Are your helpline calls being responded to properly? Are the investigations proceeding expeditiously and properly? To find out, it’s good to do an audit periodically.
Before you can begin, though, you need to determine if...more
Want to improve your code of conduct? Don’t miss the session: Cornering the Code: A Multi-Disciplinary Approach Toward a Better Code of Ethics at the 2025 SCCE European Compliance & Ethics Institute.
In this podcast Matej...more
Who are you talking to? When you think about all the employees in your organization, who do you see in your mind? You probably, and should, think of several people: the person in the plant, the R&D people, the sales team....more
The Health Care Compliance Association just published the 4th edition of the Research Compliance Professional’s Handbook, and to see what’s new in it we sat down with the editor, Kelly Willenberg of Kelly Willenberg &...more
Yes or no: Do you do investigations? Do you prepare questions in advance? Are those questions yes or no in nature? Did you know that may not be the best way to do it?
In this podcast, Michael Johnson (LinkedIn), Chief...more
In 2023 the US Securities and Exchange Commission adopted rules “requiring registrants to disclose material cybersecurity incidents they experience and to disclose on an annual basis material information regarding their...more
Document retention is one of those persistent issues that comes with a great deal of complexity. As Michael Kearney, Head Solution Architect, Redgrave Data explains in this podcast, organizations have to deal with a dizzying...more
Behavioral health shares many of the same compliance challenges as the rest of healthcare, but it also has several of its own.
To understand the risks, we sat down with Community Counseling Solutions’ Executive Director...more
Julie Janeway, General Counsel and principal owner, Principled Healthcare Consulting will be speaking about internal and parallel investigations at the 2024 HCCA Compliance Institute. In this podcast she slices off a bit of...more
Steve Forman, Senior Vice President at Strategic Management Services, had an eye-opening experience years ago when interviewing for the job of Vice President of Audit and Compliance for New York Presbyterian Hospital. The...more
First there was Safe Harbor, then there was Privacy Shield, both of which were struck down, leaving an enormous chasm in the rules for sharing data between the EU and the US. Now, explains, André Bywater, Partner at UK-based...more
Email isn’t enough anymore, if it ever really was. Employees are communicating with each other, clients and prospects via texts, WhatsApp, Teams, Slack and many, many more tools.
Much attention has been paid to the US...more
In a perfect world, whenever employees face a difficult decision or outright compliance issue, the right policy would automatically pop up in front of them. While that is not likely to happen soon, Jannica Houben, Vice...more
United States Deputy Attorney General (DAG) Lisa Monaco recently gave a speech in which she outlined both new policies at the Department of Justice (DOJ) as well as enhancements to existing ones that can have a profound...more
The writing on the wall is pretty clear: regulators expect compliance programs to be custom designed for the organization and kept up to date. That means compliance teams need to stop periodically and reassess their program...more
Conflicts of interest are a particularly challenging issue in healthcare. Medical professionals may moonlight at a rival hospital, have an interest in a medical device or real estate a hospital is thinking of acquiring, and,...more
Hybrid work is likely here to say, and, as Sheila Limmroth, privacy specialist at DCH Health System, and the author of the chapter Hybrid Work Environment in the Complete Healthcare Compliance Manual observes in this...more
4/21/2022
/ Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Security ,
Electronic Protected Health Information (ePHI) ,
Health Care Providers ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Healthcare Workers ,
HIPAA Privacy Rule ,
HIPAA Security Rule ,
Home Offices ,
Mobile Device Management ,
Multi-Factor Authentication ,
Network Security ,
Passwords ,
Personally Identifiable Information ,
PHI ,
Phishing Scams ,
Policies and Procedures ,
Remote Working ,
Risk Management ,
Risk Mitigation ,
Telehealth ,
Videoconference
Matt Kelly, Editor & CEO of Radical Compliance makes a strong case in this podcast for a need to reassess cyber risk. It is becoming, he says, less of a technical issue and more about how companies interact with others: ...more
Much has changed in the world of compliance, especially of late, but when it comes to healthcare investigations, not all should, says Pamela Para RN, MPH, CPHRM, ARM, DFASHRM, President and Chief Content Officer at CE...more
9/30/2021
/ Compliance ,
Corrective Actions ,
Documentation ,
Health Care Providers ,
Hospitals ,
Investigations ,
Nurses ,
Physicians ,
Policies and Procedures ,
Regulatory Requirements ,
Risk Management
Cataloguing everything your compliance program does isn’t easy, but Susan Roberts, who recently retired from full-time corporate life after serving as Chief Compliance Officer at three different companies, did just that. And...more
6/17/2021
/ Acquisitions ,
Chief Compliance Officers ,
Chief Ethics and Compliance Officers (CECO) ,
Code of Conduct ,
Compliance ,
Compliance Monitoring ,
Corporate Governance ,
Corporate Integrity Agreement ,
Corrective Actions ,
Discipline ,
Ethics ,
Incentives ,
Internal Audit Functions ,
Internal Investigations ,
Internal Reporting ,
Policies and Procedures ,
Risk Assessment ,
Risk Management ,
Third-Party Risk ,
Tone At The Top ,
Training
America’s data is under attack. Solar Winds and other recent headline-grabbing stories have demonstrated that foreign adversaries are eager to hack into computer systems for a wide range of purposes.
The US Department of...more
6/3/2021
/ Certification Requirements ,
Chief Information Officers (CIO) ,
Chief Information Security Officer (CISO) ,
Controlled Unclassified Information (CUI) ,
Corporate Governance ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Cybersecurity Maturity Model Certification (CMMC) ,
Data Breach ,
Data Security ,
Defense Sector ,
Department of Defense (DOD) ,
Federal Contractors ,
Policies and Procedures ,
Supply Chain
A good investigation begins well before the first allegation, according to Scott Moritz, Senior Managing Director at FTI Consulting. It begins with the creation of a proper framework for how investigations will be...more
Judith Spain is a professor of business law at Eastern Kentucky University, Compliance Collaborative Program Consultant with the Georgia Independent College Association, and, most importantly for this conversation, the author...more
For financial services firms understanding who the Ultimate Beneficial Owner (UBO) of a corporation is has become a central compliance task.
As Ellen Lafferty explains in this podcast and in the new edition of The Complete...more
1/29/2020
/ Banks ,
Beneficial Owner ,
Business Ownership ,
Compliance ,
Controlling Stockholders ,
Customer Due Diligence (CDD) ,
Exceptions ,
Financial Institutions ,
Financial Services Industry ,
Legal Entities ,
Policies and Procedures ,
Publicly-Traded Companies ,
Verification Requirements
Heidi Rudolph, Managing Director at Morae Global, has spent a great deal of time considering technology’s role, risks and rewards for compliance teams. She contributed an article...more