Risk Management

News & Analysis as of

Cyber-Attacks, and the Seven Steps to Protect Your Advisory Business Against Them

It sounds futuristic, or like CSI: Cyber, a sci-fi world of white hat/ black hat hackers, and of constant threats to national security and the financial markets caused by the digital world we live in. Based on the latest SEC...more

FCPA Compliance and Ethics Report-Episode 153-Doing Compliance in an Economic Downturn [Video]

The energy industry is in turmoil from the drop in the price of oil from $100 down to around $50 per barrel. Many energy companies have laid off up to 30% of their workforce. What can you do from the compliance perspective...more

Hedging Oil & Gas Production

The recent, dramatic decline in the price of oil illustrates the risk that every oil and gas producer has to declining energy commodity prices. This paper discusses various methods for “hedging” or reducing price risk. In...more

Beyond the Foreign Corrupt Practices Act (FCPA)

When Ethical Boardroom invited me to write this article, I started thinking about issues that go beyond the ‘bolt-on’ model of anti-bribery compliance. For, as Alison Taylor, director of energy and extractives at BSR...more

How to Conduct Internal Investigations Outside the United States

Think of a U.S.-headquartered multinational when it receives an allegation of serious misconduct at one of its overseas operations. Maybe the company whistleblower hotline just got a tip that a secretary in the Buenos Aires...more

Anti-bribery compliance in the UK - check for 'red flags' on any acquisition

When one company acquires another, it has long been common practice for the purchaser to carry out commercial due diligence upon the target company. However, anti-bribery and corruption (ABC) due diligence is often overlooked...more

PATIENT PRIVACY IN AN ERA OF SOCIAL MEDIA [Video]

The rise of social media has introduced new opportunities and new legal challenges for companies in the health care industry. Attorneys Seth Northrop and Sharon Roberg-Perez discuss the legal issues faced by care providers,...more

Handling Student Sexual Assault In K-12 Schools

In March, U.S. News & World Report featured a lengthy story provocatively titled, “High Schools and Middle Schools Are Failing Victims of Sexual Assault.” In addition to documenting situations where schools allegedly...more

Recent Developments on Variable Annuity Captive Reinsurance and Hedging Risk Evaluation; and Impacts on VA Issuers

In the midst of the broader discussion within the insurance regulatory community regarding the financial risks potentially posed by captive reinsurers, the National Association of Insurance Commissioners (NAIC) has recently...more

Treasury Deputy Secretary Raskin Delivers Remarks On Cyber Security

On March 25, Department of the Treasury’s Deputy Secretary Raskin delivered remarks regarding the agency’s efforts to enhance cybersecurity as the number of cyber-attacks continue to increase. Raskin outlined three specific...more

Cybersecurity Breach: Are Board Members at Risk?

It seems a month does not pass in which some sort of breach of confidential data of a business is not announced to the public. With the increase in cybersecurity breaches, so increases board members’ exposure to litigation...more

The Value of a Vigilant Internal Audit Program

I hate to write a negative column. It is contrary to my nature and perspective. It is easy to complain. It is far more difficult to come up with practical solutions....more

FCPA Compliance and Ethics Report-Episode 146-David Simon on Foley's Global Risk Management Platform [Video]

In this episode, I visit with David Simon, a partner at Foley and Lardner. We discuss Foley's recently recently Global Risk Management Platform. ...more

Federal Financial Regulators Offer Advice To Address Malware, Compromised Credentials

In its recent press release, the Federal Financial Institutions Examination Council (FFIEC) issued two statements reiterating financial institutions' obligations to have measures in place to prevent and mitigate cybersecurity...more

Advertising Law [Video]

Mark T. Cramer, Esq. discusses advertising law and how to avoid potential liability, ...more

Seven Training Imperatives to Address Your Biggest Cyber Security Risk: Employee Behavior

One of your best defenses against a cyber attack? Your employees. Make sure they are trained on their role in protecting your organization. There are pros and cons to the digital world that we all live in. Pros include...more

Your Business in the Age of Identity Theft and Individual Causes of Action

When your personal data is the subject of a hack attack, what are your rights? The US Supreme Court is considering this very issue in a case before it. On the block is the issue of whether an individual, who may not have...more

Cyber Extortion: What to Do When Your Data is Being Held for Ransom

Imagine you are the IT systems administrator of a large corporation. Coffee in hand, you sit down one morning and log in. You receive a message that there has been an intrusion into the corporate database, a large amount of...more

Technology is Transforming Third Party Risk Management: Predicting the Future

The definition of “effectiveness” for a third party risk management program is quickly changing — how is your organization keeping up? I usually avoid predicting the future because you are bound to get something wrong. ...more

Why It's Wise to Pay Attention to Your FCPA Compliance

Companies in the automotive industry would be wise to pay attention to Foreign Corrupt Practices Act (the “FCPA”) compliance. What has in the past been a risk management issue principally for massive multi-national...more

10 Tips for Fostering a Business Culture of Cybersecurity Awareness

Businesses are recognizing the need for new approaches to data security as high-profile cybersecurity incidents reveal the true impact a data breach can have on an organization. One of the biggest realizations is that IT...more

Alert: Cybersecurity Risk Management for Communications Companies

An industry-led committee advising the Federal Communications Commission ("FCC") on cybersecurity released its final report on best risk management practices tailored to each of five main industry segments—broadcasting,...more

Liability for Commercial Speech: A Guide to False Advertising, Commercial Disparagement, and Related Claims

This volume summarizes related bodies of law – false advertising, commercial disparagement, and defamation – that govern the conduct of business communications. It sets forth elements, damages, and related defenses for each...more

Too Small to be Hacked?

We are not the size of Target or Home Depot, we won’t be a target of cyber-attack. This is a dangerous assumption. Recently reported in the news was that ISIL (a terrorist organization) had hacked and taken over certain...more

Care Recipients’ Limited Right to Discriminate Based on Protected Characteristics of Care Provider

Healthcare provider institutions including hospitals, clinics, medical practices, nursing homes and home health care providers (here, “Institutions”) are occasionally called upon to balance the preferences of Consumers...more

534 Results
|
View per page
Page: of 22

All the intelligence you need, in one easy email:

Great! Your first step to building an email digest of JD Supra authors and topics. Log in with LinkedIn so we can start sending your digest...

Sign up for your custom alerts now, using LinkedIn ›

* With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name.
×