When we think of third parties we tend to immediately think of the risks. But what if it is a third party that differentiates itself by the rigor of its compliance program?
Such is the case with Swiss-based DKSH, which...more
The average ecommerce website has 66 third-party tags on the page. That’s according to our podcast guest, Rui Ribeiro, CEO of Jscrambler. The tags, pixels and scripts control everything from the video to payment processing to...more
Matt Kelly, Editor & CEO of Radical Compliance makes a strong case in this podcast for a need to reassess cyber risk. It is becoming, he says, less of a technical issue and more about how companies interact with others: ...more
Given the dangers of third-party risk, it’s not surprising that so many organizations have developed supplier codes of conduct. Like everything else in compliance, though, the trick is in just having one, its in having the...more
While organizations have increasingly embraced cloud computing as a solution to their data management and other needs, they do so in an environment of heightened risks. Attacks on cloud providers are increasing, which makes...more
9/23/2021
/ Cloud Computing ,
Cloud Service Providers (CSPs) ,
Compliance ,
Cyber Attacks ,
Cybersecurity ,
Data Management ,
Data Privacy ,
Data Protection ,
Data Security ,
Risk Management ,
Third-Party Risk
Third party anti-corruption due diligence didn’t stop during the pandemic, but it was different. And, as the world begins to, hopefully, emerge from the pandemic Ashley Coselli, Senior Ethics and Compliance Counsel, Total...more
So much attention is paid to vetting third parties, it’s easy to forget that it is just the start of the process. Monitoring needs to be done on an ongoing basis as well.
Ronnie Kann, head of Global Ethics & Compliance at...more
Cataloguing everything your compliance program does isn’t easy, but Susan Roberts, who recently retired from full-time corporate life after serving as Chief Compliance Officer at three different companies, did just that. And...more
6/17/2021
/ Acquisitions ,
Chief Compliance Officers ,
Chief Ethics and Compliance Officers (CECO) ,
Code of Conduct ,
Compliance ,
Compliance Monitoring ,
Corporate Governance ,
Corporate Integrity Agreement ,
Corrective Actions ,
Discipline ,
Ethics ,
Incentives ,
Internal Audit Functions ,
Internal Investigations ,
Internal Reporting ,
Policies and Procedures ,
Risk Assessment ,
Risk Management ,
Third-Party Risk ,
Tone At The Top ,
Training
During the second half of 2020 Gartner Research evaluated the compliance spending of 117 organizations, and the company recently released the interesting findings. Brian Lee, Managing Vice President in the Gartner Legal and...more
Digitalization and the proliferation of apps have changed the relationship in healthcare between data, the patient and provider, explains Hema Lakkaraju, CEO and founder of Hayag Corporation. It is often unclear who is...more
1/28/2021
/ Artificial Intelligence ,
Big Data ,
Blockchain ,
Chief Compliance Officers ,
Chief Ethics and Compliance Officers (CECO) ,
Compliance ,
Consumer Privacy Rights ,
Data Collection ,
Data Management ,
Data Privacy ,
Data Security ,
Data Storage ,
Data-Sharing ,
Electronic Protected Health Information (ePHI) ,
Ethics ,
Health Care Providers ,
Health Information Technologies ,
Patient Privacy Rights ,
Risk Management ,
Third-Party Risk
The value of good risk management, both in compliance programs and even our personal lives, has never been more important. These days we find ourselves recalculating everything from the compliance risk of a new business...more
9/10/2020
/ Anti-Bribery ,
Anti-Corruption ,
Antitrust Violations ,
Business Strategies ,
Chief Compliance Officers ,
Compliance ,
Corrective Actions ,
Department of Justice (DOJ) ,
Due Diligence ,
Ethics ,
Risk Assessment ,
Risk Management ,
Social Media ,
Third-Party Risk
Staying on top of what’s new in data privacy is tough. As Robert Bond, Partner and Notary Public at the UK-based law firm Bristows explains, over 100 countries have drafted or implemented new data privacy laws in 2019.
To...more
9/3/2020
/ California Consumer Privacy Act (CCPA) ,
Compliance ,
Consumer Privacy Rights ,
Cybersecurity ,
Data Collection ,
Data Privacy ,
Data Protection ,
Data Security ,
Data Subjects Rights ,
General Data Protection Regulation (GDPR) ,
International Data Transfers ,
Personally Identifiable Information ,
Privacy Laws ,
Third-Party Risk
Given the risks of third parties, especially in risk areas such as corruption, much emphasis is placed on thorough vetting.
But once the deal is signed and the agent or contractor is hired, the risks don’t stop there. It’s...more
In a surprising web conference, Brian Lee, Managing Vice President at Gartner, shares some eye-raising insight into what’s going on when it comes to third-party risk management. Recent research there reveals what he reports...more