Technology Compliance

News & Analysis as of

The Imperative for Data-Driven Compliance: Provide Your Organization with an Affirmative Defense with Useful Data

When I think of compliance data, the first thing that comes to mind is defense. If you don’t know if or how well your compliance initiatives are working, you’ll be hard pressed to defend or improve your program. However, a...more

Four Compliance Metrics That Need to Die: Empty Metrics that Aren’t Worth Tracking or Reporting

I’m continuously struck by the compliance industry’s challenges around program measurement and reporting. Most recently, it was the annual Compliance Trends Survey from Compliance Week and Deloitte that delivered the bad...more

DOL Investigation Tactics and Pending Proposed Rule Come Under Fire During House Hearing

In anticipation of the imminent release of the Department of Labor's proposed rule revising the white collar overtime exemption under the Fair Labor Standards Act (FLSA), the House Subcommittee on Workforce Protections held a...more

Export Control Laws for the General Counsel

You are the chief legal officer of a U.S. company. Your CEO walks into your office and announces that your company is about to conclude its first international sale. In addition, the company has just appointed distributors in...more

Automation and AML/BSA Compliance

The future of compliance includes technology solutions. Do not get me wrong – technology is not a panacea but it is an important strategy for leveraging resources. In the anti-corruption and sanctions compliance arenas,...more

Applications like WhatsApp are reshaping government investigations and should be refocusing how compliance departments handle...

White Collar, Regulatory Defense, and Investigations Client Update - In today’s high tech world, the ways to communicate are almost limitless. This presents risks for organizations and challenges for compliance...more

Technology is Transforming Third Party Risk Management: Predicting the Future

The definition of “effectiveness” for a third party risk management program is quickly changing — how is your organization keeping up? I usually avoid predicting the future because you are bound to get something wrong. ...more

IVASS Regulation no 8 of 3 March 2015 - Simplification of procedures

A few days ago, IVASS issued Regulation no. 8 of 3 March 2015 describing the simplified procedures and compliance obligations applying to relationships between enterprises, intermediaries and clients. The document...more

Technology is Transforming Third Party Risk Management: Predicting the Future

I usually avoid predicting the future because I am often wrong. But in this case I’m going to make an exception. Here is my 100 percent, sure-to-be true prediction: technology is going to change how compliance professionals...more

2015 Trends: #9 Technology-enabled ethics and compliance is ready for takeoff

By every indication we are about to witness a dramatic leap in technology-enabled ethics and compliance. Tech Advancement in Key E&C Areas - Trends and our own client experiences are demonstrating that we are...more

2015 Trends: #3 Culture (Still) Trumps Compliance

We asked industry experts, colleagues and compliance officers what they believe will be the top issues impacting workplace ethics and corporate compliance programs in 2015. We gathered their best thinking and prepared our...more

FCPA Compliance and Ethics Report-Episode 72-interview with Michael Rasmussen [Video]

In this episode of the FCPA Compliance and Ethics Report, I interview Michael Rasmussen, the GRC Pundit. As the man who coined the phrase 'GRC' Michael is one of the country's top GRC experts. He talks about the recent OCEG...more

Ignoring XP End Of Life May Make Your Company An Attractive Target

On April 8, Microsoft officially ended all support and ceased providing updates for their Windows XP operating system. This “end of life” (EOL) announcement is not uncommon with software platforms, where continued support of...more

Interview With Michael Kleef On The Use Of Technology In Compliance Programs

ED. Note-today we continue the series on compliance thought leadership. Today is Michael Kleef, EVP of Convercent, who has some interesting observations on understanding the uses of technology in the compliance arena....more

Is Your HIPAA Compliance Program Going Out the Window with XP?

April 8, 2014 marks the end of Microsoft’s support for the Windows XP operating system, which means the end of security updates from Microsoft and the beginning of new vulnerability to hackers and other intruders into systems...more

Privacy And Data Security For Life Sciences And Health Care Companies

Pepper Hamilton Health Care-Life Sciences Webinar - The explosion of mobile technology and Web applications linking patients with doctors, pharmacies and medical devices is undergoing scrutiny by the FDA, FTC, HHS and...more

FRB Issues Guidance on Managing Risks from the Use of Third Party Service Providers

The FRB issued guidance on managing outsourcing risks (the “Guidance”), intended to highlight the potential risks arising from the use of third-party service providers, describe the components of an appropriate service...more

e-Disclosure - A guide to your obligations

Developments in technology have revolutionised the way in which business is conducted. The increasing use of cloud services, mobile devices and social media have led to a dramatic rise in the volume of day-to-day business...more

FTC Focuses Enforcement Efforts on Health Care, Technology and Energy Sectors

On November 15, 2013, Chairwoman Edith Ramirez testified on behalf of the Federal Trade Commission (FTC) before the House Subcommittee on Regulatory Reform on the topic of antitrust oversight and enforcement. Ramirez...more

Export Control Compliance Sharing Sensitive Technologies Between International Affiliates General Concepts and Transfer Patterns

In the normal course of operations between U.S. and foreign affiliates, inter-company communications and data conveyances are frequent and occur both intentionally and inadvertently. The U.S.-foreign affiliation can be in the...more

Employers’ Technology Acceptable Use Policies — Top Ten Tips

Every U.S. private and public sector employer should develop, maintain and enforce an effective, appropriate workplace technology-acceptable-use policy (“TAUP”). In large part, a TAUP is a no-expectation-of-employee-privacy...more

Compliance Advice on SEC’s Market Access Rule from Julie Dixon of Titan Regulation [Video]

SEC Rule 15c3-5 (“Market Access Rule”), finalized in November 2010, is the commission’s response to the May 6, 2010 “flash crash” in which the U.S. equity market plunged nearly ten percent in a matter of minutes, then quickly...more

Bringing CASL into Focus - Recent Efforts to Clarify Canada’s Anti-Spam Legislation

Industry Canada and the Canadian Radio-television and Telecommunications Commission (CRTC) have received numerous stakeholder submissions and inquiries in relation to Canada’s Anti-Spam Legislation (CASL) and its two...more

Marks of Excellence – the Lakers 33 Game Winning Streak and FCPA Compliance Tools

Sorry Bill Simmons, but today we celebrate one of the great modern day records of any American sports franchise. On this day 41 years ago, the Milwaukee Bucks beat the Los Angeles Lakers to end the Lakers 33 game winning...more

24 Results
|
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×