Implications of the SEC Cybersecurity Disclosure Rule
The Privacy Insider Podcast Episode 4: Don't Be Evil: In the Hot Seat of Data Privacy, Part 1
Privacy Issues from Third-Party Website Tags
Episode 331- NAVEX State of Risk and Compliance Programs
What the Board Should Be Asking About the Compliance Program
Managing Social Media Risk
Compliance Lessons from Dating in Your 50s
Managing Compliance Risk for Human Trafficking and Modern Slavery
Common Scenarios Triggering False Claims Act Violations, Part 3: Claims and Investigations
False Claims Act Insights - The Art and Science of Corporate Compliance in Managing FCA Risk
Preparing for a Government Healthcare Audit
Episode 318 -- LRN's Recent Study Underscores Importance of Ethical Culture and Values-Based Leadership
Understanding the HHS OIG’s General Compliance Program Guidance
Climate Risk, the emerging risk
What's Going on with FCPA?
Compliance, Project Management, and Process Improvement
Leaning in on AI in Compliance Programs
PODCAST: Williams Mullen's Gavels & Gowns - Title IX Regulations - Changes on the Horizon
Episode 312 -- Eddie Green, CEO SnippetSentry, on Communications Preservation Risks
Behavioral Health Compliance
Ideal for professionals with some compliance knowledge and experience, HCCA’s Healthcare Privacy Compliance Academy offers practitioners a deeper understanding of effective compliance management in a healthcare setting. The...more
In an era marked by heightened global regulatory scrutiny and enforcement, the landscape of risk and compliance is undergoing an evolution making the strategic imperative for effective, risk-based compliance initiatives...more
Join our CLE webinar, "Ethics, Cybersecurity & Data Protection: Mastering Competent Representation," as we explore reasonable steps needed for lawyers to comply with the duty of providing competent representation. Dive into...more
Learning Objectives: - Overview of current US privacy/cybersecurity laws and regulation - Current cyber threats: overview of recent trends in cyberattacks and risk areas for healthcare providers - Incident Response: how...more
Learning Objectives - The fundamental foundation of establishing a solid HIPAA compliance, privacy and cyber security awareness program - The importance of end user HIPAA compliance, privacy and cyber security training for...more
In today’s world data is the new gold, and protecting it has become imperative for businesses worldwide. On this week’s episode of Corruption, Crime and Compliance, Michael Volkov navigates the cybersecurity landscape,...more
Designed for professionals with some compliance knowledge and experience, HCCA’s Healthcare Privacy Compliance Academy is ideal for practitioners who want a deeper understanding of effective compliance management in a...more
Each Academy provides three-and-a-half days of classroom-style training covering the latest laws, regulations, and developments to help you effectively manage your organization’s compliance program. They are ideal for...more
Last month I wrote a post for this blog about the Securities and Exchange Commission’s proposals for more disclosure of cybersecurity issues. We reviewed some of the governance disclosures that boards might need to make, as...more
Our one-day Regional Compliance Conferences provide attendees with a forum to interact with local compliance professionals, share information about your compliance successes and challenges, and create educational...more
Perkins Coie's Privacy & Security practice maintains a comprehensive chart that summarizes state laws regarding security breach notification. The chart is for informational purposes only and is intended as an aid in...more
A ransomware attack is no company’s idea of a good time, but I do sense one positive development emerging from the epidemic of attacks we’ve witnessed this year: Boards and senior management agree that they must move beyond a...more
An executive order was signed on May 12, directing the federal government to overhaul its approach to cybersecurity. Corporate compliance and risk management professionals should consider this order carefully — because, in...more
How to ensure emerging technologies help rather than hurt your organization - Technology represents the classic double-edged sword for compliance and ethics professionals. When properly utilized, it can be a vital tool,...more
A cyber breach can have serious legal, financial, and reputational consequences for a company, as described in our previous post. As such, cybersecurity threats must be treated as business risks, not just a potential IT...more
A cyber breach can have serious legal, financial, and reputational consequences for a fund sponsor, as described in our previous post. As such, cybersecurity threats must be treated as business risks, not just a potential IT...more
The coronavirus crisis is far from over, and compliance professionals still need every scrap of guidance that regulators can provide about how to run compliance programs in these difficult times. So when the Securities and...more
Our one-day regional conferences are dedicated to providing the latest news in healthcare compliance regulatory requirements. Professionals who attend will learn about relevant topics that will keep them ahead of trending...more
American Conference Institute’s 8th Asia Summit on Anti-Corruption stands apart as one of the best networking and compliance benchmarking opportunities in the APAC region. Each year, senior government officials from...more
The February 15, 2019 NYDFS compliance certification deadline represents the last annual compliance certification subject to the transition period for covered entities to come into compliance with the cybersecurity...more
Continuous improvement can take many ways, shapes and forms. Typically, when it comes to third-party risks, a Chief Compliance Officer (CCO) or compliance professional will consider the ownership structure to see if there is...more
On June 27, the staff of the Securities and Exchange Commission’s (Commission or SEC) Division of Investment Management (IM) issued a Guidance Update on business continuity planning for registered investment companies...more
Summary of private equity firms’ compliance obligations, discussion of notable developments in 2015 and outlook for 2016. US federal laws and regulations, as well as the rules of self-regulatory organizations (SROs),...more
For years, cyber security has been the province of IT specialist and technicians. Those days are long gone. If you ask a Board of Directors to identify a company’s most significant risk – cyber security is tops....more