Compliance Tip of the Day: Rethinking Corporate AI Governance Through Design Intelligence
Julie Mortimer of Mills & Reeve on The Right Way to Kickstart Your CRM Strategy - Passle's CMO Series Podcast EP176
Compliance Tip of the Day: COSO Governance Framework: Part 4, Culture
Tips for Conducting a Trade Secret Assessment with Rob Jensen
Bar Exam Toolbox Podcast Episode 318: Quick Tips -- The Final Two-Week Bar Exam Countdown
Navigating Employee Integration in Mergers and Acquisitions: Lessons From Pretty Woman — Hiring to Firing Podcast
Work This Way: An Employment Law Video Podcast | Episode 51: Smarter Recruiting Strategies with Rhiannon Poore of Forge Search
California Employment News: Creating the Report for a Workplace Investigation – Part 4 (Featured)
Compliance Tip of the Day: Assessing Internal Controls
Compliance Tip of the Day: COSO Objective 5 – Monitoring Activities
Compliance Tip of the Day: COSO Objective 3 – Control Activities
Compliance Tip of the Day – COSO Objective 1 – Control Environment
Hiring Smarter: Best Practices for Interviews: What's the Tea in L&E?
Compliance Tip of the Day – New FCPA Enforcement Memo – What Does it Mean?
Compliance Tip of the Day: Code of Conduct as an Internal Control
California Employment News: Gathering Information in a Workplace Investigation – Part 2 (Featured)
Compliance Tip of the Day: Risk Assessments and Internal Controls
FCPA Compliance Report: The Role of Culture and Data in Fraud Risk Management - A Conversation with Vincent Walden
Compliance Tip of the Day: Podcasting for Compliance Training
Compliance Tip of the Day: Compliance Training Frequency
As global trade policy evolves faster than ever, now is the time to connect with your peers, discover new strategies, and most importantly, hear from the regulatory agencies on the front lines of policy change. ACI’s 15th...more
Did your computer suffer from a blue screen of death due to the global IT outage caused by an update from CrowdStrike, a popular cybersecurity provider to many enterprises around the country? Cybersecurity concerns top the...more
Hosted by American Conference Institute, the 14th Advanced Forum on Global Encryption, Cloud & Cyber Export Controls returns for another exciting year with curated programming that brings together a global gathering of...more
The digital landscape is constantly evolving, and with it, the challenges faced by digital forensics and eDiscovery collections professionals. Join our expert panel as they discuss targeted remote collections for iOS and...more
Hosted by American Conference Institute, the 13th Advanced Forum on Global Encryption, Cloud & Cyber Export Controls returns for another exciting year with curated programming that will dive into the intricacies of...more
NFTs – or non-fungible tokens – are increasingly popular among artists, sports figures, and the video game industry. But NFTs (some selling for upwards of eight figures) are not just for gamers, Mark Cuban, and the ultra...more
Today, the U.S. Department of Labor’s Employee Benefits Security Administration (EBSA) issued much anticipated cybersecurity guidance for employee retirement plans. This comes more than four and a half years after the ERISA...more
For a whole decade, ACI’s U.S. Export & Reexport Compliance for Canadian Operations conference continues to stand apart as the only practical, comprehensive event of its kind for the export compliance community in Canada. ...more
The Digital Planning Podcast is designed to educate individuals about all things digital in connection with estate planning, business planning, and estate administration. Your hosts, attorneys Jennifer Zegel, Ross Bruch, and...more
SDNY Rejects Standing under “Increased Risk” Theory Where Data Not Targeted or Stolen - The Southern District of New York rejected a settlement that would have resolved a class action based on the unauthorized (and...more
James Grago has a nice business going. He runs a website called ClixSense.com that permits users to earn money by completing surveys and watching advertisements. Revenues grew from $6.7 million in 2015 to $9.1 million in...more
Conducting HIPAA Breach Risk Assessments - The HIPAA rules relating to assessment of potential patient confidentiality breaches were changed in 2013. Specifically, on January 17, 2013, the Office of Civil Rights released...more
Although litigators today benefit from advanced technology to research and organize their cases, the evolution of electronic data and the internationalization of business are adding new complications that require...more
Employees are the front line of your information security defense. While technological protections are essential (for example, anti- virus software, firewalls, spam filters, etc.), none are as effective as a vigilant end...more
As of early December 2014, 1,170 security breaches under the Health Insurance Portability and Accountability Act (HIPAA) involving 31 million records had been reported to the U.S. Department of Health and Human Services (HHS)...more