What to Do When Leadership Doesn’t Take Compliance Seriously
Workplace Sexual Assault and Third-Party Risk: What’s the Tea in L&E?
Creativity and Compliance: Reinventing Compliance with Creativity: The Acteon I-Care Code
From Forest to Fortune: Navigating Workplace Ethics With Robin Hood — Hiring to Firing Podcast
Innovation in Compliance: Mastering Communication: Insights from Dr. Dennis Cummins on Speaking and Selling without Selling
Great Woman in Compliance: The Power of Vulnerability with Cricket Snyder
Innovation in Compliance: The Power of Accountability and Team Culture with Gina Cotner
2 Gurus Talk Compliance: Episode 55 – The From Worse to Worser Edition
Compliance Tip of the Day: COSO Governance Framework: Part 4, Culture
Tips for Conducting a Trade Secret Assessment with Rob Jensen
New Virginia "Workplace Violence" Definition and Healthcare Reporting Law: What's the Tea in L&E?
Work This Way: An Employment Law Video Podcast | Episode 51: Smarter Recruiting Strategies with Rhiannon Poore of Forge Search
Daily Compliance News: July 8, 2025, The Learning on the Job Edition
Summer Strategies for Work Success
Work this Way: An Employment Law Video Podcast | Episode 49: Building Culture by Investing in People with Silvia King of Southern First Bank
Performance Reviews: Lessons from Severance — Hiring to Firing Podcast
Coffee Badging: Mastering the Art of Office Presence — Hiring to Firing Podcast
Creativity and Compliance: Nourish Your Audience: A New Approach to Compliance Training
Work This Way: A Labor & Employment Law Podcast | Episode 47: Coaching Leaders & Building Culture with Robyn Knox of The HR Business Connect
Sunday Book Review: May 18, 2025, The Books on Engaged Training Edition
I didn’t plan on working in cybersecurity. My path wasn’t exactly traditional, but every job I had taught me how systems break—technical or operational, it didn’t matter. ...more
Last month, Paul Hastings sponsored the Cybersecurity Law Workshop at the Spring Privacy & Security Forum held at George Washington University in Washington, D.C. The Cybersecurity Law Workshop featured three panels of...more
When assessing cybersecurity risk in your organization, it is important to understand your users and their behavior. A new study by Keepnet sheds light on new hire behavior concerning phishing susceptibility. According to its...more
This summer, Mission: Impossible – Dead Reckoning Part Two is expected to raise the bar again with heart-stopping stunts, cliff-hanging escapes, and the relentless pace we’ve come to expect from the Impossible Missions Force...more
High rates of violent acts against heath care workers pose a serious risk to the safety and wellbeing of the medical and support professionals on the front lines of patient care. Studies show that health care workers are five...more
The Bottomline: Five Practical Steps for Generative AI Risk Management - As the first line of defense, employees within business operations must own and manage risks related to the business, including risks resulting from...more
So, for those of you who missed last year’s “The Grinch Who Stole Compliance,” never fear: We have an endless supply of compliance-related holiday mirth. After all, who doesn’t like a bit of eggnog and the traditional singing...more
They appeared. They caused a fright. And then they disappeared… along with all of your data. While not a ghost, that is how most hacking groups operate and their ghostly presence is growing across the globe....more
When corporations use Artificial Intelligence (AI) programs, they should be sure to use them in a manner that doesn’t result in the Department of Justice knocking on their door. The DOJ just released an updated version of its...more
ACI’s Mexico Summit on Anti-Corruption & Compliance Programs returns on March 13-14, 2024 in Mexico City! Given the uncertainty with the looming Presidential election, as well as increased U.S. enforcement focus on Mexico...more
‘Tis the season for the hustle and bustle of year-end holiday activities. With that comes the increased risk of cybercriminals exploiting the season to find vulnerabilities. This includes taking advantage of increased online...more
Most human resources professionals are concerned about the privacy and security of the vast amounts of personal information they manage. This article discusses steps to consider taking against the challenges. Deluge of...more
Typically, we beat the drum of the need to prepare for a data incident—anything from a full-blown ransomware attack to an employee accidently sharing data with the wrong person—by having your Incident Response Plan developed...more
Compliance Program Guidelines - On December 5, 2022, the U.S. Department of State Directorate of Defense Trade Controls (“DDTC”) issued new Compliance Program Guidelines (“the Guidelines”) intended to provide an overview...more
I managed not to lose my temper when a training skeptic informed me that he wasn’t a fan of compliance training because “it’s not going to make a dishonest person do the right thing.” Indeed, I doubt anyone who previously had...more
How to ensure emerging technologies help rather than hurt your organization - Technology represents the classic double-edged sword for compliance and ethics professionals. When properly utilized, it can be a vital tool,...more
The job of a corporate decision-maker is far from easy. Whether you work for a fledgling startup or a Fortune 500 company, each day can present new and daunting obstacles that make it difficult to successfully navigate—let...more
The coronavirus crisis is far from over, and compliance professionals still need every scrap of guidance that regulators can provide about how to run compliance programs in these difficult times. So when the Securities and...more
Given the choice between credit card data and digital health records, cybercriminals prefer the latter. A stolen credit card can be canceled. Electronic protected health information (ePHI) with its treasure-trove of...more
AMA Details Components of a Strong AML/BSA Program - Earlier this month, the American Gaming Association (“AGA”) released an updated Best Practices for Anti-Money Laundering (“AML”) Compliance (“Best Practices Guidance”)...more
Are your employees instructed on the proper (and improper) use of social media? Does your organization have policies and provide training on the appropriate handling of sensitive information? A recent United States Department...more
When was the last time your organization reviewed its antitrust compliance program? The Antitrust Division of the US Department of Justice announced a new policy to incentivize corporate antitrust compliance programs, which...more
On April 30, 2019, Assistant Attorney General Brian Benczkowski unveiled an update to the Department of Justice’s Evaluation of Corporate Compliance Programs during a speech in Dallas, Texas. In issuing the new document (the...more
Companies must now address three questions proactively. On April 30, 2019, the DOJ’s Criminal Division issued updated guidance on how it will evaluate corporate compliance programs in its charging decisions going forward....more
On April 30, 2019, Assistant Attorney General Brian Benczkowski unveiled an update to the Department of Justice’s Evaluation of Corporate Compliance Programs during a speech in Dallas, Texas.[i] In issuing the new document...more