Recent legislation has had a significant impact on the trade of conflict minerals, including "blood diamonds," out of areas ravaged by war and run by warlords. The deadline for reporting supply chain partners, per Dodd-Frank, has come and gone, and companies have found it difficult to say with certainty whether their materials are truly conflict-free. A QMS can be hugely...
Smaller companies often don't need the exhaustive risk assessment programs the huge corporations require. For many organizations, in fact, something much simpler fits the bill. Jeff Kaplan of Kaplan & Walker outlines an eight-step process ideal for small to mid-size companies. Simple, but not too simple.
A host of factors need to be taken into consideration in the selection of a new Chief Risk Officer. Where his or her experience and expertise lies is certainly top of mind, but more qualitative aspects of the candidates' skill set and capabilities carry weight, as well. How are the prospective hire's critical thinking skills, for instance? Is he personable?...
There’s something to be said for correcting issues of corruption, but in some cases the problem is beyond fixing. Corruption in some industries and countries is so pervasive that your organization's best chances of avoiding significant reputational harm and sizeable penalties for regulatory violations lie in simply getting out.
The catastrophic Heartbleed bug, disclosed in early April, impacted hundreds of thousands of popular websites. It is considered one of the most significant, far-reaching vulnerabilities in the history of the Internet, made all the more unsettling because it’s entirely undetectable. Here’s what you can do to protect yourself and your company.
Earlier this year, the Office of Inspector General (OIG) put smaller life sciences companies on notice that they should put in place a risk assessment process as part of their corporate compliance program.
There’s risk enough when information is housed in a single location, but when data is shared between multiple devices – and particularly when files are transferred online – maintaining security becomes far more complex. Follow this guidance when choosing a file-sharing solution for your firm.
HBO’s Game of Thrones is a pretty accurate portrait of the corrupting nature of power. The higher up the corporate ladder one gets, the greater the danger of “agency risk,” or the propensity to pursue what’s best for number one, and not so much for the stakeholders or the organization as a whole. What can businesses do to mitigate the...
If the CRO or risk leader is to be effective and successful in the organization, he must be given full access to the Board, participate in high-level discussions and strategy setting and seen as an equal to the other C-Suite leaders or executives. The company and its leadership must appear to value the risk management function and enable the CRO...
The data breach at Target last November has been widely publicized and widely criticized. The corporation was aware of intrusions in its software, but failed to respond. And the results for the company – one of the nation’s largest retailers – have been disastrous, as evidenced by the tens of millions of dollars the company has already shelled out in...
SOX compliance is now a routine process for most companies. How can we then explain the rapidly growing number of restatements and recognition complaints when companies certify they are in compliance? Author Mark Alexander asks compelling questions. Can your organization provide good answers?
An effective compliance program can protect a company from criminal indictment -- and generate bottom-line results.
Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security.
Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls.
© 2022 Corporate Compliance Insights
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |