Health + Tech - How Digital Health Tools Help Create Greater Consumer Focus in Healthcare
Cyber Threats
Using The Cloud For Custom Salesforce Solutions
Chris Ford on Compliance and Cloud Computing
Moving Energy Forward: Future Voices Of The Industry
Sitting with the C-Suite: Servient – What’s Next
Polsinelli Podcasts: Cloud Computing, From Cybersecurity to Confidentiality Issues
IP | Trend: Data in the Cloud is the Next Big Storm?
At Intersection of Cloud Storage/Transfer & Instant Messaging, Instacom’s a Unique Tool
“The Cloud” No Longer a Hot Topic Because It’s Common Knowledge at This Point
In today's business landscape, cloud computing is an essential component for scalability, cost-efficiency, and operational agility. However, as dependence on cloud services grows, disputes are becoming increasingly frequent....more
In our recent article, we discussed FedRAMP’s Roadmap to the Future, outlining FedRAMP’s ambitious plan to breathe new life into the FedRAMP program by, among other goals, updating the authorization process and automating key...more
Melissa Duffy and Trevor Coval contributed their thought leadership to the American Conference Institute’s 14th Annual Global Encryption, Cloud & Cyber Export Controls Conference, held in San Francisco on May 14-16. Melissa...more
In today's digital landscape, businesses face a choice when implementing RightAngle, do they use their existing on-prem servers and infrastructure, or do they create a new infrastructure and provision servers for the...more
Last October, the Federal Acquisition Regulation (FAR) Council proposed two new rules, one of which that will influence cyber incident response practices. The scope is limited as it only applies to federal government...more
The cyber landscape these days can be terrifying. Malware, ransomware, spyware, phishing, cloud-based computing and so much more are enough to keep even a compliance veteran up all night. There are other risks to consider,...more
Corporate investigators face more challenges now than ever before. Corporate misdeeds are growing increasingly sophisticated as globalization pushes businesses into new markets and a 24/7 dispersed work model. ...more
While organizations have increasingly embraced cloud computing as a solution to their data management and other needs, they do so in an environment of heightened risks. Attacks on cloud providers are increasing, which makes...more
The Department of Justice’s National Security Division, like its counterpart, the Criminal Division, has made a splash on the enforcement and compliance arena. DOJ has elevated the importance and standing of export and...more
For a whole decade, ACI’s U.S. Export & Reexport Compliance for Canadian Operations conference continues to stand apart as the only practical, comprehensive event of its kind for the export compliance community in Canada. ...more
You can always count on cyber-criminals and fraudsters to come out of the woodwork when a national crisis occurs. The COVID-19 pandemic has resulted in a multitude of criminal schemes....more
Businesses are increasingly relying on the cloud to store confidential and sensitive information. One-third of information technology budgets are used for cloud services. Rapid growth in cloud storage is expected over the...more
Not to say, I told you so, but around the same time that the Capital One data breach occurred, I was reminding clients that nearly half of all significant data breaches or cyber-incidents occur because of internal actors. ...more
This posting is not a “pie in the sky” outline of compliance in the future, when technology works seamlessly with compliance functions. My focus today is on what is happening now in the compliance world when it comes to...more
Yesterday, I began a three-part series on how two companies, which came to Foreign Corrupt Practices Act (FCPA) grief in China for bribery within their Chinese business units, received the rather stunning results of both Non...more
Earlier this month, privacy and security professionals from around the globe gathered for “Privacy. Security. Risk. 2015”—the second joint conference between the International Association of Privacy Professionals and the...more
Thousands of U.S. and European companies who rely on the EU–US Safe Harbor Framework to permit the transfer of personal data from the EU to the U.S., have come a step closer to seeing the transfer mechanism struck down....more
On Monday, September 14, 2015, four major banks signed agreements with New York’s Department of Financial Services to regulate their use of a new financial messaging platform provided by Symphony Communication Services...more
Tennessee has joined other states in formally approving lawyers’ cloud-storage of client-confidential data. The Board of Professional Responsibility (“BOPR”) held that lawyers ethically may use cloud storage for...more
Companies doing business with the U.S. Department of Defense are facing new requirements for reporting data security breaches and for acquiring cloud computing services. The Interim Rule, effective August 26, 2015, amends the...more
Managed security services are often a natural “add-on” when outsourcing IT services given that data protection is integral to application development, software as a service, and cloud storage, among other services. More...more
Earlier this summer, the Federal Financial Institutions Examination Council (FFIEC) released its highly anticipated Cybersecurity Assessment Tool (Assessment), which is designed to assist financial institutions in identifying...more
I continue my exploration of the use of social media in doing compliance by taking a look at a very innovative social media solution to a difficult compliance issue around, of all things, honey. This example shows how...more
On July 20, the Department of the Treasury published a Notice and Request for Information (“RFI”) seeking comment on various aspects of online marketplace lending, including – - the business models and products offered...more
A compilation of time-sensitive and trending legal and regulatory issues that general counsels and business leaders should be aware of in 2015. Employers Should be Aware of Multigenerational Workforce Risk - For...more