News & Analysis as of

Risk Mitigation

Compliance is Not “Rocket Science”

by Michael Volkov on

In the compliance arena, like in many others in life, we value simplicity. I have repeatedly stressed the importance of compliance initiatives that are relatively simple. Too often, lawyers and compliance professionals...more

[Webinar] Be Compromise Ready: Go Back to the Basics - May 9th, 12:00pm EDT

by BakerHostetler on

Cyber threats are here to stay. No company, large or small, is immune. But there are basic measures you can take to prepare for the legal and business risks associated with an attack....more

Top unmanned aircraft systems developments in 2017 for ADG companies

by Hogan Lovells on

Aerospace, defense, and government services (ADG) companies are not new to game-changing technology innovations. It is therefore no surprise that a number of ADG companies are early investors in unmanned aircraft systems...more

Restrictive Covenants Can Swing Both Ways: A 3-Step Plan To Avoiding Legal Risks When Onboarding New Employees

by Fisher Phillips on

Employers have been using restrictive covenant agreements – contracts that contain non-compete, customer non-solicitation, employee non-solicitation, or non-disclosure of confidential information – with increasing frequency...more

Partners Beware: New Audit Rules May Have a Big Impact on Your Bottom Line. Here’s What You Need to Know and How to Protect...

by Butler Snow LLP on

The arcane rules surrounding partnership audits rarely, if ever, come up, and most people don’t even know that they exist. What once was a set of rules confined to the dark recesses of the Internal Revenue Code are now...more

The Ongoing Pay Statement War: Employers Continue To Battle The Dark Side Of The Force

by Fisher Phillips on

California leads the nation in micromanaging pay statements, including (but not limited to) exposing an employer’s officers or agents who intentionally violate the law to criminal prosecution and fines up to $1,000. The...more

ASLMS Annual Meeting Special Coverage: Legal and Compliance Issues Impacting Medical Practices Using Laser Technology

by Ruder Ware on

Medical practices that routinely use laser technology are subject to some of the same legal issues as other types of practices. Use of lasers creates additional compliance issues and highlights certain compliance risk areas....more

The MHRA issues new guidance concerning common issues in clinical trial applications

by Hogan Lovells on

On 22nd March 2017, the UK’s Medicines and Healthcare products Regulatory Agency (MHRA) published a guidance (“Guidance“) identifying the most common issues that the Agency has encountered during the validation and review of...more

Is Your Anti-Harassment Training Making the Grade?

by Miller & Martin PLLC on

If your initial response to this question is, "What anti-harassment training? Are we still supposed to be doing that? Isn't that kind of 'old school'?", your first step needs to be planning anti-harassment training in 2017....more

OIG report finds CFPB can strengthen conflict of interest controls related to vendor activities

by Ballard Spahr LLP on

The Office of Inspector General for the Fed and CFPB has issued a report on the results of an evaluation it conducted to determine whether the CFPB effectively mitigates the risk of potential conflicts of interest associated...more

SEC Adopts T+2 Settlement Cycle for Securities Transactions

On March 22, 2017, the Securities and Exchange Commission (SEC) adopted an amendment to Rule 15c6-1(a) under the Securities Exchange Act of 1934 (“Exchange Act”) to shorten the standard settlement cycle for most broker-dealer...more

Legal and Compliance Coordination – An Essential Foundation to an Effective Compliance Program (Part IV of IV)

by Michael Volkov on

Here is a profound grasp of the obvious – Lawyers can be difficult people. Some like to condemn the profession in its entirety (and carry with them a collection of lawyer jokes). As an attorney, I beg to differ. Many...more

March Preparedness: Inadequate Employee Training May Cause Even the Best Employers to Suffer an Upset

Employers implement employee training programs for a variety of reasons, such as furthering professional development and improving poor performance, ensuring compliance with information security protocols and competence using...more

March Grabness: Lessons from the (Basketball) Court: Avoiding Personal Fouls, Violations and Time Outs in the Workplace

Harassment has long been an Achilles’ heel of the workplace. Believe it or not, like the NCAA’s tournament TV ratings, the number of harassment-related lawsuits has held rather steady since the 1990s! And like most NCAA...more

Data Breach Response: Orchestrating Legal and Technical Resources to Contain and Mitigate

Data breaches are inevitable and the aftermath of a data breach can be a significantly difficult exercise. When legal and technical resources work together, both proactively and reactively, the response can run more smoothly....more

Cybersecurity: Yes, They Will Hack Your Car

by Foley & Lardner LLP on

Auto manufacturers are increasingly equipping vehicles with rapidly advancing technologies, raising concerns regarding how the public will be affected by these changes. Manufacturers are beginning to implement automated...more

Proposed Federal Cybersecurity Regulations for Financial Institutions Face an Uncertain Future

Last year’s proposed comprehensive framework for cybersecurity rules for large financial institutions is suddenly facing an uncertain future. With the comment period having closed as of February 2017, the framework was facing...more

[Webinar] Keeping Up with the Consumer Product Safety Commission: Update on Recent CPSC Developments - March 29th, 12:00pm EST

by Kelley Drye & Warren LLP on

With the complexity of today’s product safety regulatory environment and the civil penalty amounts for failure to report safety hazards, it is more important than ever for manufacturers and retailers to identify and resolve...more

“W-2 Phishing Attacks Targeting Businesses to Cash in on Busy Tax Season: 10 Tips to Protect Your Business”

by Sedgwick LLP on

Cyber criminals are taking advantage of tax season to lure valuable W-2 information from vulnerable businesses. An example of a common phishing scheme starts with a scammer posing as a legitimate employee of a company,...more

Why You Shouldn’t Relax on Pretaliation—Even if Policymakers Do

by NAVEX Global on

About two years ago, the Securities and Exchange Commission (SEC) made history when it brought the first “pretaliation” whistleblower enforcement action against KBR Inc., a technology and engineering firm in Houston. The...more

Dechert survey: Developments in securities fraud class actions against U.S. life sciences companies

by Dechert LLP on

Life sciences companies continued to be popular targets of securities fraud class action lawsuits filed in 2016, and prudent life sciences companies should take heed of the results of this year’s decisions. In 2016,...more

Compliance and Private Equity: An Oxymoron?

by Michael Volkov on

We all enjoy an oxymoron, e.g., army intelligence, compassionate conservative. Some words go together and some do not. When it comes to compliance and private equity companies, you can predict with usual success that private...more

Private Equity and the New Trump Administration: Your Top Ten Questions Answered

by Foley & Lardner LLP on

The election of President Trump contained more than a few positive signs for Private Equity (PE) firms. Promises of a lower corporate tax environment, a ten-percent tax holiday for funds parked overseas, large infrastructure...more

"Key Takeaways: Minimizing Risks and Maximizing Opportunities in China-Latin America Investment"

On February 6, 2017, Skadden hosted the webinar “Minimizing Risks and Maximizing Opportunities in China-Latin America Investment.” Topics of discussion included the increasing importance of Chinese investment in Latin...more

Pooley’s Corner: How to Recruit and Hire While Avoiding Data Contamination

When we think about trade secrets, we usually focus on keeping our own data safe. But an even bigger risk comes from hiring employees who can infect our systems with confidential information from a competitor. Companies often...more

446 Results
|
View per page
Page: of 18
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
Feedback? Tell us what you think of the new jdsupra.com!