Steps Your Nonprofit Can Take to Mitigate Fraud Risks - Part 2
A Third Party's Perspective on Third Party Risk
Implications of the SEC Cybersecurity Disclosure Rule
Privacy Issues from Third-Party Website Tags
What's the Tea in L&E? Employee Devices: What is #NSFW?
Preparing for a Government Healthcare Audit
Tackling Credit Push Fraud: Understanding Nacha's Risk Management Package (Part Two) — Payments Pros: The Payments Law Podcast
Compliance into The Weeds: The Complexity of Risk Assessments
Behavioral Health Compliance
The Importance of Assessment Areas
RegFi Episode 8: The Technological Path to Outcomes-Based Regulation with Matt Van Buskirk
What Physicians Need to Understand About Balance Billing
What Nonprofit Board Leadership Needs To Know About Internal Investigations
Taking a Behavioral Approach to Compliance
Episode 291 -- Interview of Mary Shirley on Her New Compliance Book
ChatGPT Risks for Compliance Programs
Season 2 Episode 3 - The Role of Ethics and Compliance Programs in International Business
In the Boardroom With Resnick and Fuller - Episode 4
What Non-Financial Institutions Need to Know About Gramm-Leach-Bliley
"Board-er" Patrol in Privacy and Cyberattacks - Unauthorized Access Podcast
As the “AI Revolution” continues to gain momentum, questions concerning professional ethics have arisen across almost all professions. For legal services providers in particular, this disruptive technology poses both risks...more
The proper use of social media, blogging, cloud computing, and crowdfunding are just a few of the ever-growing tech-related issues that have ethical implications for attorneys. We must add to the list the cryptocurrency...more
As a result of troubling personal accounts of sexual harassment that have permeated coverage on national media outlets and our social media accounts during the past few months, employers may appropriately question whether...more
When we think about trade secrets, we usually focus on keeping our own data safe. But an even bigger risk comes from hiring employees who can infect our systems with confidential information from a competitor. Companies often...more
Prior to entering into a definitive commercial agreement, parties often enter into a letter of intent, a term sheet or a memorandum of understanding (a preliminary agreement). Some of the provisions in the preliminary...more
To help with our predictions and recommendations, we’ve talked with industry experts, our colleagues at NAVEX Global, and ethics and compliance professionals from our more than 12,500 client organizations. Based on their...more
Imagine that your General Counsel asks you for a very brief overview of what she needs to know - and worry about - related to HR technology and HR data management. If your GC is like most we know, she has way too much on her...more
A company's board of directors has a duty to oversee all aspects of the company's risk management efforts. This includes a duty to recognize and minimize the company's exposure to cyber attacks. In today's increasingly...more
Today I begin a series of Star Wars themed blog posts to celebrate the upcoming release of the next entry in the Star Wars franchise, Episode VII – The Force Awakens. Please note that I will only use the first three movies,...more
1. Start Early - Buyers should begin conducting cybersecurity risk assessments early in the engagement process. The target should be able to identify which information technology systems and data sets are key to the...more
A thousand questions immediately flood any lawyer’s mind when they first hear that their client may have been affected by a data breach. How did it happen? What data were affected? Was there any personal information affected,...more
When parties are faced with an attractive settlement offer, they frequently wish to compare the offer to what they might get at trial, which is the product of the odds of winning times the value of the verdict or award....more
Did you know that employees in most countries outside the United States have a contractual right to continued employment, whether or not they have written contract? If an employer does not provide an employee with a written...more
Healthcare providers would be wise to keep in mind that if a patient is harmed by a hacked medical device, Exhibit A in the negligence suit against them may be that provider’s risk analysis, or lack thereof....more
Over the past two years, more than 500 new top-level domains (TLDs, or the words to the right of the dot in a domain name, such as .com or .edu) like .attorney, .consulting, .menu, and even .rocks have launched. But none has...more
Tens of thousands of cyber attackers employed by Chinese People’s Liberation Army and other employees and contractors of the Chinese Ministry of State Security work diligently every day to steal information from U.S....more
Trying to understand how a hacker thinks can twist your brain around – while you normally think about how to make something work or why something is not working, hackers think how to get something to work in ways that it is...more