As business continues to increasingly embrace the concept of risk management, where does compliance fit, particularly in the context of broader Enterprise Risk Management (ERM) frameworks? It’s a tough question that James...more
Judith Spain is a professor of business law at Eastern Kentucky University, Compliance Collaborative Program Consultant with the Georgia Independent College Association, and, most importantly for this conversation, the author...more
Given the risks of third parties, especially in risk areas such as corruption, much emphasis is placed on thorough vetting.
But once the deal is signed and the agent or contractor is hired, the risks don’t stop there. It’s...more
Supply chains are emerging as an increasingly complex risk area for compliance. The risk includes trade compliance, vendor management issues associated with cyber/privacy, product compliance, REACH, ROHS and California...more
2/6/2020
/ Compliance ,
Corporate Social Responsibility ,
Cybersecurity ,
Data Privacy ,
Exports ,
Imports ,
Popular ,
Risk Management ,
Supply Chain ,
Trade Policy ,
Transparency ,
Vendors
“Section 889(a)(1)(A) of the John S. McCain National Defense Authorization Act for Fiscal Year 2019 prohibits the Federal Government from procuring or obtaining, or extending or renewing a contract to procure or obtain, ‘any...more
1/16/2020
/ China ,
Compliance ,
Exports ,
Federal Contractors ,
Foreign Policy ,
Huawei ,
Imports ,
NDAA ,
Risk Management ,
Supply Chain ,
Technology Sector ,
Telecommunications ,
US Trade Policies
Heidi Rudolph, Managing Director at Morae Global, has spent a great deal of time considering technology’s role, risks and rewards for compliance teams. She contributed an article...more
Mark Lanterman, Chief Technology Officer of Computer Forensic Services lives technology at its most terrifying, helping organizations manage the risks of the IT we all use constantly.
Recently he authored an article...more
1/7/2020
/ Business Strategies ,
Chief Compliance Officers ,
Compliance ,
Crisis Management ,
Cyber Attacks ,
Cyber Incident Reporting ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Incident Response Plans ,
Information Technology ,
Passwords ,
Policies and Procedures ,
Public Relations ,
Risk Management ,
Risk Mitigation
In a surprising web conference, Brian Lee, Managing Vice President at Gartner, shares some eye-raising insight into what’s going on when it comes to third-party risk management. Recent research there reveals what he reports...more
When it comes to HIPAA everyone knows about the risks of disclosing Personal Health Information (PHI) improperly. Also important, but often overlooked, is the need to ensure that when patients want access to their data that...more