Provided by Steele2020-09-24T12:45:00
The Resource Guide to the FCPA, Second Edition reiterates that a “one-size-fits-all” or “check-the- box“ approach to compliance will not be successful in combatting bribery or corruption, and will not be looked favorably upon by enforcement agencies. Compliance programs must not be static and must adjust, especially when high-risk parties are identified. With that in mind, Steele Compliance Solutions Inc., in its role to assist companies prevent corruption in the first instance, has identified the following key updates and takeaways from the second edition of the FCPA Resource Guide.
Our white papers are prepared by our sponsors and are free to view.
You need to register for this site and agree to the sponsor’s conditions to be granted access.
2025-10-03T21:24:00Z By Adrianne Appel
While the Trump administration may have shifted away from pursuing small, white-collar, financial crimes, its focus on health care fraud cases is as hot as ever.
2025-10-01T21:10:00Z By Neil Hodge
The U.K’.s financial regulator has given a strong indication that financial firms’ use of unauthorized devices and apps is under scrutiny and that policies around off-channel communications need to be tightened up.
2025-09-24T14:01:00Z By Aly McDevitt
Paris-based cement maker Lafarge thought it was saving a plant—instead, it built a pipeline to the Islamic State of Syria.
2024-11-06T17:05:00Z Provided by ServiceNow
The individual requirements for your security and risk operations are increasingly complex—and interconnected. Yet despite this increased interconnectivity, many organizations still manage their security operations (SecOps) and integrated risk management (IRM) functions in silos.
2024-08-07T05:54:00Z Provided by Theta Lake
The message from the regulators is clear - having an off-channel policy for mobile communications is not good enough.
2024-05-05T17:30:00Z Provided by ServiceNow and KPMG
To help investors gain a better understanding of cyber risk, the US Securities and Exchange Commission (SEC) has created sweeping new rules—forcing companies to take a more proactive approach to cybersecurity.
Site powered by Webvision Cloud