Posted inData Privacy

Many Companies Still Unprepared for Red Flag Rules

The compliance deadline for the so-called Red Flag Rules that require financial institutions and creditors to have written programs in place to detect, prevent, and mitigate consumer identity theft, is just around the corner. But, while compliance with the regulations shouldn’t be overly burdensome for most companies, many of them won’t be ready because they’re […]

Posted inData Privacy

DoJ Tools to Pry Information From You

In modern Corporate America, what happens overseas rarely stays overseas—especially if federal prosecutors want to hear about it. Any regulatory investigation can be difficult for a public company, and criminal probes can turn into a nightmare. A probe that reaches overseas subsidiaries or employees, however, only compounds the headache; that’s because the need to produce […]

Posted inInternal Controls

Achieving the Mythical ‘Mature’ GRC System

Companies with “mature” IT governance, risk, and compliance regimes have happier customers, make more money, and suffer fewer data-related disasters. To some extent, that sounds self-evident: If you’re a good company, you’re probably adept at many things, GRC being among them. But now, the fruits of GRC maturity have been statistically quantified. In the IT […]

Posted inData Privacy

Educating Staff Leads to Improved IT Security

In today’s business environment, information security and protection of information assets are vital to the long-term success of all organizations. Information is the lifeblood of corporations and a vital business asset. IT systems connect every internal department of a company and connect the whole company to myriad suppliers, partners, customers, and others on the outside, […]

Gift this article