On November 30, 2022, OpenAI launched ChatGPT, and the artificial intelligence chatbot quickly became the talk of the corporate world. With over 100 million users, ChatGPT is one of the fastest growing applications of all...more
9/5/2023
/ Artificial Intelligence ,
Bias ,
Confidential Information ,
Copyright ,
Copyright Infringement ,
Data Security ,
Employee Training ,
Employment Discrimination ,
Machine Learning ,
Policies and Procedures ,
Risk Management ,
Security Breach
While companies increase focus on external risks by enhancing regulatory compliance, anti-corruption policies, and cybersecurity, they must not lose sight of internal risks, including internal fraud and embezzlement....more
9/13/2022
/ Anti-Corruption ,
Embezzlement ,
Employment Policies ,
Enforcement ,
Fraud ,
Job Duties ,
Labor Relations ,
Policies and Procedures ,
Remote Working ,
Suspicious Activities ,
White Collar Crimes
Cybersecurity is the goliath of tech-related concerns for companies of all sizes, not just large corporations. The Cybersecurity & Infrastructure Security Agency (“CISA”) encourages small and midsize businesses to focus on...more
According to the Cybersecurity & Infrastructure Security Agency, cybersecurity is the process whereby information and communications systems, and the information contained in those systems, are protected from and/or defended...more
On March 9, 2022, the U.S. Securities and Exchange Commission (“SEC”) proposed amendments to its rules to require additional disclosures regarding cybersecurity risk management, strategy, governance, and incident reporting by...more
The COVID-19 pandemic national emergency has changed the way organizations are conducting business. As businesses adapt and begin to adjust to this new environment, it is important not to lose sight of the policies and...more
As discussed in Part 1 and Part 2 of this series, the seven core principles of an effective integrity compliance program apply to businesses of any size, but there is no one-size-fits-all model to compliance. What is...more
In our last alert, we discussed the first three fundamental categories of an effective compliance program: (1) Risk Assessment; (2) Management Buy-in; and (3) Code of Conduct [see our previous alert for the full discussion ...more