Data Collection Compliance

News & Analysis as of

Big Data in a Best Practices Compliance Program, Part III-Visualization

Today I continue my exploration of big data in a best practices Foreign Corrupt Practices Act (FCPA) compliance program. Yesterday, I considered how you might use big data in a best practices compliance program. Today I want...more

Big Data in a Best Practices Compliance Program, Part II

Today I continue my exploration of big data in a best practices Foreign Corrupt Practices Act (FCPA) compliance program. Yesterday, I considered what big data is and some ways to think about it. Today I want to move into some...more

Data Analysis Week – Part II: Setting Up Your Analysis

Today, I continue my exploration of data analysis with Joe Oringel, co-founder and Managing Director of Visual Risk IQ, a consulting firm that helps audit and compliance people see and understand their data. Today, we look at...more

Russia ramps up compliance checks under its Data Localisation Law

Russia’s data protection authority, the Roskomnadzor, has recently announced its intention to increase the number of data localisation audits it carries out in 2016. It has pledged to conduct around 1,000 data localisation...more

Electronic Reporting to be the NPDES Rule

After a lengthy public notice and comment period, the final National Pollutant Discharge Elimination System (“NPDES”) Electronic Reporting Rule was published in the Federal Register on October 22, 2015, and will become...more

EBA publishes 2016 work programme

EBA has published its annual work programme for 2016, describing its specific activities and tasks for the coming year. EBA’s work for 2016 is defined under 34 activities in the following strategic areas...more

5 Questions to Ensure Your Policies Keep Up With the Pace of Change

You hear a lot these days about the ways that individuals’ private data is collected and potentially exposed—to technology companies, employers, the government and so on. You hear less about the concern of many employers, who...more

Could a Vendor’s Lax Info Security Ruin Your Holiday Sales? Seven Preventative Steps for Retailers

Many of the largest retailer data security breaches have been caused or enabled by the acts or omissions of retailers’ vendors, such as the widely publicized incident at Target Corporation. Several such breaches occurred...more

CFPB issues final HMDA rule

The CFPB has issued a final rule amending Regulation C, its Home Mortgage Disclosure Act regulation. The changes, which, in part, implement the Dodd-Frank Act’s amendments to HMDA, expand the scope of data required to be...more

States Continue To Grapple With Data Breach Notification Issues

Connecticut’s data breach notification law currently requires notification “without unreasonable delay.” Effective October 1, 2015, Connecticut will (a) require notice of any breach of security not only “without unreasonable...more

Second Chance to File Oppositions to CTIA Challenge

In its June 2015 Lifeline Order on Reconsideration, the FCC adopted a new rule which requires ETCs to retain documentation demonstrating subscriber eligibility for Lifeline, such as a copy of the applicant’s food stamp card...more

Making Compliance Easier and Smarter Through Technology: Intuitive Interface and Intelligent Data Gathering is Helping WorldRemit...

WorldRemit is an online money transfer service. It’s bringing a strong challenge to other players in this field through easier-to-use services and lower fees. But while it may be an innovative company, it is still challenged...more

5 Success Factors in Cutting-Edge Compliance: Compliance Becomes King When These Elements Are Integrated Into Day-to-Day...

Technology is doing more than bringing compliance fully into the digital age. It’s also initiating a revolution that is putting compliance and ethics at the forefront of how business is run, creating far greater operational...more

5 Tips for Quickly Identifying Responsive Data Sources for E-Discovery Collections

Working with IT or your service provider to collect/process from a variety of data sources, like email archives, file shares, legacy backup tapes, SharePoint, etc., can be a painful and complicated ordeal. You don’t...more

ACER reports on its activities under REMIT

ACER has published its third annual report. This covers its activities during 2014 for the implementation and monitoring of the Regulation on Energy Market Integrity and Transparency (REMIT). The report looks at...more

Russia’s new data law

Russia’s new Data Localisation Law went live yesterday on 1 September. Many companies with operations in Russia are scratching their heads about how to comply. The Basics - The new law applies to businesses with a...more

Privacy & Cybersecurity Update - August 2015

Third Circuit Affirms FTC’s Authority Over Cybersecurity: In the Wyndham case, the Third Circuit affirmed that the FTC has the authority to regulate cybersecurity under Section 5 of the FTC Act, and that the language of...more

The ABCs of COPPA Compliance

In today’s environment – when data breaches seem to be in the news nearly every day – the media, regulators and many others are hyper-focused on privacy issues. Schools and educational institutions are no exception when it...more

The Fingerprint File Doesn’t Have to Bring You Down: NAI Offers Advertisers Guidance on Digital Fingerprinting & Location...

Advertisers who use tools such as location data and newer non-cookie technologies to deliver interest-based advertising must carefully balance the use of those tools with consumer privacy. To achieve this balance, the Network...more

Somebody’s Watching You: What Are the Rules?

In 1984, Kennedy William Gordy, better known as pop artist Rockwell, released his first and ultimately biggest hit: Somebody’s Watching Me. One can only imagine how Rockwell would have felt if the Internet was in full swing...more

E-Discovery: If you can’t take the data to the tools, take the tools to the data

Today we welcome Jo Sherman, CEO, EDT Inc. to share some of her thoughts on the challenge of international investigations and data collection/analysis. Given the challenges of discovery and data collection across borders in...more

Technical Body Moves Closer to Do Not Track Standards

The long running struggle to develop technical standards for the implementation of a do not track (DNT) specification is moving closer to completion. The World Wide Web Consortium (W3C) working group recently released a “last...more

Use of File-Sharing Service Leads To $218,400 Fine For HIPAA Violations

Internet-based file-sharing services such as Dropbox and Google Drive can be easy and convenient to use, whether via the touch of an app on a mobile device or by opening a browser on a PC. Healthcare professionals are often...more

Legislative Alert: Bill S-4, an Act to amend Canada’s Personal Information Protection and Electronic Documents Act (PIPEDA) passed...

On June 18, 2015, Bill S-4, the Digital Privacy Act was passed by Canada’s House of Commons vote. Bill S-4 was previously passed by Canada’s Senate. The Digital Privacy Act includes important amendments to the Personal...more

Employee Benefits Developments - April 2015

Health Insurance Company’s HIPAA Breach Affects Millions. At the end of January, a national BlueCross BlueShield affiliate, Anthem, Inc., discovered that its information technology systems were hacked. The information...more

48 Results
|
View per page
Page: of 2
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×