Compliance into the Weeds - SOX Compliance, PCAOB Inspections and Audits
Compliance into the Weeds-Episode 57-SOX Reform or Not?
Compliance into the Weeds-Episode 51, the PCAOB and Compliance
Compliance into the Weeds-Espiode 47
Everything Compliance-Episode 12
Day 5 of One Month to Better Investigations and Reporting-the Board’s Investigation Protocol
Compliance into the Weeds-Episode 30-SOX 404(b)
FCPA Compliance and Ethics Report-Episode 145-SEC Enforcement of the FCPA, Part II
In honor of Computer Security Day (which was Saturday), we have a quiz designed to test your grasp of key laws, regulations, and best practices that keep your personal, financial, and sensitive information safe....more
An information security framework, when done properly, will allow any security leader to more intelligently manage their organization's cyber risk. The framework consists of a number of documents that clearly define the...more
Data plays a central role in the operations of nearly every industry today. Along with the increase in the volume of corporate data that exists, we’ve seen an increase in the number of laws and regulations protecting...more
On Friday, June 3, Representative Frank Pallone (D-NJ), Chairman of the House Energy & Commerce Committee, Representative Cathy McMorris Rodgers (R-WA), the committee’s Ranking Member, and Senator Roger Wicker (R-MS), Ranking...more
Back in November, I wrote on this blog about Big Data being one of the challenges that is forcing technology to move more to the data sooner in the discovery process. One of the most notable fun facts that illustrate just how...more
Seyfarth Synopsis: The DOL’s ARB rejected an employee’s SOX retaliation claim where he inadvertently provided information to his employer and only “hinted” that he was filing a SOX-protected complaint. The ARB seems unwilling...more
Legal Framework - Summarise the main statutes and regulations that promote cybersecurity. Does your jurisdiction have dedicated cybersecurity laws? The United States generally addresses cybersecurity...more
These days information security is on the minds of virtually all technology professionals and business executives alike. But how does an organization ensure that their security profile is adequate. It can certainly help to...more
The starting point for every ethics and compliance program must always be an analysis of the ethics and compliance risks faced by the organization. In that light, it’s important to listen to James Comey, Director, U.S....more
On Tuesday, the House Energy & Commerce Subcommittee on Commerce, Manufacturing, and Trade held a hearing entitled "What are the Elements of Sound Data Breach Legislation?" This hearing was the first of the new Congress to...more
Assuring cybersecurity has become a necessity for businesses across all industries. Cybercrime — with over $1 trillion in annual profits — is now the most lucrative illegal global business. Any business with computers and...more