Cybersecurity Compliance

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Banks Should Prepare for Increased Collaboration between IT, Legal and BSA/AML Compliance Departments under New FinCEN Guidance

Last month, the U.S. Treasury Department’s Financial Crimes Enforcement Network (FinCEN) issued an Advisory which provided substantial guidance to financial institutions regarding the scope of information that must be...more

Looking Ahead: Top Issues Impacting the Tech Industry in 2017

As technology continues to reshape how business gets done and the way people live their lives, there are many reasons to be excited about the tech industry’s prospects heading into 2017. The more than 300 executives,...more

FinCEN Issues Advisory on the Reporting of Cyber-Events and Cyber-Enabled Crimes

The Financial Crimes Enforcement Network, or FinCEN, an arm of the United States Department of the Treasury, issued an advisory last week to remind financial institutions of their obligations to report cyber-events on...more

European Health Care Compliance Challenges (And Solutions)

Life sciences and health care companies (“health care companies”) rightly invest a significant amount of time and money into ensuring compliance with health care regulations in the countries in which they are based, but...more

Avoiding Legal Pitfalls and Cultural Considerations When Conducting International Business in Asia

The Foreign Corrupt Practices Act - Detailed technical definitions and explanations of what constitutes corrupt practices are available. A simple explanation is that furnishing a foreign government official with...more

Match Made in Heaven: Compliance and Human Resources

The corporate compliance function is only as successful as its partnerships with key internal constituencies. Depending on the company and the personnel involved, compliance has to establish and maintain effective working...more

Nutter Bank Report, July 2016

FinCEN has released guidance in the form of answers to frequently asked questions (“FAQs”) about new customer due diligence (“CDD”) requirements that became effective this month. The CDD FAQs issued on July 19 clarify new...more

How BCM Saves Money in Cybersecurity, Laurence Guihard-Joly Explains [PODCAST]

Laurence Guihard-Joly is back with information showing that business continuity management can save companies money from a study conducted by the Ponemon Institute. Compliance leaders are always on the hunt for metrics...more

5 Useful Resources on the New EU General Data Protection Regulation (GDPR)

Data privacy lawyers and officers around the world are working to assess the implications of and implement (before May 25, 2018) the requirements contained within the recently passed General Data Protection Regulation (GDPR)....more

SEC Issues Guidance on Business Continuity Planning for Registered Investment Companies

On June 27, the staff of the Securities and Exchange Commission’s (Commission or SEC) Division of Investment Management (IM) issued a Guidance Update on business continuity planning for registered investment companies...more

[Webinar] Ethics and Cybersecurity - June 29th, 12pm CDT

With recent headlines about successful attacks on corporate computer systems, safeguarding client electronic information is an issue that all attorneys must address. This presentation will discuss the ethical rules that...more

5 Simple Ways to Boost Your E&C Program

In my recently published eBook, I outline 25 Simple Yet Overlooked Ways to Boost Your Ethics & Compliance Program. Below are five of the tips that are included—download the full eBook today to see the rest....more

Reports Reveal Four Cyber Security Trends—and the Need for Better Cyber Security Training & Awareness

As cyber security issues continue to escalate and evolve, compliance officers have more opportunities to better protect and defend their organizations from cyber risk. One of compliance officers’ responsibilities is to stay...more

Prog Rock Week – Part VI: Bohemian Rhapsody and Compliance Week 2016

Today I conclude my celebration of progressive rock by looking at the greatest prog rock single of all-time, which, of course, is Queen’s Bohemian Rhapsody, written by Freddie Mercury. It was written for the band’s 1975...more

Manufacturing Matters - Winter 2016

Welcome to Manufacturing Matters, DLA Piper’s specialist publication providing a round-up of legal news, sector updates and commentary for clients and contacts engaged in the manufacturing sector. British manufacturers...more

[Webinar] White Collar Crimes in Indo-U.S. context: Do’s and Don’ts - Meritas Capability Webinar - Feb. 3rd, 10:00am EST

While emerging markets represent untapped growth potential and investment opportunities, there is often a sharp contrast between global best practices and compliance requirements and accepted business practices prevalent in...more

Cyber Security Compliance: The Role of the CCO

For years, cyber security has been the province of IT specialist and technicians. Those days are long gone. If you ask a Board of Directors to identify a company’s most significant risk – cyber security is tops....more

U.K. Procurement Managers to Vendors: Take Cyber Security Seriously or You’re Out

The headlines about massive cyber-security breaches just keep coming these days. Corporate giants Vodaphone, Home Depot, Talk Talk and JP Morgan Chase have all been hacked—to and they're far from the only ones.. But the...more

Upping the Ante: Cybersecurity, the SEC and the Perils of Being Unprepared

The U.S. Securities and Exchange Commission is finally getting serious about cybersecurity – and for good reason. If the ever-growing business and headline risks aren’t enough to scare investment advisers and broker-dealers...more

Investment Management Legal + Regulatory Update - November 2015

Regulation - OCIE Cautions Advisers on Outsourcing Compliance Activities: In a Risk Alert dated November 9, 2015, the SEC’s Office of Compliance Inspections and Examinations (OCIE) said it found that outsourced...more

How Can I Make Sure My Compliance Training Program Covers All My Risks?

Building a compliance training program that covers all of your organization’s risks isn’t easy. To do it in a way that ensures you cover your bases without creating training fatigue means creating a multiyear training...more

Recent Government Cyber Alert and Draft Guide for Financial Institutions: Lessons for All Organizations

All organizations, including financial institutions, continue to face significant security threats across their wide ranging IT systems. Such organizations are particularly vulnerable if they cannot track networked devices...more

Recent Amendments to Security Breach Notification Laws Further Complicate Breach Notification for Employers

It is not a matter of "if" but "when" an employer will be required to notify employees of a security breach.  Forty-seven states require employers to notify employees when defined categories of personal information, including...more

Preview of NAVEX Global’s 2015 Ethics and Compliance Virtual Conference

As 2015 draws to a close (where did the time go?), the 2016 planning season is in full swing. You likely already have an idea of initiatives you’ll want to tackle, but taking your ethics and compliance program to the next...more

A Compilation of Enforcement and Non-Enforcement Actions

Non-Enforcement - SEC Decides Against Mounting an Appeal in Koch Ruling - The July 2015 ruling by the D.C. Circuit Court in Koch v. SEC will apparently not be challenged by the SEC. The Court ruled in that...more

157 Results
|
View per page
Page: of 7
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×