News & Analysis as of

Data Collection Compliance

The Investigation Team

by Thomas Fox on

Beginning with the Department of Justice’s (DOJ’s) Yates Memo, its Foreign Corrupt Practices Act (FCPA) Pilot Program and then the release of the Evaluation of Corporate Compliance Programs (Evaluation), I believe the DOJ has...more

Value-based health care: issues for pharmaceutical companies

by Ropes & Gray LLP on

Michael Lampert, Ropes & Gray health care partner, discusses issues facing pharmaceutical companies with the move towards value-based health care models. __ When I think about developing a value-based program for...more

Data Analysis In a Compliance Best Practices Program

by Thomas Fox on

An in-depth look at the use of data analysis in a best practices compliance program under the Foreign Corrupt Practices Act (FCPA), UK Bribery Act or other anti-corruption compliance regime....more

Compliance, Technology and Data Analytics

by Michael Volkov on

Compliance professionals cannot do it alone. Of course, CCOs need compliance staff and the collaboration of business, human resources, legal, financial and audit, and related functions in order to succeed. I have made this...more

EDRM Releases New Security Questionnaire: eDiscovery Trends

by CloudNine on

As promised when they announced the project last August, EDRM announced last week the release of a new Security Audit Questionnaire, which is designed to be a practical tool for evaluating the security capabilities of...more

Pitfalls of Using Big Data Alone

by Thomas Fox on

I often write about the use of big data in a best practices compliance program. However, care must be taken in the use and interpretation of big data. One of the clearest reads into this topic is the recent book by Cathy...more

U.S. Customs and the New Trump Administration: Your Top Ten Questions Answered

by Foley & Lardner LLP on

During the campaign, U.S. Customs & Border Protection (CBP) was mostly mentioned by President Trump in the context of illegal immigration. Controlling the flow of people, however, is only one of the jobs of CBP, which is part...more

Understanding the Benefits of Benchmarking & How to Do It Successfully

by NAVEX Global on

To begin, let’s define “benchmarking.” There is often confusion regarding the difference between benchmarking and assessment. ...the process of benchmarking is a subset of compliance program assessment....more

Update from the French Data Protection Authority on the compliance package for connected vehicles

by Reed Smith on

The market of the so-called “connected vehicles” has been considerably growing since 2015. According to a recent study by AlixPartners, 78 million of connected vehicles will be commercialized in 2018, generating a EUR40...more

Sampling as a Compliance Strategy

by Michael Volkov on

In the technology age in which we live, CCOs often come face to face with a new phenomenon – too much information or data. TMI is not something to laugh at nor ignore. CCOs often face situations where they need to understand...more

Paul Revere and the Use of Metadata in a Best Practices Compliance Program

by Thomas Fox on

Yesterday I celebrated the signing of the Declaration of Independence and, more particularly, the signature of John Hancock as emblematic of culture change in a compliance program. Today I want to celebrate another well-known...more

Big Data in a Best Practices Compliance Program, Part III-Visualization

by Thomas Fox on

Today I continue my exploration of big data in a best practices Foreign Corrupt Practices Act (FCPA) compliance program. Yesterday, I considered how you might use big data in a best practices compliance program. Today I want...more

Big Data in a Best Practices Compliance Program, Part II

by Thomas Fox on

Today I continue my exploration of big data in a best practices Foreign Corrupt Practices Act (FCPA) compliance program. Yesterday, I considered what big data is and some ways to think about it. Today I want to move into some...more

Data Analysis Week – Part II: Setting Up Your Analysis

by Thomas Fox on

Today, I continue my exploration of data analysis with Joe Oringel, co-founder and Managing Director of Visual Risk IQ, a consulting firm that helps audit and compliance people see and understand their data. Today, we look at...more

Russia ramps up compliance checks under its Data Localisation Law

by Reed Smith on

Russia’s data protection authority, the Roskomnadzor, has recently announced its intention to increase the number of data localisation audits it carries out in 2016. It has pledged to conduct around 1,000 data localisation...more

Electronic Reporting to be the NPDES Rule

After a lengthy public notice and comment period, the final National Pollutant Discharge Elimination System (“NPDES”) Electronic Reporting Rule was published in the Federal Register on October 22, 2015, and will become...more

EBA publishes 2016 work programme

by Dentons on

EBA has published its annual work programme for 2016, describing its specific activities and tasks for the coming year. EBA’s work for 2016 is defined under 34 activities in the following strategic areas...more

5 Questions to Ensure Your Policies Keep Up With the Pace of Change

by NAVEX Global on

You hear a lot these days about the ways that individuals’ private data is collected and potentially exposed—to technology companies, employers, the government and so on. You hear less about the concern of many employers, who...more

Could a Vendor’s Lax Info Security Ruin Your Holiday Sales? Seven Preventative Steps for Retailers

by Perkins Coie on

Many of the largest retailer data security breaches have been caused or enabled by the acts or omissions of retailers’ vendors, such as the widely publicized incident at Target Corporation. Several such breaches occurred...more

CFPB issues final HMDA rule

by Ballard Spahr LLP on

The CFPB has issued a final rule amending Regulation C, its Home Mortgage Disclosure Act regulation. The changes, which, in part, implement the Dodd-Frank Act’s amendments to HMDA, expand the scope of data required to be...more

States Continue To Grapple With Data Breach Notification Issues

by Carlton Fields on

Connecticut’s data breach notification law currently requires notification “without unreasonable delay.” Effective October 1, 2015, Connecticut will (a) require notice of any breach of security not only “without unreasonable...more

Second Chance to File Oppositions to CTIA Challenge

by Davis Wright Tremaine LLP on

In its June 2015 Lifeline Order on Reconsideration, the FCC adopted a new rule which requires ETCs to retain documentation demonstrating subscriber eligibility for Lifeline, such as a copy of the applicant’s food stamp card...more

5 Tips for Quickly Identifying Responsive Data Sources for E-Discovery Collections

by Exterro, Inc. on

Working with IT or your service provider to collect/process from a variety of data sources, like email archives, file shares, legacy backup tapes, SharePoint, etc., can be a painful and complicated ordeal. You don’t...more

ACER reports on its activities under REMIT

by Dentons on

ACER has published its third annual report. This covers its activities during 2014 for the implementation and monitoring of the Regulation on Energy Market Integrity and Transparency (REMIT). The report looks at...more

Russia’s new data law

by Dentons on

Russia’s new Data Localisation Law went live yesterday on 1 September. Many companies with operations in Russia are scratching their heads about how to comply. The Basics - The new law applies to businesses with a...more

56 Results
|
View per page
Page: of 3
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.