May 18, 2011 Added by:Thomas Fox
In short, do not be afraid of the results and use Paul McNulty’s maxims of “what did you find” and “what did you do about it”. After you have completed the FCPA audit, what steps should you take? This post will explore some of the issues related to the evaluation and response...
May 13, 2011 Added by:Thomas Fox
If there are components which need to be enhanced, you will have the opportunity to do so. If additional or supplemental training is called for; then take the opportunity to provide it. In short, do not be a afraid of the results...
May 11, 2011 Added by:David Navetta
With the Ceridian and Lookout settlements, the FTC wants to dispel the notion that it is focused solely on large scale, high profile privacy and information security violations affecting consumers. This is another reason to take a hard look at your company's compliance...
May 06, 2011 Added by:Thomas Fox
Both risk and compliance are converging. Your company should review its compliance program in these three areas to determine if any of its business relationships are on the lists set out in this article. Not only does it make business sense, but it may keep you out of regulatory scrutiny..
April 29, 2011 Added by:David Navetta
Beyond litigation risk, treating personal information in the same manner as property could significantly impact the current quid pro quo of the Internet and how information is collected, used and transferred. It will be interesting to follow this case through the next round of discovery...
April 24, 2011 Added by:Thomas Fox
The laws of many countries vary in terms of the capture and correlation of ERP data and if such information can be transmitted outside a country. Such issues may be overcome with multiple servers or other hosting solutions, it also increases the difficulty of capturing such data...
April 21, 2011 Added by:David Navetta
Companies have to assess the adequacy of their privacy and data security practices, including understanding the privacy and data security legal requirements that could impact the company’s business, ensuring that the company’s practices are consistent with those requirements...
April 12, 2011 Added by:David Navetta
Now is the time to review your company’s privacy and information security practices, conduct an security assessment, and take steps to ensure that your company’s practices comply with the various privacy and information security requirements, including FTC guidance...
April 10, 2011 Added by:Thomas Fox
A benchmark of the elements of an effective compliance program is the OECD's Good Practice Guidance on Internal Controls, Ethics, and Compliance. This article lists 12 specific instructions for companies to utilize as a basis to construct an effective compliance program upon...
December 17, 2010 Added by:David Navetta
In this part of our review, and in following parts, we dig into the specifics of the Report's proposed framework, with a eye to examining rationales for the various proposals as well as analysis on the potential effects going forward on practices and data policies...
November 12, 2010 Added by:Thomas Fox
The information included these collective Corporate Compliance Programs provides the FCPA compliance practitioner with the most current components that the Department of Justice believes should be included in a FCPA compliance program...
November 05, 2010 Added by:David Navetta
Periodically review the various use, privacy, copyright and other policies social networking sites to ensure that your employees aren't binding you to provisions you were unaware of or that may result in disclosure of confidential or trade secret information by default...
November 05, 2010 Added by:Thomas Fox
After his speech to the Compliance Week Annual Conference last May, Assistant Attorney General for the Criminal Division of the US Department of Justice, Lanny Breuer, took several questions from the audience. One of his more interesting responses was regarding facilitation...
October 20, 2010 Added by:David Navetta
Relevant information stored on social networks is generally discoverable in civil litigation. This simple proposition is largely ignored by most users of social media, and has been largely ignored by lawyers doing discovery in civil litigation...
October 15, 2010 Added by:Thomas Fox
The Wall Street Journal reported that the US Department of Justice was investigating allegations of possible bribery in Yemen by Schlumberger Ltd., in connect with their 2002 agreement with the Yemen government to create a national exploration data-bank for the country’s oil industry...
October 13, 2010 Added by:David Navetta
This document should be viewed less as a universal mandate, and more as a tool for cloud customers and providers to engage in spirited debate about the issues addressed in this Bill of Rights. This is a work in a progress and we invite you to submit your ideas on additional “rights” that we should include as well as any comments and criticisms on the current listing...
Wanna Buy Some Dumps?... Biniohs Chekcer on 06-19-2013
Student Pleads Guilty to Counterfeiting Coup... on 06-18-2013