Risk Management Dept. of Justice

News & Analysis as of

Trust But Verify - Due Diligence with a Jaded Eye

Ronald Reagan’s mantra with respect to US-Soviet relations in the 1980s applies with equal force to today’s world of due diligence. (I know it shows my age that I can recall this statement). Not all due diligence cases...more

How Compliance Can Be Built to Succeed! An In-Depth Discussion with Donna Boehme PART 1 [PODCAST]

Donna Boehme is back on the Masters of Disaster® podcast to discuss what it takes for compliance to succeed. Donna often refers to the new approach for the architecture of Compliance 2.0. Fundamentally, Compliance 2.0 starts...more

White House Issues Presidential Directive Coordinating Government Response To “Cyber Incidents”

On July 26, 2016, President Obama issued a new Presidential Directive setting forth the framework for how the United States (US) federal government will respond to “cyber incidents,” whether involving government or private...more

Hallmark 9 – Continuous Improvement: Periodic Testing and Review

You should keep track of external and internal events which may cause change to business process, policies and procedures. Some examples are new laws applicable to your business organization and internal events which drive...more

Compliance is a Business

Compliance is a business. That statement should not come as a shock or even a surprise to anyone who has worked in the corporate world. Every part of a business should work towards doing business. Yet many compliance...more

Navigating the new landscape of government investigations: key points

As businesses expand their operations into new markets across continents and hemispheres, they are encountering a host of issues in addition to the complexities that go along with entering any new jurisdiction. Established...more

House Homeland Security Committee Holds Hearing On 2015 Cybersecurity Act

On June 15, 2016, the House Homeland Security Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies held a hearing to examine industry perspectives on the implementation of the Cybersecurity Act...more

Updated Guidance on the Cybersecurity Information Sharing Act of 2015

Action Item: On June 15, 2016, the U.S. Department of Homeland Security (“DHS”) and the U.S. Department of Justice (“DOJ”) jointly issued a notice announcing the availability of the Cybersecurity Information Sharing Act of...more

Third Party Risk Management: Balancing Due Diligence Screening and Monitoring

In response to aggressive FCPA enforcement and recurring problems with third parties, companies have spent substantial resources and time to design and implement comprehensive ethics and compliance programs. A key part of...more

Compliance 2.0: DOJ Pushes the Compliance Agenda

The FCPA Paparazzi have a thick head and a stubborn chin. They just do not understand the significance of Compliance 2.0 to corporate governance and they blindly adhere to simplistic, yet unexplained, solutions to complex...more

Mixed Enforcement Messages (and What’s in a Name?)

Not long ago I wrote about a speech by Andrew Ceresney, Director of the SEC’s Division of Enforcement, at the Directors Forum 2016 in San Diego. In his speech, Mr. Ceresney made a point of noting the SEC’s continuing...more

Is Your Anti-Corruption Compliance Program “Operational”?

The Justice Department and the SEC are tired of investigating companies with “paper” compliance programs. It is easy to spot a “paper” compliance program – as the saying goes, you can smell it a mile away....more

U.S. Department of Justice Expands Worker Endangerment Initiative

On December 17, 2015, Deputy Attorney General Sally Yates issued a memorandum to all 93 U.S. Attorneys urging federal prosecutors to work with the Department of Justice Environment and Natural Resource Division (ENRD) to...more

Is Your Workplace Violence Plan Ready? 5 Essential Elements of a Comprehensive Plan

According to the U.S. Department of Justice, one out of every six violent crimes occurs in the workplace. These crimes include assaults, rapes, robberies, and—on rare occasions—homicides. Employees, customers, and third-party...more

Preview of NAVEX Global’s 2015 Ethics and Compliance Virtual Conference

As 2015 draws to a close (where did the time go?), the 2016 planning season is in full swing. You likely already have an idea of initiatives you’ll want to tackle, but taking your ethics and compliance program to the next...more

Record-breaking FCA settlements underscore importance of Stark Law compliance

In September and October, the Department of Justice (DOJ) announced four record-breaking False Claims Act settlements – ranging from $25 million to $115 million – involving health care systems that allegedly made improper...more

DOJ’s Pursuit of Individual Liability for Corporate Misconduct: The Yates Memo

Cooperation credit is a critical issue for corporations that become embroiled in investigations or enforcement activity. In both the criminal and civil contexts, it is the only way to mitigate the financial impact of...more

Mixed Ruling in Suit Challenging Operation Choke Point

Why it matters - A D.C. federal court judge issued a mixed ruling in a suit brought on behalf of payday lenders against the Federal Deposit Insurance Corporation (FDIC), the Federal Reserve Board of Governors, and the...more

How Can the Automotive Industry Strengthen Its Regulatory Compliance Process and Reduce Its Compliance Risks?

Many Americans listened last week to the admissions by the now former President of Volkswagen that the company had been “dishonest” and had cheated on the U.S. emissions tests. How was this happening at the world’s #1...more

VW Emissions Testing Scandal – View from the Board

The Board of Directors role in the Volkswagen (VW) emissions test scandal is one that is only now being scrutinized. In an article in the New York Times (NYT), entitled “Problems at VW Start at the Boardroom”, James B....more

Unprecedented Hacking and Trading Scheme Highlights Key Cybersecurity Lessons

On Aug. 11, 2015, federal prosecutors in the District of New Jersey and the Eastern District of New York unsealed indictments against nine individuals in the U.S. and Ukraine who were allegedly involved in a five-year,...more

SEC and DOJ Hacking Prosecutions Highlight SEC’s Increased Interest in Cybersecurity Risks

Companies are reminded of the need for strong internal controls. The US Securities and Exchange Commission (SEC) and the Department of Justice (DOJ) recently filed civil and criminal actions in the largest hacking and...more

RMP and General Duty Clause Enforcement Continues at EPA Region 1

As we reported last year, the U.S. EPA has stepped up its enforcement activity under the risk management provisions of the Clean Air Act (“CAA”), Section 112(r), focusing on both the Risk Management Plan (“RMP”) program rules...more

The Sioux at Little Bighorn and Using Risk Going Forward

I recently wrote about the stupidity of General Custer and the defeat of his Calvary at Little Bighorn as a lead in for the failure to adequately assess and then manage risks in a Foreign Corrupt Practices Act (FCPA)...more

Planning for Breach Notification Requirements in Your Customer Contracts

At the San Francisco “Exchange” Data Privacy and Cyber Security Forum on April 26, a spirited debate arose whether a federal breach notification law will/should be enacted to bring uniformity to the patchwork of breach...more

52 Results
|
View per page
Page: of 3
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×