5 Key Takeaways | 2024 Emerging Trends: Delaware Unclaimed Property VDA and Multistate Audits
Common Scenarios Triggering False Claims Act Violations, Part 3: Claims and Investigations
Compliance Tip of the Day: Machine Learning for Internal Audit
DE Under 3: OFCCP Changes Up Important Technical Details of its Audit Selection Process in First FY 2024 CSAL
Preparing for a Government Healthcare Audit
What Can A Tax Attorney Do For You? A Podcast With Janathan Allen
Navigating GSA Audits Compliance Strategies and Best Practices
DE Under 3: US DOL Inspector General’s Office Plans to Review Effectiveness of OFCCP Compliance Evaluations
DE Under 3: What Federal Contractors Need to Know About OFCCP's New Audit Scheduling Letter
DE Under 3: What’s New in OFCCP’s Latest Audit Scheduling Letter for Supply & Service Contractors
Independent Audits of Nonprofit Organizations With Douglas Cook
DE Under 3: U.S. OPM Proposed Allowing Federal Managers To Avoid Most Qualified Candidates To Pick Those Who Offer Better “Fit”
AGG Talks: Home Health & Hospice - Reimbursement Audits and Appeals
After ALJ: Options and Opportunities in the Face of an Unfavorable ALJ Decision
The Presumption of Innocence Podcast: Episode 21 - Conservation Easement Donations: Tax Shelter or Charitable Contribution Deduction?
Compliance and Managing from the Middle
I Understood There Would Be No Math: Audits, Extrapolations, and a New Set of Rules
JONES DAY PRESENTS®: Trade Secret Audits: Enhanced Mapping, Protecting Access and Creating Understanding
Constangy Webinar - DEI Audits: Tools to Enhance Your DEI Practices
DE Under 3: OFCCP's Request for Comments on Changes to Supply & Service Audit Document
U.S. Court Axes Most of SEC's SolarWinds Data Breach Suit - The U.S. District Court for the Southern District of New York recently dismissed much of the U.S. Securities and Exchange Commission’s (“SEC”) suit against...more
If you have a tendency to reuse the same password across multiple accounts, you could be leaving yourself (and your organization) exposed to risk. Credential stuffing, the stealthy technique fueling a recent explosion of...more
In our rapidly evolving digital landscape, all organizations are facing an onslaught of cybersecurity threats. According to recent research, victims of cyber attacks paid out a record $1.1 billion last year and have already...more
Over the last several years several companies, including Marriott, Yahoo and Volkswagen, have been victimized by hackers breaking into a company’s computer network. In some cases, they have put confidential information on the...more
On March 2, 2023, the White House Office of the National Cyber Director released the National Cybersecurity Strategy (the “Strategy”). While the Strategy carries no legal force in and of itself, it sets forth a bold roadmap...more
EPA Aims to Mitigate Risk of Cyberattack on Public Water Systems On March 3, 2023, the U.S. Environmental Protection Agency (EPA) issued its Memorandum Addressing Public Water System (PWS) Cybersecurity in Sanitary Surveys or...more
Companies are increasingly choosing not to pay ransom for ransomware and extortionware due to the growing associated risks. In fact, a recent report by crypto-crime analyst firm Chainalysis found that payments to threat...more
The concept of “security by obscurity” is officially outdated. In recent years, cyber-attacks have become increasingly sophisticated, destructive, and indiscriminate. In today’s landscape, cyber threats can come from internal...more
Editor’s Note: On July 27, 2022, HaystackID shared an educational webcast on the topic of Committee on Foreign Investment in the United States (CFIUS) compliance. CFIUS is a U.S. government interagency committee with the...more
Following significant collaboration with the industry, the Transportation Security Administration (TSA) issued a revised directive, effective July 27, 2022, which updates one of the prior directives issued in the wake of a...more
HaystackID Educational Webcast The SEC recently proposed significant changes for PE reporting requirements. Whether these amendments are adopted or not, one thing is for sure; all alternative investment organizations are on...more
As publicly reported late last week, the Securities and Exchange Commission’s Division of Enforcement (SEC) sent voluntary requests for information to a range of public companies and investment firms seeking voluntary...more
Our annual Clinical Practice Compliance Conference provides information about the latest government initiatives related to physicians and clinics, and physician integrity trends. Unite with your colleagues to discuss...more
With corporate data security breaches on the rise, the New York State Department of Financial Services (NYDFS) has adopted rules requiring financial institutions to take certain measures to safeguard their data and inform...more
This Halloween, the scariest monsters might not be in your closet or under your bed. They may be overseas, orchestrating intrusions into your electronic medical record. Or they may be lurking in your own workforce, carrying...more
On September 29, it was revealed that the HHS Office for Civil Rights (OCR) will commence Phase 2 of its HIPAA audit program in “early 2016.” OCR’s revelation regarding the Phase 2 audits, which had been the subject of...more
Panelists at the PCAOB’s June 25 Standing Advisory Group Meeting discussed cybersecurity and the potential implications for financial reporting and auditing. Some of the highlights from the panel include the following...more
Cybersecurity has increasingly become a critical issue for all types of businesses, few more so than broker-dealers, investment advisers and others in the financial sector. The cyber threat is much broader than customer data...more