to track regulatory changes — a gap that shows up as exam findings when rules take effect that your policies don’t reflect.
  • The OCC’s Compliance Management Systems booklet defines what examiners assess: board oversight, compliance program, audit, and complaint resolution. Regulatory change management falls squarely in the compliance program component.
  • A functioning program has four components: an obligation inventory (what rules apply), horizon scanning (what’s coming), impact assessment (what changes are needed), and evidence of implementation.
  • The most common failure isn’t missing a rule — it’s having no one specifically responsible for tracking it from issuance through policy update to effective date.

The compliance calendar is full. The CFPB finalized a rule. The OCC updated a booklet. Two state banking regulators released guidance. A state AG announced a multistate enforcement sweep. Your bank partner sent an email asking whether your policies reflect the new interagency guidance on third-party risk.

You knew about most of these. The problem was what happened next: the rule landed in a shared folder, the booklet update went into someone’s reading queue, the enforcement sweep produced a Slack message. Three months later, the effective date passed. The policy wasn’t updated.

That’s not a knowledge failure. It’s a process failure. And it’s one of the more common compliance program deficiencies examiners find.

Here’s how to build a regulatory change management program that works without requiring a GRC platform or a team of ten.


Why Regulatory Change Management Has Gotten Harder

The volume problem is real. A 2025 survey of compliance decision-makers found that 82% track between 26 and 100 regulatory alerts per month — and 39% track between 51 and 100. That’s a minimum of one new or updated regulatory item every business day, across a single compliance function that may have one to five people.

The complexity compounds the volume. Fintechs don’t answer to one regulator. Depending on your business model, you may be subject to:

  • OCC or state banking department supervision (if you have a bank charter or operate under a bank partner’s umbrella)
  • CFPB rulemaking authority across consumer protection laws (TILA, ECOA, FCRA, UDAAP)
  • FINRA if you’re a registered broker-dealer or investment adviser
  • FTC authority over unfair or deceptive acts and practices, and the GLBA Safeguards Rule
  • State attorneys general with independent consumer protection enforcement authority
  • State banking regulators with licensing and examination authority
  • Sector-specific regulators (FinCEN for BSA/AML, state insurance regulators, state money transmitter licensing bodies)

Each of these regulators issues bulletins, guidance, proposed rules, final rules, enforcement announcements, and exam finding disclosures — often on overlapping topics, sometimes inconsistently. Keeping track without a structured program is genuinely difficult.

The consequence of failure is concrete. According to KPMG’s analysis of compliance risk management, 92% of compliance professionals report their roles have become more difficult, with nearly half struggling to keep pace with constant regulatory changes. And 77% of compliance teams remain reliant on manual processes — email subscriptions, shared spreadsheets, and institutional knowledge — to manage a workload that has outgrown those tools.

When a rule takes effect and your policies haven’t been updated, examiners will find it. The finding isn’t usually that you didn’t know about the rule — it’s that your compliance program didn’t have a mechanism to translate knowing into doing.


What Examiners Look For: The OCC’s CMS Framework

The OCC’s Comptroller’s Handbook booklet on Compliance Management Systems defines the framework examiners use to assess whether a bank or fintech has an effective compliance program. The same framework shapes what bank partners expect from their fintech relationships.

The four core elements of an effective CMS:

1. Board and management oversight. The board and senior management demonstrate understanding of and commitment to compliance. This means documented accountability, compliance reporting to the board, and a clear organizational structure with designated compliance ownership.

2. The compliance program. This is where regulatory change management lives. An effective compliance program includes policies and procedures that reflect current regulatory requirements, training for employees with relevant compliance responsibilities, monitoring to detect compliance failures, and a mechanism for tracking regulatory changes and updating policies accordingly.

3. Compliance audit. An independent function assesses whether the compliance program is working. This includes verifying that policies have been updated to reflect regulatory changes and that those changes have been operationalized.

4. Consumer complaint resolution. A system for tracking, responding to, and analyzing consumer complaints as an early warning signal of compliance failures.

Regulatory change management is most directly assessed as part of the compliance program component. Examiners want to see evidence of a defined process — not just a general awareness that regulatory changes happen — that includes intake, impact assessment, ownership assignment, implementation, and verification.

The OCC’s 2025 supervisory priorities, organized around financial risk, operational risk, and compliance risk, have also elevated enterprise change management as an examiner focus area. Examiners are instructed to assess governance processes for significant changes in business activities, systems, and regulatory-related updates. A fintech that can’t demonstrate a structured approach to implementing regulatory changes is likely to get an observation — or an MRA — in its next examination.


The Four Components of a Working Program

1. Obligation Inventory: What Rules Apply to You?

Before you can track changes to your regulatory obligations, you need to know what those obligations are. An obligation inventory maps each applicable law, regulation, and guidance document to the business activities and products it governs.

This doesn’t need to be exhaustive on day one. Start with:

  • The primary laws and regulations governing your core business activities
  • Any conditions or requirements in your bank partnership agreements
  • Exam findings or MRAs from prior examinations (these often identify obligation gaps)
  • Customer-facing disclosures (these implicitly define your compliance obligations)

The inventory becomes the baseline against which new regulatory changes are assessed. When a new rule is issued, the first question is: does this add to, modify, or replace an existing obligation?

2. Horizon Scanning: What’s Coming?

Horizon scanning is the practice of monitoring regulatory activity across your full regulatory perimeter — proposed rules, final rules, guidance, enforcement actions, supervisory letters — with enough lead time to implement required changes before effective dates.

The minimum source set for most fintechs:

SourceAccess PointWhat to Monitor
OCCocc.treas.gov — Bulletins, NewsBulletins, booklet updates, enforcement orders
FDICfdic.gov — News & EventsFinancial Institution Letters (FILs), press releases
CFPBconsumerfinance.gov — NewsroomRules, guidance, supervisory highlights
FINRAfinra.org — Regulatory NoticesRegulatory notices, rule filings
FTCftc.gov — NewsRules, enforcement actions
State banking dept.State-specificLicensing requirements, guidance
State AGState-specificConsumer protection enforcement

Subscribe to email notification lists directly from each agency. Supplement with aggregators — law firm client alerts, JD Supra, and agency-specific digests — but treat those as filters on top of primary source monitoring, not replacements for it.

The goal of horizon scanning is a regulatory change log: a running record of items identified, with their source, topic, effective date, and initial applicability determination.

3. Impact Assessment: What Changes Are Needed?

Not every regulatory change requires a policy update. Some guidance documents are informational; some final rules have delayed effective dates or thresholds your business doesn’t meet; some apply to products you don’t offer.

A documented impact assessment answers three questions for each regulatory change:

  1. Applicability: Does this change apply to our business? (Yes / No / Partial — with documented rationale)
  2. Impact: What specifically needs to change? (Policy, procedure, training, system, disclosure, vendor contract, or nothing)
  3. Timeline: What is the effective date, and what do we need to complete before then?

The assessment should be documented — not because someone is going to read every line, but because you need to be able to produce it if an examiner asks why your program treated a given regulatory change the way it did. “We assessed it and determined it didn’t apply because X” is a defensible answer. No documentation of that assessment is not.

4. Policy Management and Evidence of Implementation

This is where most programs fall apart. The regulatory change has been identified. The impact has been assessed. The policy owner has been assigned. And then… the policy doesn’t get updated before the effective date.

A policy management process that works assigns:

  • A specific owner for each policy (not “compliance” as a department, but a named individual)
  • A review trigger tied to regulatory changes in the relevant subject area
  • A version control system that tracks when each policy was updated and why
  • An evidence requirement that captures training completion, system changes, or operational updates implementing the regulatory change — not just the policy revision

An effective date is a deadline, not a suggestion. Examiners look at the date a regulation took effect and the date your policy was updated. If your policy update post-dates the effective date, the gap is a finding.


Common Program Failures

No designated owner for regulatory monitoring. When everyone is generally responsible for staying current on regulations, no one is specifically responsible. A functional program designates a primary owner for horizon scanning — someone who has this as an explicit job responsibility, not an implied one.

Horizon scanning limited to passive email subscriptions. Email subscriptions produce information. They don’t produce impact assessments, policy updates, or training records. Regulatory intelligence needs a defined handoff from “identified” to “assessed” to “assigned” to “implemented.”

Policies updated reactively rather than proactively. If your policies are updated when an examiner flags them as outdated, your program is operating in response to exam findings rather than in front of them. The effective date is the point when the examiner expects your policies to already reflect the new requirement.

No documented impact assessment. “We looked at it and decided it didn’t apply” is defensible. The absence of any record that you looked at it at all is not. Document applicability determinations even for changes that don’t require action.

Training lag. New regulatory requirements often require employee training before they take effect. A policy update that isn’t accompanied by training completion records leaves a gap between written compliance and operational compliance.


Building the Program Without a GRC Platform

Teams without dedicated GRC software can run an effective regulatory change management program using a well-structured tracker. The essential fields:

FieldPurpose
Change IDUnique identifier for each tracked item
SourceRegulatory body (OCC, CFPB, etc.)
Publication dateWhen the change was issued
TopicSubject matter (BSA/AML, fair lending, data privacy, etc.)
Effective dateWhen compliance is required
ApplicabilityYes / No / Partial, with rationale
ImpactWhat changes are needed
Policy ownerNamed individual
Implementation deadlineInternal deadline before effective date
StatusNot started / In progress / Complete
EvidenceLink to updated policy, training record, system change
Closed dateWhen implementation was verified complete

The tracker works when someone reviews it weekly, updates statuses, and escalates items approaching their effective date without complete implementation. It fails when it becomes a historical record of what happened rather than an active management tool.


So What?

The compliance professionals who manage regulatory change well don’t have more resources — they have better process. Specifically, they have someone who owns each active regulatory change from the moment it’s identified through the date it’s implemented and documented. That ownership is the difference between a program that works and a program that produces exam findings.

The volume of regulatory activity isn’t going to decrease. If anything, the pace of rulemaking across banking, fintech, privacy, and AI regulation suggests the next two years will be as active as the last two. A structured program doesn’t make the workload lighter — it makes the workload manageable and defensible.

For common exam findings in compliance programs — including what regulators flag most often in oversight reviews — see Common CFP Exam Findings: Top Deficiencies Regulators Flag. On building the operational risk infrastructure that connects regulatory change management to your broader risk framework, see How to Build an Operational Risk Management Framework From Scratch. For context on the current regulatory landscape — particularly the AI and technology regulation changes driving change management workloads — see AI Regulation Compliance in 2026: What’s Required and What’s Coming.

If you need the governance documentation that sits above your regulatory change management process — risk appetite, compliance committee charter, three lines of defense model, and board reporting framework — the Enterprise Risk Management Framework (ERMF) covers the full governance structure for compliance programs that need to demonstrate institutional accountability for regulatory change response.


Sources:

Frequently Asked Questions

What is regulatory change management and why does it matter for fintechs?
Regulatory change management is the process for identifying new or amended laws and regulations, assessing their impact on your business, and implementing required policy and operational changes before the effective date. For fintechs, it matters because you're subject to multiple regulators simultaneously — OCC, FDIC, CFPB, FINRA, state agencies, and sector-specific regulators — and missing a rule change can result in exam findings, enforcement actions, or contract violations with bank partners.
What does OCC look for in a compliance management system?
The OCC's Compliance Management Systems booklet identifies four core elements of an effective CMS: board and management oversight (tone at the top, clear accountability), the compliance program itself (policies, training, monitoring), compliance audit (independent review of program effectiveness), and consumer complaint resolution (tracking and responding to complaints as signals of compliance failures). Regulatory change management falls under the compliance program component — examiners assess whether the institution has a process for identifying regulatory changes and updating its policies and procedures accordingly.
How do fintechs typically fail at regulatory change management?
The most common failures are: no designated owner for regulatory monitoring (everyone is vaguely responsible, no one is specifically responsible), horizon scanning limited to one or two email subscriptions with no intake workflow, policies updated only when an examiner flags them as outdated, no documented impact assessment connecting the regulatory change to specific business processes, and no evidence that training or operational changes were implemented before the effective date.
What regulatory sources should compliance teams monitor?
For most fintechs, the minimum source set includes: OCC bulletins and booklet updates, FDIC FIL (Financial Institution Letters), CFPB rulemakings and guidance, FINRA regulatory notices, FTC rules and enforcement announcements, applicable state banking department releases, and state AG consumer protection enforcement actions. Third-party aggregators like JD Supra, Orrick's FinReg blog, and agency email subscription lists can supplement direct monitoring.
What's the difference between horizon scanning and regulatory change management?
Horizon scanning is the upstream activity — monitoring what rules are proposed, finalized, or taking effect across your regulatory perimeter. Regulatory change management is the downstream response — assessing which of those changes apply to you, what needs to change in your policies and operations, who owns each change, and whether the implementation was completed before the effective date. Horizon scanning without a management process produces information but no action. Change management without horizon scanning means you learn about new rules after the fact.
Can small compliance teams run an effective regulatory change management program without a GRC platform?
Yes. A well-designed spreadsheet or project management tool — with clear columns for regulatory source, change description, effective date, applicability determination, policy owner, implementation status, and evidence of completion — provides most of the functionality needed for teams managing 20 to 50 active changes at any given time. The program fails not because of tooling gaps but because of ownership gaps: someone specific needs to own each active change from intake through implementation sign-off.
Rebecca Leung

Rebecca Leung

Rebecca Leung has 8+ years of risk and compliance experience across first and second line roles at commercial banks, asset managers, and fintechs. Former management consultant advising financial institutions on risk strategy. Founder of RiskTemplates.

Related Framework

Enterprise Risk Management Framework (ERMF)

Complete ERM documentation: risk appetite, 3 Lines of Defense, committee charter, and board reporting.

Immaterial Findings ✉️

Weekly newsletter

Sharp risk & compliance insights practitioners actually read. Enforcement actions, regulatory shifts, and practical frameworks — no fluff, no filler.

Join practitioners from banks, fintechs, and asset managers. Delivered weekly.