Risk Management

News & Analysis as of

Addressing Cybersecurity Oversight in Audit Committee Charters

Cybersecurity continues to emerge as a key risk that is attracting the attention of regulators and boards of directors. Companies take different approaches regarding how the board fulfills its oversight duty with respect to...more

Planning for Breach Notification Requirements in Your Customer Contracts

At the San Francisco “Exchange” Data Privacy and Cyber Security Forum on April 26, a spirited debate arose whether a federal breach notification law will/should be enacted to bring uniformity to the patchwork of breach...more

SEC Applies Whistleblower Interference Rule to Corporate Confidentiality Requirement

On April 1, the US Securities and Exchange Commission issued—in a settled administrative proceeding—a cease-and-desist order in In the Matter of KBR, Inc., directing that the respondent cease violating Commission Rule...more

"Assessing the Impact of Post-Financial Crisis Regulation"

The financial crisis of 2008 demonstrated that the then-existing financial regulatory system was in need of substantial repair. By any measure, the financial regulatory reform that has followed has been extensive. In areas...more

Implementing an Effective Third Party “Audit” Program

Explore new approaches to third party audits for a more effective, risk-aligned third party risk management program.    Compliance officers have been insisting on (and should continue to insist on) including third party...more

"Shadow Banking and Financial Stability: Regulators Propose Framework for Nonbank Noninsurers"

On March 4, 2015, the Financial Stability Board (FSB) and the International Organization of Securities Commissions (IOSCO) issued a second consultation paper concerning the methodology they propose to use to identify nonbank...more

Joint Employment: Whose Employees Are You Liable For?

Much has been written in recent months about the National Labor Relations Board (NLRB) standard for joint employment liability between separate businesses, especially with respect to franchisor McDonald’s Corporation, which...more

Cyber-Attacks, and the Seven Steps to Protect Your Advisory Business Against Them

It sounds futuristic, or like CSI: Cyber, a sci-fi world of white hat/ black hat hackers, and of constant threats to national security and the financial markets caused by the digital world we live in. Based on the latest SEC...more

FCPA Compliance and Ethics Report-Episode 153-Doing Compliance in an Economic Downturn [Video]

The energy industry is in turmoil from the drop in the price of oil from $100 down to around $50 per barrel. Many energy companies have laid off up to 30% of their workforce. What can you do from the compliance perspective...more

Hedging Oil & Gas Production

The recent, dramatic decline in the price of oil illustrates the risk that every oil and gas producer has to declining energy commodity prices. This paper discusses various methods for “hedging” or reducing price risk. In...more

Beyond the Foreign Corrupt Practices Act (FCPA)

When Ethical Boardroom invited me to write this article, I started thinking about issues that go beyond the ‘bolt-on’ model of anti-bribery compliance. For, as Alison Taylor, director of energy and extractives at BSR...more

How to Conduct Internal Investigations Outside the United States

Think of a U.S.-headquartered multinational when it receives an allegation of serious misconduct at one of its overseas operations. Maybe the company whistleblower hotline just got a tip that a secretary in the Buenos Aires...more

Anti-bribery compliance in the UK - check for 'red flags' on any acquisition

When one company acquires another, it has long been common practice for the purchaser to carry out commercial due diligence upon the target company. However, anti-bribery and corruption (ABC) due diligence is often overlooked...more

PATIENT PRIVACY IN AN ERA OF SOCIAL MEDIA [Video]

The rise of social media has introduced new opportunities and new legal challenges for companies in the health care industry. Attorneys Seth Northrop and Sharon Roberg-Perez discuss the legal issues faced by care providers,...more

Handling Student Sexual Assault In K-12 Schools

In March, U.S. News & World Report featured a lengthy story provocatively titled, “High Schools and Middle Schools Are Failing Victims of Sexual Assault.” In addition to documenting situations where schools allegedly...more

Recent Developments on Variable Annuity Captive Reinsurance and Hedging Risk Evaluation; and Impacts on VA Issuers

In the midst of the broader discussion within the insurance regulatory community regarding the financial risks potentially posed by captive reinsurers, the National Association of Insurance Commissioners (NAIC) has recently...more

Treasury Deputy Secretary Raskin Delivers Remarks On Cyber Security

On March 25, Department of the Treasury’s Deputy Secretary Raskin delivered remarks regarding the agency’s efforts to enhance cybersecurity as the number of cyber-attacks continue to increase. Raskin outlined three specific...more

Cybersecurity Breach: Are Board Members at Risk?

It seems a month does not pass in which some sort of breach of confidential data of a business is not announced to the public. With the increase in cybersecurity breaches, so increases board members’ exposure to litigation...more

The Value of a Vigilant Internal Audit Program

I hate to write a negative column. It is contrary to my nature and perspective. It is easy to complain. It is far more difficult to come up with practical solutions....more

FCPA Compliance and Ethics Report-Episode 146-David Simon on Foley's Global Risk Management Platform [Video]

In this episode, I visit with David Simon, a partner at Foley and Lardner. We discuss Foley's recently recently Global Risk Management Platform. ...more

Federal Financial Regulators Offer Advice To Address Malware, Compromised Credentials

In its recent press release, the Federal Financial Institutions Examination Council (FFIEC) issued two statements reiterating financial institutions' obligations to have measures in place to prevent and mitigate cybersecurity...more

Advertising Law [Video]

Mark T. Cramer, Esq. discusses advertising law and how to avoid potential liability, ...more

Seven Training Imperatives to Address Your Biggest Cyber Security Risk: Employee Behavior

One of your best defenses against a cyber attack? Your employees. Make sure they are trained on their role in protecting your organization. There are pros and cons to the digital world that we all live in. Pros include...more

Your Business in the Age of Identity Theft and Individual Causes of Action

When your personal data is the subject of a hack attack, what are your rights? The US Supreme Court is considering this very issue in a case before it. On the block is the issue of whether an individual, who may not have...more

Cyber Extortion: What to Do When Your Data is Being Held for Ransom

Imagine you are the IT systems administrator of a large corporation. Coffee in hand, you sit down one morning and log in. You receive a message that there has been an intrusion into the corporate database, a large amount of...more

538 Results
|
View per page
Page: of 22

All the intelligence you need, in one easy email:

Great! Your first step to building an email digest of JD Supra authors and topics. Log in with LinkedIn so we can start sending your digest...

Sign up for your custom alerts now, using LinkedIn ›

* With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name.
×