Practical Steps to an Effective Compliance Program
Categories: Anti-corruption and FCPA compliance Anti-trust Compliance training Corporate compliance Ethics Privacy and data protectionIn today’s business environment, companies need a comprehensive...
View ArticleONC Releases Updated Guide to Privacy and Security of Electronic Health...
The Office of the National Coordinator for Health Information Technology (ONC) released a revised Guide to Privacy and Security of Electronic Health Information. The Guide now offers practical...
View ArticleNavigating the International Path of Data Protection and Privacy
The number of countries creating data protection / data privacy regulations is increasing. Each country has its own priorities and varying standards. However, in this globally-connected world, there is...
View ArticleImpact of Social Media on Patient Data Protection & Privacy
A first-year resident films a doctor inserting a chest tube into a patient and posts it on YouTube to show other residents how to properly perform the procedure. A team of nurses uses Facebook to...
View ArticleWebinar: The Importance of Training in Your Cyber Compliance Program
Does your organization know what needs to be done to prevent a significant cyber security breach? In an increasingly digital business environment, the number of security breaches is on the rise, and...
View ArticleClick 4 Compliance Announces New Online Compliance Training Course for...
RESTON, Virginia – August 4, 2015 – Click 4 Compliance, the leader in online compliance training, announced that it released today a Cybersecurity Basics compliance training online course. With the...
View ArticleReputation Risks in the Social Media Age: Are You Prepared?
As Benjamin Franklin once noted, it takes many good deeds to build a positive reputation — and only one bad deed to destroy it. In a social media world where scandals can travel around the globe at the...
View ArticleWhat Target’s Data Breach Settlement Means for You
For consumers, the dust has long since settled on Target’s 2013 database hack, which compromised millions of customers’ information. But for the retail chain, costs continue to build. Just this month,...
View ArticleCybersecurity: The Risks of Mobile & Personal Devices
Critics came down hard on Hillary Clinton last year for conducting government business on her personal phone. She was trying to make life easier by consolidating devices, but convenience came at the...
View ArticleWhy Your Company’s Privacy Reputation Matters
When hackers broke into eBay’s network to spy on the physical addresses, phone numbers and birthdates of more than 145 million active customers, the retail giant wasn’t the only company whose...
View Article
More Pages to Explore .....