Investigations and Cognitive Interviews
Implications of the SEC Cybersecurity Disclosure Rule
Healthcare Document Retention
Vicky Hanks of Blake Morgan on Building an Effective Employee Brand - Passle's CMO Series Podcast
Behavioral Health Compliance
Conducting Healthcare Compliance Investigations
Navigating the Storm: Crisis Management in the Workplace — Hiring to Firing Podcast
Episode 299 -- Bobby Butler on the Compliance Profession and the Future of Compliance
Compliance Auditing & Monitoring
Web-based Tracking Technology and AI: HIPAA Compliance Issues for Health Care Practices
PODCAST: Williams Mullen's Benefits Companion - SECURE 2.0 Act Relief for Plan Corrections
What Physicians Need to Understand About Balance Billing
What Nonprofit Board Leadership Needs To Know About Internal Investigations
Compliance with the New EU-US Data Privacy Framework
Compliant Business Communications Through Messaging Apps
Interactive Compliance Policies
GILTI Conscience Podcast | Tax Insurance 101
Consumer Finance Monitor Podcast Episode: A Look at the Treasury Department’s April 2023 Report on Decentralized Finance or “DeFi”
Personal Devices and Messaging: Evolving Compliance Concerns and Best Practices
#WorkforceWednesday: What the End of the COVID-19 Public Health Emergency Means for Employers - Employment Law This Week®
Announcing its fourth ransomware cybersecurity investigation and settlement, the Office for Civil Rights (OCR) also observed there has been a 264% increase in large ransomware breaches since 2018....more
Learn the key principles of compliance - no travel required! If you’re new to or have minimal experience in compliance management don’t miss this opportunity to build the foundational knowledge you need! SCCE’s four-day...more
In 2023 the US Securities and Exchange Commission adopted rules “requiring registrants to disclose material cybersecurity incidents they experience and to disclose on an annual basis material information regarding their...more
The Securities and Exchange Commission (“SEC”) has announced the adoption of amendments to Regulation S-P (“Amendments”) to modernize and enhance the rules that govern the treatment of consumers’ nonpublic personal...more
Ideal for professionals with some compliance knowledge and experience, HCCA’s Healthcare Privacy Compliance Academy offers practitioners a deeper understanding of effective compliance management in a healthcare setting. The...more
SCCE’s four-day Compliance & Ethics Essentials Workshop provides comprehensive education on the core elements of a compliance program in a convenient virtual format. The curriculum is ideal for those new to or with little...more
On November 13, 2023, Governor Kathy Hochul announced plans to regulate cybersecurity for New York general hospitals regulated under Article 28 of the Public Health Law. As proposed, the regulations will provide an additional...more
Following a two-month public consultation period, on 15 November 2023 the New York State Department of Financial Services (NYDFS) published its new Virtual Currency Listing Guidance (the Guidance), in accordance with virtual...more
On November 1, 2023, the New York Department of Financial Services (NY DFS) published its highly anticipated final amendments to its influential cybersecurity requirements for financial services companies (Part 500)....more
Report on Patient Privacy 23, no. 10 (October, 2023) Kaiser Foundation Health Plan Inc. and Kaiser Foundation Hospitals will pay California $49 million to resolve allegations that they unlawfully disposed of hazardous waste,...more
SCCE’s four-day Compliance & Ethics Essentials Workshop provides comprehensive education on the core elements of a compliance program. The curriculum is ideal for those new to or with little experience in compliance, as well...more
Following industry consultation, on 30 August 2023 the Cayman Islands Monetary Authority ("CIMA") issued updated Guidance Notes on the Prevention and Detection of Money Laundering, Terrorist Financing and Proliferation...more
In today’s digital landscape, organizations face numerous cybersecurity threats that can compromise their valuable digital assets, including their data, IT infrastructure, networks, software, and intellectual property (IP)....more
The SEC’s Cybersecurity Proposals - The SEC has proposed four rules designed to address cybersecurity risk and management, including incident reporting by public companies....more
An information security framework, when done properly, will allow any security leader to more intelligently manage their organization's cyber risk. The framework consists of a number of documents that clearly define the...more
At an open meeting on March 15, 2023, the U.S. Securities and Exchange Commission voted three to two to propose a new rule, form and amendments (together, “Proposed Rule”) and published an accompanying release (“Release”)...more
Cybersecurity attacks, such as malware, phishing emails, and password attacks, are a growing threat to patients and medical practices. Cyber attacks can significantly disrupt patient care, including by exposing confidential...more
On March 15, 2023, the Securities and Exchange Commission (“SEC”) issued three releases proposing (i) amendments to Regulation S-P (“Regulation S-P Proposal”)1, (ii) amendments to Regulation SCI (“Regulation SCI Proposal”)2,...more
Healthcare Privacy Compliance Academy Overview - Designed for professionals with some compliance knowledge and experience, HCCA’s Healthcare Privacy Compliance Academy is ideal for practitioners who want a deeper...more
The life cycle of a data security incident begins and ends with preparation. Unfortunately, there is no such thing as a network or system with “zero vulnerabilities.” There are jokes about absolute network security,...more
To help protect against criminal ransomware and cyberattacks, modern manufacturing plants should ensure they have reasonable physical, administrative, and technical safeguards in place....more
The modern security ecosystem is diverse and ever-changing, a place where cyber risk is top of mind for leaders at all levels, and threats to information / data security and privacy evolve at the speed of the technical...more