Blog Posts Tagged with "Due Diligence"
February 10, 2012 Added by:Thomas Fox
Compliance evaluation is becoming a more common component of the employee selection and hiring process. Many companies now specifically include due diligence in compliance parlance when hiring senior managers or others who will hold high levels of authority...
January 26, 2012 Added by:Kelly Colgan
No matter how small your operation, or even if you only occasionally work from home, clients trust you to protect their data — and laws in 46 states requires that you do so. Businesses must notify clients whose information is compromised, and notification can be costly...
December 07, 2011 Added by:Emmett Jorgensen
There have been numerous reports of rootkits and trojans that have been installed on component level chips designed to infiltrate networks from the inside. Government agencies have stepped up their diligence regarding what products are allowed to protect infrastructure at high security levels...
November 22, 2011 Added by:Keith Mendoza
This is a question that I would like to pose to the open-source software community: Assuming that we can ignore the lawyers for a second, what amount of effort would you be willing to put to produce software that is free of defect from workmanship? How will you go about making sure?
November 14, 2011 Added by:Thomas Fox
Admittedly, the time during any due diligence for an assessment of compliance is limited. This may well lead to a purchasing entity completing a transaction with unknown compliance risks in place. This can have several negative consequences, including successor liability...
October 18, 2011 Added by:David Sopata
Acquisitions, mergers, and new services may introduce new regulations within an organization. If they are not properly maintained they can fluctuate from compliant to non compliant within any given day. So the question is: Does your organization show due care and due diligence?
July 15, 2011 Added by:Thomas Fox
Once again, the need for continued vigilance throughout the due diligence process. Simply because your agent/vendor/business relationship is located in the United States, does not mean that you can automatically limit your due diligence inquiry to a Level One search...
July 06, 2011 Added by:Emmett Jorgensen
Fear, Uncertainty, and Doubt. Enemy of skeptic IT Pros, ally of marketers. Why do infosec pros talk about FUD in a negative light? Granted, some vendors push the FUD aspects of their marketing a bit too much. However, I think a little FUD can be a healthy thing. Let me explain...
June 24, 2011 Added by:Bozidar Spirovski
The passwords should be constructed in two parts, each part entered by different person, which increases the complexity significantly and reduces the possibility of using social knowledge of a single person to attack the password. Also, no one single person knows the password...
May 28, 2011 Added by:Chris Blask
Behind all the technology and corporations and globe-spanning markets and networks there are individual human beings. The actions and intent of those individuals shines through the layers between them and the rest of us like arc lights through kleenex. There is no replacement for intent...
May 25, 2011 Added by:Katie Weaver-Johnson
Organizations who are unable to measure situational awareness at the individual level will continue to suffer expensive breaches. All individuals need to understand their individual roles and responsibilities for protecting sensitive and personal information...
March 18, 2011 Added by:Thomas Fox
Businesses look to the value obtained in the use of a foreign business representative. This simple economic analysis is not sufficient in the FCPA context. There should be a separate analysis on whether the foreign business representative has the substantive skills to perform the services requested...
March 12, 2011 Added by:Thomas Fox
Many companies focus on the specifics of a best practices FCPA compliance program, we believe they should also make documentation an over-arching principal in their compliance programs. Everything done or performed within the context of your FCPA compliance program should be documented...
January 21, 2011 Added by:Thomas Fox
Companies need to be aware of developments and enhance their compliance program to meet these evolving standards. Authors Casadesus-Masanell and Ricart have provided a valuable guide for the FCPA compliance practitioner about how to set up a compliance business model for a company...
January 01, 2011 Added by:Thomas Fox
The clear trend in FCPA enforcement is an increased and aggressive level of enforcement activity under the both the DOJ and Securities and Exchange Commission. Businesses must be particularly heedful in the engaging in the mergers and acquisitions process, whether acquiring other companies or being acquired...
Good Security Starts at Home... Amire sohail on 10-30-2014
Is BYOD a Nightmare for IT Security or a Dre... Yuri Andrew on 10-30-2014
New Zero-day in Microsoft OLE Being Exploite... Lisa Harris on 10-30-2014