News & Analysis as of

Compliance Data Retention Cybersecurity

Compliance programs typically refer to formalized institutional procedures within corporations and organizations to detect, prevent and respond to indvidual and widespread instances of regulatory violations. ... more +
Compliance programs typically refer to formalized institutional procedures within corporations and organizations to detect, prevent and respond to indvidual and widespread instances of regulatory violations.  In response to many corporate scandals evidencing rampant unethical business practices, many nations, including the United States, began passing strict regulatory frameworks aimed at curbing these abuses. Notable pieces of legislation in this area include the U.S. Foreign Corrupt Practices Act (FCPA), Sarbanes-Oxley (SOX), and the U.K. Bribery Act, to name a few. The foregoing statutes and the severe penalties often associated with them form the basis of many modern institutional compliance programs. less -
BakerHostetler

Data Governance: Practical Considerations for a Reasonable Security Program

BakerHostetler on

Imagine receiving an email from an unknown actor claiming to have taken approximately 2 terabytes of data from your organization’s network. The threat actor provides a file tree and sample files to substantiate its claim....more

Mitratech Holdings, Inc

The Ethics of AI in Recruiting: Bias, Privacy, and the Future of Hiring

If you’re in recruiting, you know that AI is thrown around a lot. AI in recruiting is no longer a concept to keep an eye on for the future. It’s here, reshaping how businesses find talent and build hiring processes....more

Benesch

Staying Ahead of the Curve: Adapting to Evolving Cyber Regulatory Enforcement

Benesch on

As calls for executive accountability for cybersecurity intensify, it is essential for companies to scrutinize the adequacy of ephemeral messengers, such as Signal, WhatsApp, WeChat, and Snapchat, in light of both present and...more

Bradley Arant Boult Cummings LLP

Complying With the FTC's Amended Safeguards Rule

Cybersecurity is a looming threat for most businesses. The impact of a major cyber event can resonate for weeks, months, and even years after the initial attack. To mitigate the risks to consumers, there have been several...more

Hanzo

[Webinar] Luminary Series: How Recent Regulatory Rulings Are Shaping Compliance - July 28th, 1:00 pm ET

Hanzo on

When it comes to ensuring enterprise data is safe, understanding recent rulings from different regulatory bodies and how they affect your organization is a vital first step, followed by reasonable measures to further...more

Ankura

Build A Data Inventory That Benefits Everyone

Ankura on

A data inventory is the fundamental building block for an effective privacy program.  In its simplest form, a data inventory can be thought of as a matrix which documents 1) what personal data is being collected by the...more

White & Case LLP

Building a Robust Biometric Compliance Program in the US: A Five-Step Checklist

White & Case LLP on

As companies across industries continue to take advantage of existing and emerging technologies that involve the collection and use of human biometric identifiers, corporate privacy programs must take into account the unique...more

7 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide