DE Talk | Beyond the Workplace: The Camaraderie & Meaningful Impact of Veteran ERGs
Employment Law Update for Nonprofits With Holly Sutton
What's the Tea in L&E? When Employees Refuse to Play Nicely in the Sandbox: Does it Call for a Mediator?
Interactive Compliance Policies
California Employment News: Best Practices for Managing Remote and Hybrid Employees
Meet the Engaging George Washington as He Shares His Views on Leadership and More
III-40 – Valentine’s Day Episode on Love Contracts
[WEBINAR] Who Does What? Defining Proper Roles for Staff and Elected Officials
FCPA Compliance Report-Episode 382, Susan Divers on LRN’s 2018 Program Effectiveness Report
To Be or Not To Be (an Employer)
FCPA Compliance and Ethics Report-Episode 154-Compliance Leadership-Persuasion, Influence, Tools & Tips, Skills and Tips
BakerHostetler Partner Paul Karlsgodt Discusses Privacy Class Actions
PATIENT PRIVACY IN AN ERA OF SOCIAL MEDIA
Polsinelli Podcasts - Safely Navigating the ADA, FMLA & Worker's Compensation Laws
Protecting Trade Secrets During Business Collaboration
FCPA Compliance and Ethics Report-Episode 88, Internal Controls for Third Parties Under the FCPA, Part I
Antitrust Enforcement and Compliance Programs
FCPA Compliance Programs A Review of Best Practices
Building an Anti Corruption Compliance Program Practical Steps 2 18 14, 9 02 AM
Internal Investigations: Soup to Nuts (March 13, 2014)
We've harped on the importance of strong passwords several times, and hopefully we are all practicing those tips. Many of us have dozens of online accounts, and while it's tempting to use the same password across the board...more
Any system is only as strong as its weakest link. If your employees aren’t up to date on their cybersecurity hygiene, then it doesn’t matter how much money you spend on technological defences—there’s a gap in your protection....more
A recent survey conducted by Arlington Research for OneLogin in May 2016 of 1,022 respondents found what most of us already know: employees continue to be a high risk for employers when it comes to security risk. The...more
The rate of disclosures of security incidents in 2015 continues at a pace that caused many to call 2013 and then 2014 “the year of the breach.” Most incidents are described publicly with attention-grabbing terms such as...more
With the global economic cost of cybercrime totaling more than $400 billion per year and breaches affecting companies ranging from retailers (e.g. Target, Walmart and Staples) and restaurants (Dairy Queen and Jimmy John’s) to...more
Three privacy/security stories that you should know as you start your week: President Obama to Offer Cybersecurity/Privacy Previews to State of the Union Proposals - In a series of speeches this week, President...more
Each day, family offices receive, relay, and manage a family’s private information. Depending on the family and the role of the family office, the information managed can be voluminous and include financial information, tax...more
The New Year is here. It is time to make those 2015 resolutions, and not just those for getting fit and healthy. Resolve now to improve your organization’s compliance with the Health Insurance Portability and Accountability...more
California Attorney General Kamala D. Harris has released a “California Data Breach Report,” which presents a series of findings and recommendations based on a review of breaches reported to the Attorney General’s office in...more
Today as companies increasingly realize the value of strong cybersecurity, those CIOs who successfully implement an effective cybersecurity system should be viewed as a critical part of the revenue generation effort. An...more
As you have probably seen, it was announced on Tuesday, August 5th, that usernames and passwords from 1.2 billion Internet accounts from over 420,000 websites were stolen by a criminal organization in Russia. According to...more
Last month’s Employment Law Commentary discussed the high level of international attention now being paid to protecting trade secrets from misappropriation, with recommendations for practical steps that companies may take to...more
The U.S. Department of Health and Human Services’ Office for Civil Rights (OCR) will soon begin a second phase of audits (Phase 2 Audits) of compliance with Health Insurance Portability and Accountability Act of 1996 (HIPAA)...more
When Wei Wong, owner of Sushi Mushi, a popular Japanese food bistro in Texas, installed a phone add-on to take credit and debit card payments straight from his employees’ phones, his revenues skyrocketed. Yesterday the Feds...more
Panelists at the PCAOB’s June 25 Standing Advisory Group Meeting discussed cybersecurity and the potential implications for financial reporting and auditing. Some of the highlights from the panel include the following...more
Cyber security, corruption and unethical behavior pose significant risks for business enterprises, according to a new survey by EY titled “Overcoming Compliance Fatigue’. At the same time business organizations may be...more
Data security breaches marred the 2013 holiday season for many consumers and retailers. The most famous security breach, at Target Corporation (Target), involved the loss of information on 40 million payment cards and...more
The framework provides standards and best practices for identifying, assessing, and managing cybersecurity risk. Now that the Obama administration has unveiled the final version of its anticipated Cybersecurity...more