At the onset of widespread AI use, AI’s ability to produce quick and seemingly trustworthy outputs distracted many companies and individuals from the dangers of using AI tools as a “new toy.” After the novelty wore off, AI...more
11/14/2024
/ Artificial Intelligence ,
Audits ,
Automated Decision Systems (ADS) ,
Bias ,
Corporate Governance ,
Data Collection ,
Governance Standards ,
Policies and Procedures ,
Public Relations ,
Regulatory Oversight ,
Risk Management
In the rapid evolution of artificial intelligence, companies are often enticed by the numerous benefits that AI can offer, from improving efficiency and productivity to gaining a competitive edge....more
On September 23, 2024, the U.S. Department of Justice (“DOJ”) released updates to its Evaluation of Corporate Compliance Programs (“ECCP”) guidance. In a move that surprised no one (especially if companies have been reading...more
10/9/2024
/ Artificial Intelligence ,
Compliance ,
Corporate Governance ,
Department of Justice (DOJ) ,
Emerging Technologies ,
Employee Training ,
Enforcement ,
Guidance Update ,
Penalties ,
Policies and Procedures ,
Popular ,
Risk Assessment ,
Risk Mitigation
Join industry experts Allison Spagnolo, Asha Muldro, and Matt Corwin as they dive into the rapidly evolving landscape of AI governance, privacy concerns, and the legal frameworks that are shaping corporate compliance. As AI...more
10/2/2024
/ AI Act ,
Artificial Intelligence ,
California ,
Compliance ,
Corporate Counsel ,
Corporate Governance ,
EU ,
Executive Orders ,
FCC ,
Law Firm Associates ,
Law Firm Partners ,
Legal Technology ,
Privacy Concerns ,
Regulatory Requirements ,
Risk Mitigation ,
Webinars
Clearly defined roles and responsibilities are an essential component of an effective compliance program. Failure to adequately assign responsibility can lead to gaps in compliance coverage and a lack of accountability. ...more
7/19/2023
/ Chief Compliance Officers ,
Chief Information Officers (CIO) ,
Chief Information Security Officer (CISO) ,
Corporate Governance ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Information Management ,
Information Security