When it comes to scams and frauds, it's not just individuals at risk, but also companies. In Episode 2 of Digging Deeper, Chris Morgan Jones interviews Jordan Arnold about corporate scams, and they even discuss cracking the...more
With the global economy reeling from the direct effects of the COVID-19 pandemic, no sector is spared from its impact, including the art market. As auction houses seek to find ways to sustain business during this time of...more
4/28/2020
/ Anti-Money Laundering ,
Art Auctions ,
Art Collections ,
Art Sales ,
BSA/AML ,
Coronavirus/COVID-19 ,
Due Diligence ,
Financial Crimes ,
Fine Art ,
Know Your Customers ,
Market Participants ,
Paintings Sculptures and Engravings
It’s a Saturday afternoon, and your cell phone rings: it’s your company’s CEO. Curious why the CEO would choose to call you on a quiet Saturday, you answer, only to hear a relieved voice on the end: “Oh Jack, you don’t know...more
8/13/2019
/ Data Management ,
Digital Media ,
High Net-Worth ,
Online Platforms ,
Online Reputation ,
Personal Information ,
Privacy Concerns ,
Risk Assessment ,
Risk Management ,
Social Media ,
Social Networks ,
Twitter
What do people see when they look at a piece of fine art—such as a painting by Cezanne, a sculpture by Giacometti, or a three-dimensional combine by Rauschenberg? To a great extent, it depends on who’s doing the looking. An...more
7/29/2019
/ Anti-Money Laundering ,
Art Collections ,
Art Dealers ,
Art Galleries ,
Art Sales ,
Bank Secrecy Act ,
Cooperative Compliance Regime ,
EU Directive ,
Financial Crimes ,
Financial Institutions ,
Fine Art ,
Know Your Customers ,
Legislative Agendas ,
Money Laundering ,
Proposed Legislation ,
Regulatory Standards ,
Risk Management ,
Trafficking
In the financial industry, companies engaging in million-dollar transactions invest in the latest in technology in order to safeguard valuable assets. However, in the art world—a market built on relationships and...more
These days, data sharing is more than a business—it’s an industry. Every day, data aggregators and brokers comb the internet for personal information. Because they rarely engage directly with us, we are dangerously unaware of...more
10/31/2017
/ Big Data ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Brokers ,
Data Protection ,
Hackers ,
Information Technology ,
Personally Identifiable Information ,
Privacy Policy ,
Risk Management ,
Security Standards
Navigating the crossroads of security and convenience is a balancing act, but it can be done.
Two minutes. That’s all it takes to perform a Google search on yourself—or anyone you choose—and obtain a virtual encyclopedia...more