Risk Mitigation

News & Analysis as of

Outsourcing by Canadian Companies after the USA PATRIOT Act

Wondering about outsourcing your data to the U.S.? What follows is an update to one of our most popular posts: Outsourcing by Canadian Companies: Another Look at the USA PATRIOT Act, originally written in January 2013....more

FFIEC: Beware Cyber Attacks, Destructive Malware

Why it matters - In a pair of joint statements, the Federal Financial Institutions Examination Council (FFIEC) cautioned financial institutions about cyber attacks compromising credentials and destructive malware. The...more

Survey Finds Companies More Prepared to Combat Global Corruption

The international community has made significant strides in combating corruption, with a proliferation of anti-bribery laws putting companies under pressure to ensure they — and their business partners — are able to detect...more

Estimating the Impact of Employee Engagement in Compliance and Ethics Training

In this on-demand webcast, The ROI of Compliance Training, David Houlihan, Principal Analyst of Blue Hill Research discusses the underlying business needs and dynamics related to the role of employee engagement in the...more

Technology in Healthcare [Video]

From the 2015 PLUS Medical PL Symposium session “Technology in Healthcare: EHRs & PHI,” moderator Patricia Marzella-Graubert (Swiss Re American Holdings Corporation) and panelist Alexander Grijalva (New York Presbyterian...more

Asset-Light

While asset-light strategies have been utilized for decades in the hotel industry, the strategy and how to implement it are a bit more complicated in the development space, whether for a hotel or time-share company. A typical...more

A Deeper Dive: Risk Assessments Are a Necessary Step in Creating Layered Cyber Defenses

Tens of thousands of cyber attackers employed by Chinese People’s Liberation Army and other employees and contractors of the Chinese Ministry of State Security work diligently every day to steal information from U.S....more

8 Strategies for Compliance Risk Management: How to Fortify Your Efforts, Reduce Risk and Increase Confidence in Your Program

As a compliance practitioner, your goal is to design and oversee a program that’s comprehensive enough to mitigate risk, strong enough to address issues that occur (because they always can, and will) and robust enough to...more

Encouraging Employees to Break the “Rules” to Do the Right Thing

Laws and regulations draw black lines in often-gray areas. That is their purpose; they exist to make it easier to tell what is “wrong” and what is “right” (as defined by whoever made the law). The U.S. government has...more

Strategies For Businesses Protecting Electronic Data Within California

Businesses in California have a number of tools with which to fight off unauthorized intrusions into their electronic data whether perpetrated by employees, former employees, disreputable competitors or random hackers....more

Corporate Risk Ownership: When There are Multiple Teams Involved, Who Owns What?

“We have a enterprise risk management team. Where does their role end and ours begin?” That’s a common question as compliance teams mature their programs into risk-based approaches. The truth is, compliance risk...more

EEOC, Court Flip Flops Reveal Challenges to Employers Facing Accommodation Requests

If even the U.S. Equal Employment Opportunity Commission (EEOC) and the courts cannot agree how far the Americans with Disabilities Act’s (ADA) accommodation obligation extends, how is an employer supposed to do so? As we...more

Fighting Back: Identifying Risks Posed by an Angry Current or Former Employee

Something lost is always in the last place you look (by definition). It can also sometimes be in the first. Although technology has made it possible for outsiders to manipulate and infiltrate your company’s systems...more

Wall Street and Ethics

I have to confess that there is a part of me that was skeptical about a new survey released last week finding that banks and other financial institutions have not embraced a culture of integrity. Indeed, the survey found...more

Four Security Gaps Cybercriminals Exploit in Your Business's Digital Storefront

Symantec, the American IT security company, recently released its 2015 Internet Security Threat Report that summarizes the number and types of threats and vulnerabilities seen in 2014. The report also analyzes trends and...more

Law à la Mode - Edition 16 - May 2015 (Global)

In This Issues: - Key Considerations: For Negotiating Electronic Point Of Sale Solution Agreements - Fashion Forward And Tech Savvy: The Co-Branding Of Wearable Technologies - The Internet Of Things: The...more

Blue Pill/Red Pill: How Officers and Board Members Can Swallow the Red Pill and See the Real World of Cybersecurity

Trying to understand how a hacker thinks can twist your brain around – while you normally think about how to make something work or why something is not working, hackers think how to get something to work in ways that it is...more

Tea Leaves from AAG Caldwell on An Effective Compliance Program

The government is on a public relation campaign. Department of Justice and SEC officials have been making the rounds and giving important speeches on criminal prosecutions, cooperation and voluntary disclosure and ethics and...more

Asset Management Firms And The Risk Of Market Abuse: Key Practical Points From The FCA's Thematic Review Feedback And Recent FCA...

Tackling market abuse continues to be a strategic priority for the FCA. In late 2014, the FCA undertook a thematic review into asset management firms and the risk of market abuse, the results of which were published in...more

Emergence of Transgender Status Issues in Workplace Raises Compliance Questions for Employers

Transgender issues have been grabbing headlines in recent months—perhaps most notably with Bruce Jenner’s televised announcement about his gender transition. Beyond the bright lights of pop culture, a wave of litigation and...more

Guidance for Incident Response Plans  

Organizations are preparing for data incidents and breaches by developing, updating, implementing, and testing incident response plans. This article provides a checklist of key components of an incident response...more

To Be or Not To Be (an Employer) [Video]

Presented by J. Travis Hockaday and Megan P. Black Regulators from a wide variety of government agencies continue to scrutinize relationships between businesses and the people and entities that provide services to them in...more

I-9 and E-Verify Compliance Practices for Temporary Labor and Contractors Four things to do now to minimize risk

Many of our clients rely on temporary labor solutions and outsourcing of certain functions to contractors to make their businesses work. While these workers are not your direct employees, their presence on your site doing...more

To Err Is Human; to Indemnify, Divine?: Human Foibles in the Cloud

BakerHostetler’s inaugural Data Security Incident Response Report (the “Report”) concluded that employee negligence and theft were two of the top five causes of data security incidents for the more than 200 incidents that we...more

Why Reputation Risk is Quickly Climbing the Ethics and Compliance Priority List, Part 3 | Beyond Compliance Training

So far in this series, we’ve discussed why companies are adopting a more public focus on ethics and compliance, how reputational risk can impact a company and its brand, and the first three elements of a five-part framework...more

244 Results
|
View per page
Page: of 10

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×