Corporate Use of Third-Party Artificial Intelligence (AI) Tools
One Month to More Effective Written Standards: Day 17 – Policies for Third-Parties
Third Party Observation in Patent Prosecution in China
Consumer Finance Monitor Podcast Episode: Recent Federal and State Debt Collection Developments
Thobekile Cynthia Khumalo on Third Party Due Diligence
Protecting Trade Secrets When Facing Lawsuits or Alternative Dispute Resolution Procedures
Education Data Privacy and Security Laws: Best Practices for School Districts
Episode 162 -- Jessica Sanderson on How to Conduct a Remote Third Party Audit
VIDEO: Update on Third Party Workers’ Compensation Settlements in Pennsylvania
Episode 120: Interview of NAVEX Global Third-Party Risk Officials: Chris Bailey and Stephen Gooding
Subro Sense Podcast - Unpacking Product Claims Against Amazon
Business Succession Planning: Strategies for the Transition
E17: Carpenter Decision Builds Up Privacy from #SCOTUS
Day 17 of One Month to More Effective Continuous Improvement-Financial Health Monitoring
Day 6 of One Month to More Effective Continuous Improvement-Data Analytics and the Monitoring of Third Parties
FCPA COMPLIANCE REPORT-EPISODE 337, JAMES GELLERT ON ASSESSING 3RD PARTY FINANCIAL HEALTH FOR COMPLIANCE
FCPA Compliance Report-Episode 274, Scott Lane on an holistic approach to third party management
FCPA Compliance and Ethics Report-Episode 169-the First Mailbag Issue
FCPA Compliance and Ethics Report-Episode 95-interview with Scott Killingsworth on Private to Private Compliance Solutions
FCPA Compliance and Ethics Report-Episode 88, Internal Controls for Third Parties Under the FCPA, Part I
Technology—what did we ever do without it? There are many technological programs at an employer’s disposal, ranging from checking a candidate’s background during the application process to surveilling employee activity by...more
The CFPB issued guidance regarding “Background Dossiers and Algorithmic Scores for Hiring, Promotion, and Other Employment Decisions.” In the guidance, the CFPB warns that, like credit reports used by lenders to make lending...more
There has been a spate of legislation and lawsuits targeting the use of software that gives visibility to competitors’ prices. This allows firms to adjust their prices, either undercutting the competition or setting a de...more
State regulators are taking action on the use of artificial intelligence in insurance. To date, nearly a dozen states have adopted some form of the National Association of Insurance Commissioners (NAIC) Model Bulletin on the...more
The Federal Trade Commission (FTC) has reinforced its aggressive stance on enforcing antitrust laws by filing a federal lawsuit against Amazon on September 26, 2023. Seventeen other states have also joined in this legal...more
In July, the Innovation, Cybersecurity and Technology Committee of the National Association of Insurance Commissioners (NAIC) released an exposure draft of its model bulletin titled “Use of Algorithms, Predictive Models, and...more
In Short - The Background: In recent months, artificial intelligence ("AI") platforms have taken the world by storm, introducing new, powerful tools for generating original and useful content based on training data and user...more
Pelosi Statement Dims the Lights on ADPPA - The prospects for the nation’s first comprehensive data privacy law, the American Data Privacy and Protection Act (the “ADPPA” or the “Bill”), dimmed after House Speaker Nancy...more
Israel’s Privacy Protection Authority (PPA) recently published its position on the duty to inform when collecting and using personal data. This is an important position, as it clarifies how to design the interface with the...more
Social Links is our ongoing series here at Socially Aware that rounds up current developments at the intersection of social media, policy, research, and the law. Embedding social media posts can be considered copyright...more
With headlines every day announcing another release of Protected Health Information (PHI), providers are asking themselves – is there a way to protect against these breaches? Beyond improving the security of large...more