News & Analysis as of

How To Strengthen Your Ethics And Compliance Policy Management

People say that hindsight is 20/20. I’d say from my experiences its true. If only we could have 20/20 vision before an incident occurs, think of all the heartaches and headaches we could avoid. It would be especially helpful...more

Information Security Training Master Class: Winning the Battle against Data Breaches, Malicious and Negligent Employees, and...

The Human Element of Information Security, Continued - In Part One of this series, I laid out data breach statistics that were at best startling, and at worst downright terrifying. Thankfully, a large percentage of the...more

Connecticut Hires Chainbridge Software LLC for Transfer Pricing Training

On July 15, 2014, the Connecticut Department of Revenue Services awarded Chainbridge Software LLC a contract worth $50,000 for on-site and remotely supported training for transfer pricing audits. Chainbridge is infamous for...more

Bringing It All Home, the Two Tough Cookies Wrap It Up For You, Part II

This one is tough, especially in global organizations. In many countries, you simply cannot run a background check, as criminal records are not public. In others, you can run them, but the criminal offense must be related to...more

Monitoring and Auditing Your Anti Corruption Compliance Program  [Video]

Companies have designed and implemented anti-corruption compliance programs. An important element of an effective compliance program is monitoring and auditing the program to identify issues for improvement. Working in...more

Intellectual Asset Management Best Practices – Part 1

Does your organization have “intellectual assets”? Regardless of what your organization does – whether it is a service-based business, or in the manufacturing sector, whether it is driven by cloud-based software or...more

Europe Under Review: Part 5 Of 8 – Data Security

In the fifth instalment of our “Europe under Review” series, we will look at current data privacy laws and best practice in the UK in relation to data security, and, briefly, the impact of the new Data Protection Regulation....more

Rogue CFO II – Internal Accounting Controls and Supervision

Our second article in the series, “Rogue CFO,” covers some common sense processes that all too often are missing in smaller businesses – workable controls and verification. ...more

Key Trends, Issues and Best Practices in Compliance 2013

NAVEX Global services the largest ethics and compliance community in the world. This survey is one example of our commitment to identify and communicate key trends and issues critical to business success. This independently...more

Top Three Tips to Ensure Software Compliance

Scott & Scott, LLP attorney, Keli Johnson Swan, says companies can take pre-emptive steps to avoid expensive audits by utilizing three key strategies....more

A Prescriptive Guide To Third Party Risk Management

The recent examples of compliance program credits for Morgan Stanley and Ralph Lauren have demonstrated that, more than ever, an effective compliance program can protect a company from criminal indictment and generate bottom...more

Avoiding Wage & Hour Lawsuits: Four Steps Every Employer Should Take

In light of the continued onslaught of wage and hour claims made by current and former employees, including putative class and collective actions, there are a number of steps employers can take to help mitigate potential...more

Survey Report: Key Trends in Effective Policy Management

During January and February 2013, The Network conducted an online survey on the effectiveness of managing corporate policies. We asked organizations to let us know how they are implementing and applying their corporate...more

Anti-Corruption High-Risk Audits

The Justice Department and the SEC should be credited with promoting new compliance strategies and best practices. Whatever you may think about the DOJ/SEC FCPA enforcement program, they have pushed businesses to enhance...more

Department Of Labor To Increase Frequency Of FMLA On-Site Investigations

For employers who have been involved in an FMLA investigation conducted by the U.S. Department of Labor, the process can be a bit of a head-scratcher because no two investigations look the same....more

Monitoring Of Third-Party Agents And Distributors

Try to imagine what DaVinci said to himself when he painted his last brush stroke on the Mona Lisa. Or consider what Tolstoy muttered to himself when he put down his pen after writing the last word of War and Peace....more

What To Do If Your Gut Says It’s Wrong: Lessons from Project Alpha

I often write about what can happen to companies who run afoul of the Foreign Corrupt Practices Act (FCPA). Usually enforcement actions focus on companies and not individuals. However, as is often pointed out by commentators...more

Establishing an Effective Compliance Program: An Overview to Protecting Your Organization

In This Issue: - Overview - Standards and Procedures - Organizational Leadership and Culture - Reasonable Efforts to Exclude Bad Actors From Managerial Ranks - Training and Education - Monitoring,...more

FFIEC Proposed Guidance on Social Media Risk Management: Practice Points for All Organizations Using Social Media

Organizations using social media are confronted with an ever increasing challenge of social media risk management. To help financial institutions identify, measure, monitor, and control such risks, the Federal Financial...more

Beyond The Privacy Policy: New Guidance

On September 5, 2012, the Information and Privacy Commissioner of Ontario (“IPC”) released a new guidance paper, entitled “A Policy is Not Enough: It Must be Reflected in Concrete Practices”. This guidance paper will be...more

Beyond the Privacy Policy: New Guidance

On September 5, 2012, the Information and Privacy Commissioner of Ontario (“IPC”) released a new guidance paper, entitled “A Policy is Not Enough: It Must be Reflected in Concrete Practices”. This guidance paper will be...more

21 Results
|
View per page
Page: of 1