Beyond the Bylaws: The Medical Staff Show | The Role of Bylaws in Medical Staff Governance, Part II
The Presumption of Innocence Podcast: Episode 60 - Enforcement Priorities of the Second Trump Administration: Employee Retention Tax Credit
Compliance Tip Of the Day: Using AI to Transform Whistleblower Response
Because That’s What Heroes Do: Deep Space 9 – Episode 30: Deep Trek Themes from Tacking into the Wind
FCPA Compliance Report: Amanda Carty on a Due Diligence and Risk Management
FCPA Compliance Report: Kristy Grant-Hart on A 360° Review of the Future of Compliance
Great Women in Compliance: Creating Space to Speak Up: The Story Behind Psst.org
Work This Way: A Labor & Employment Law Podcast | Episode 43: How Employers Can Navigate White Collar Crime with Erica Barnes & Christian Dysart of Maynard Nexsen
The Presumption of Innocence Podcast: Episode 59 - Enforcement Priorities of the Second Trump Administration: DOJ Focus
Creativity and Compliance: Bringing Joy to Compliance: A Conversation with Virginia MacSuibhne
Beyond the Bylaws: The Medical Staff Show - The Role of Bylaws in Medical Staff Governance, Part I
Compliance Tip of the Day: Embedded Compliance
Auditing Your Hotline and Case Management System
Compliance and AI: Ali Khan on Implementing AI Risk Management Systems
Compliance Tip of the Day: AI for Whistleblower Anonymity
Compliance Tip of the Day: Taming Complexity
Improving Your Code of Conduct
Envisioning a Compliant Workforce
Updating the Research Compliance Handbook
Investigations and Cognitive Interviews
Material updates to the HIPAA Security Rule could be on the way — affecting all HIPAA-regulated entities — for the first time in two decades. The Department of Health and Human Services (HHS) issued a Notice of Proposed...more
Moving towards more predictive postures, leveraging multiple sources of information such as cyber threat, business, and geopolitical intelligence, allow organizations to gain a better handle on crises before they occur. By...more
Hope for the best, but plan for the worst. Join us as we address ways to protect family privacy from external threats, and policies and procedures for handling information that individual family members wish to keep private...more
In this episode, Carlton Fields attorneys Kevin McCoy and Joe Swanson discuss the circumstances involved in a recent data breach involving the cannabis industry. We explore cybersecurity and data privacy issues that all...more
Practical steps to address cybersecurity threats—what you should do when heightened tension in the Middle East or other events increase the threat of cybersecurity incidents. - When news events or business initiatives turn...more
As cybersecurity attacks have continued to gain prominence as a threat posing critical risk management and compliance challenges for financial institutions, the Securities and Exchange Commission (SEC) has emerged as an...more
As its next step in the creation and implementation of a cybersecurity plan, the State of Connecticut has created a Cybersecurity Strategy document. This strategy specifically highlights the roles and vulnerabilities of state...more
Non-Enforcement Cybersecurity Is At the Top of SEC Examination Concerns In a recent SEC “risk alert” for registered broker-dealers and investment advisers, the SEC’s Office of Compliance Inspections and Examinations (OCIE)...more
In recent years, the SEC has been focused on cybersecurity. It has issued risk alerts, conducted examinations and provided guidance about what the agency sees as widespread weaknesses in many policies and procedures to...more
WISP is the acronym for Written Information Security Policy. The information at issue is an individual’s personal information and identifiers, such as a Social Security number, driver’s license number, credit or debit card...more