California Employment News: Creating the Report for a Workplace Investigation – Part 4 (Featured)
Compliance Tip of the Day: COSO Objective 3 – Control Activities
Compliance Tip of the Day – COSO Objective 1 – Control Environment
Hiring Smarter: Best Practices for Interviews: What's the Tea in L&E?
Compliance Tip of the Day: Code of Conduct as an Internal Control
California Employment News: Gathering Information in a Workplace Investigation – Part 2 (Featured)
Compliance Tip of the Day: Risk Assessments and Internal Controls
FCPA Compliance Report: The Role of Culture and Data in Fraud Risk Management - A Conversation with Vincent Walden
Compliance Tip of the Day: Podcasting for Compliance Training
Compliance Tip of the Day: Compliance Training Frequency
Compliance Tip of the Day: Using Supply Chain to Innovate in Compliance
Innovation in Compliance: Innovative Approaches to Compliance and Training with Catherine Choe
Work This Way: A Labor & Employment Law Podcast | Episode 46: The 2025 Greenville SHRM Conference with Tyler Clark and Brittany Goforth of GSHRM
Compliance tip of the Day: Communication Through Persuasion
Compliance Tip of the Day: Middle Managers as the Eyes and Ears of Compliance
Joe Green & Monica Rodriguez Kuniyoshi on Integrating Generative AI with Your Experts - Passle CMO Series Podcast RE-RELEASE:
Compliance Tip of the Day – Role of Chatbots in Compliance
FCPA Compliance Report: Kristy Grant-Hart on A 360° Review of the Future of Compliance
Compliance Tip of the Day: Embedded Compliance
A Blueprint for Efficient SRRs: Mastering Your Subject Rights Workflow
A recent breach involving Indian fintech company Kirana Pro serves as a reminder to organizations worldwide: even the most sophisticated cybersecurity technology cannot make up for poor administrative data security hygiene....more
While new forms of artificial intelligence and machine-learning systems, or AI, have garnered headlines in the mainstream press, many companies are evaluating its use in their businesses. Perhaps to a greater extent than with...more
Our Virtual Regional Healthcare Compliance Conferences provide updates on the latest news in regulatory requirement, compliance enforcement, and strategies to develop effective compliance programs. Watch, listen, and ask...more
Purpose and Background of the GLBA - The Gramm-Leach-Bliley Act (“GLBA”), also known as the Financial Services Modernization Act of 1999, is a federal statute enacted by Congress in 1999 that requires financial...more
Given the choice between credit card data and digital health records, cybercriminals prefer the latter. A stolen credit card can be canceled. Electronic protected health information (ePHI) with its treasure-trove of...more
Due to the COVID-19 pandemic, our Higher Education Compliance Conference will be held virtually. Attendees will enjoy Higher Education compliance sessions and industry updates in an interactive, online experience, plus have...more
Our one-day regional conferences are dedicated to providing the latest news in healthcare compliance regulatory requirements. Professionals who attend will learn about relevant topics that will keep them ahead of trending...more
Conducting HIPAA Breach Risk Assessments - The HIPAA rules relating to assessment of potential patient confidentiality breaches were changed in 2013. Specifically, on January 17, 2013, the Office of Civil Rights released...more
The SEC announced last week that an investment adviser had agreed to settle charges that it failed to take required steps to protect against and respond effectively to a cybersecurity breach. The action comes on the heels of...more
I. Cybersecurity; Its Importance and Relevance – How We Got to Where We Are Today - In the past few months, the White House, Home Depot, JP Morgan, Hard Rock Hotels, Tesla, the St. Louis Federal Reserve, the Internal...more
Symantec, the American IT security company, recently released its 2015 Internet Security Threat Report that summarizes the number and types of threats and vulnerabilities seen in 2014. The report also analyzes trends and...more
BakerHostetler’s inaugural Data Security Incident Response Report (the “Report”) concluded that employee negligence and theft were two of the top five causes of data security incidents for the more than 200 incidents that we...more
At the San Francisco “Exchange” Data Privacy and Cyber Security Forum on April 26, a spirited debate arose whether a federal breach notification law will/should be enacted to bring uniformity to the patchwork of breach...more
This past year has been called the "year of the massive data breach," with many high-profile attacks on well-known companies. Skadden partners Cyrus Amir-Mokri, Patrick Fitzgerald, Marc S. Gerber, Stuart D. Levi and Timothy...more
As of early December 2014, 1,170 security breaches under the Health Insurance Portability and Accountability Act (HIPAA) involving 31 million records had been reported to the U.S. Department of Health and Human Services (HHS)...more
Franchisors are facing a precarious three-way intersection of increased accountability and regulation over consumer privacy, the growing volume and sophistication of cyber-attacks on consumer data, and the expanding...more