Innovation in Compliance - Improving Third - Party Risk Management with Paul Valente
The “Catch-22” of Preference Law
Gerry Blass on Healthcare Vendor Risk Management
Cyberside Chats: Would you bury your driver's license? (with Whitney McCollum)
Matt Silverman on Export Compliance
Thobekile Cynthia Khumalo on Third Party Due Diligence
Sitting with the C-Suite: Blending eDiscovery Vendors and Law Firms
Ledgers and Law: Real-World Planning for Cyber Attacks
Education Data Privacy and Security Laws: Best Practices for School Districts
In House Counsel: How To Measure the Effectiveness of Your Staffing Strategy
Sitting with the C-Suite: Identifying Opportunities to Leverage Human Capital
Lessons for Health, Beauty & Wellness Companies [Part 2]: What Options Exist for a Vendor During Bankruptcy
Lessons for Health, Beauty & Wellness Companies: What to do When Your Buyer is in Financial Distress
Sitting with the C-Suite: How Should In-House Counsel Evaluate eDiscovery Service?
Strategies for Restaurant Owners to Survive in the New Normal
Compliance Perspectives: Supply Chain Compliance Challenges
The CCPA for the Land Title Industry: Service Providers and Sale of Data Under the CCPA
Compliance Perspectives: Supply Chains, Human Trafficking and Modern Slavery
Episode 120: Interview of NAVEX Global Third-Party Risk Officials: Chris Bailey and Stephen Gooding
PODCAST: Williams Mullen GovCon Perspectives - Recent Updates to the SWaM Certification Process in Virginia
As employers across the country embrace the use of artificial intelligence in their workplace activities, federal and state lawmakers are lining up to consider guardrails on common AI practices. From hiring to performance...more
Negotiating a data processing agreement (DPA) is typically a necessary step when engaging vendors that handle personal data. However, these negotiations have become time consuming and complex, given the evolving privacy...more
In an era where consumers are increasingly concerned about ethical sourcing and labor practices, the California Transparency in Supply Chains Act (CTSCA) stands as a significant piece of legislation. Enacted in 2010, the...more
We have seen an explosion in the attention paid to legal, compliance and operational risks companies face in supply chain operations. Depending on the industry, companies have to address a wide-swath of supply chain risks,...more
On February 28, 2024, President Biden signed Executive Order 14117 (the EO), on “Preventing Access to Americans’ Bulk Sensitive Personal Data and United States Government-Related Data by Countries of Concern.” The United...more
At least two proposed bills pending before the New York State Legislature would force employers to conduct bias audits and provide high levels of transparency if they use AI-fueled automated employment decision tools for...more
The ever-increasing privacy and security risks via third-party vendors and service providers were apparent in 2023 with news of large organizations such as MOVEit, Okta and AT&T being affected. Research has shown that 98...more
DCI Consulting is excited to present its second annual Expert Summit for Employment Attorneys. DCI is providing this Expert Summit as a service to the legal community. The webinars that comprise the Expert Summit will focus...more
Meta Description: Learn about the significance of project monitors in the construction industry. Understand their role, daily tasks, and impact on ensuring accuracy, value, and timeliness toward project completion....more
Explore the unique issues that are pertinent to managed care professionals! This annual event dedicated to compliance management for health plan providers is returning to an in-person format for 2024. Join your peers and...more
Insider Risks often generate images of cyber breaches or government leaks. But experience shows us Insiders can impact any industry, and often fly under the radar until something occurs. Whether you’re an owner, a developer,...more
Over the last several years several companies, including Marriott, Yahoo and Volkswagen, have been victimized by hackers breaking into a company’s computer network. In some cases, they have put confidential information on the...more
The Department of Defense Inspector General (DoDIG) recently released its “Audit of the DoD’s Implementation and Oversight of the Controlled Unclassified Information [CUI] Program” (DODIG-2023-078). The audit highlights some...more
Companies are increasingly exploring the use of artificial intelligence (AI) and automated decision-making technologies to manage human capital, including for recruitment, hiring and performance purposes. Vendors offer...more
Since 2018, the U.S. Department of Labor has seen a 69 percent increase of children being employed illegally by companies. Last month, the U.S. Department of Labor (“DOL”) and Department of Health and Human Services (“DHHS”)...more
Effective Third-Party Risk Management (TPRM) is all about understanding that working with any third-party vendor or supplier carries an inherent risk. Across all industries, organizations are faced with a two-fold...more
Editor’s Note: On September 21, 2022, Business Intelligence Associates (BIA), a recently acquired HaystackID company, shared an educational webcast on the role of eDiscovery playbooks in litigation preparedness. Regardless of...more
By now, you’re well aware of the security risks that threaten every level of an enterprise operation. So, what can your organization do about it? You’re likely taking all the necessary precautions: auditing vendors for...more
The situation is a common one. Your company is in the midst of a sales process with a potential customer, and the business principals have decided on the core order form terms — pricing, term, services specifics, and the...more
What user experience does a visually impaired person have when visiting your website? Is your website designed with barriers for people with disabilities? These are among the important questions to ask to ensure that all...more
Licensees face financial risk and operational disruption in audits by their software and data vendors. Changes in technology are driving a current surge in those audits. Join Mayer Brown partners Richard Assmus, Brad Peterson...more
Can’t attend the conference in-person? The virtual Managed Care Compliance Conference, February 8–9, allows you to hear from industry professionals just like you—all from the comfort of your home or office. Geared towards...more
Attend our annual event for those who manage compliance at health plan providers. Explore topics and issues that are pertinent to industry professionals like you. Learn the latest practices, share strategies, and connect with...more
Learning Objectives: - Review the definition of a business associate under HIPAA - Understand common relationships that create gray areas in making determinations on whether business associate relationships exist -...more
ACI’s Practical Guide to FCPA Data Analytics will take place on July 19 – 20, 2021 (EDT). This is a uniquely interactive event on how to harness data analytics, AI and machine learning for FCPA compliance, investigations and...more