Steps Your Nonprofit Can Take to Mitigate Fraud Risks - Part 2
A Third Party's Perspective on Third Party Risk
Implications of the SEC Cybersecurity Disclosure Rule
Privacy Issues from Third-Party Website Tags
What's the Tea in L&E? Employee Devices: What is #NSFW?
Preparing for a Government Healthcare Audit
Tackling Credit Push Fraud: Understanding Nacha's Risk Management Package (Part Two) — Payments Pros: The Payments Law Podcast
Compliance into The Weeds: The Complexity of Risk Assessments
Behavioral Health Compliance
The Importance of Assessment Areas
RegFi Episode 8: The Technological Path to Outcomes-Based Regulation with Matt Van Buskirk
What Physicians Need to Understand About Balance Billing
What Nonprofit Board Leadership Needs To Know About Internal Investigations
Taking a Behavioral Approach to Compliance
Episode 291 -- Interview of Mary Shirley on Her New Compliance Book
ChatGPT Risks for Compliance Programs
Season 2 Episode 3 - The Role of Ethics and Compliance Programs in International Business
In the Boardroom With Resnick and Fuller - Episode 4
What Non-Financial Institutions Need to Know About Gramm-Leach-Bliley
"Board-er" Patrol in Privacy and Cyberattacks - Unauthorized Access Podcast
Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information....more
Join our enlightening webinar to explore the critical role of data discovery in constructing a comprehensive and accurate data inventory, essential for streamlining privacy compliance and enhancing data governance. In this...more
Something keeping you up at night? It just might be the data risks hiding in your e-discovery process. Join us for an in-depth webinar on "Uncovering E-Discovery Data Risks: How to Identify and Mitigate Hidden Threats Before...more
Defining the role of inherent risk in cybersecurity - Inherent risk is a concept that while fundamental to cybersecurity, has largely been disregarded by popular cybersecurity risk guidelines and standards and remains arcane...more
Legal data volumes have exploded in our modern digital age, which can translate to huge cost increases if not handled properly. It’s more important than ever for legal teams to make strategic decisions at the outset of a case...more
These apply equally to governments, private companies, and individuals of all backgrounds facing litigation. Following these tips should foster better relationships with counsel, and potentially lead to lower costs, and...more
These days, companies are investing more effort in conducting thorough internal investigations to root out and resolve issues of misconduct and prevent their recurrence. There are many factors behind this trend. With the rise...more
As we witness the surge of the COVID-19 pandemic across the globe, more and more businesses implement their (partial) return-to-office policies. While each organization has its own view on which workplace model fits them...more
Lawyers handle tremendous amounts of sensitive information every day: their clients’ personal data, including both personally identifiable information (PII) and protected health information (PHI), intellectual property, trade...more
As businesses continue to globalize, so does the demand for global data in litigations, regulatory matters, and internal investigations. When thinking about eDiscovery from a global perspective, one size does not necessarily...more
What the heck is a “SWOT” analysis? And, why do you need one? A “SWOT” analysis is a structured planning method used to evaluate the Strengths, Weaknesses, Opportunities, and Threats associated with an organization or a...more
Marc Zamsky has been involved in the eDiscovery provider community since 1996. He joined Compliance in May 2013 as the Chief Operating Officer. In that role, Marc expanded the eDiscovery solutions offered by Compliance by,...more
Effective as of January 1, 2020, the California Consumer Privacy Act (CCPA) gives broad rights to people on their personal data in the custody of companies. This focus on data rights significantly raises the compliance burden...more
For as long as humans have been writing things down, redactions have been a part of the process. In the beginning, they were used to integrate disparate stories and folktales, but these days, when we hear about redactions,...more
The Background: Technology has transformed the way that directors receive and review information and communicate with each other and with management. The Issue: Although many modern board practices are more secure and...more
GDPR: A Snapshot - The GDPR updates the EU’s 1995 framework data privacy law—which is outdated due to the technological advances that have occurred since the mid-1990s. The European Commission proposed the GDPR in 2012,...more
When assisting clients with emergency data breach response, and preparing and implementing a data privacy and security plan, it often becomes efficient, cost effective and necessary to hire outside vendors to assist with...more
When people think of high risk data, most think of Personal Health Information and Personally Identifiable Information as it relates to HIPAA and the health care industry, but Steve Shebest’s very informative article “High...more
The transportation industry is always searching for new technology and best practices that can eliminate or reduce risky driving behavior, improve the overall efficiency and effectiveness of fleets, and avoid frivolous and...more