Risk Management ( Page 2 )

  • Home
  • Posts Tagged "Risk Management"
  •  ( Page 2 )

Defending Trade Secrets In The Gig Economy

Waking up to news of another major data breach seems to have become a daily routine. On the front pages and cable news, we hear about hackers, rogue governments, and shadowy figures involved with these data breaches. But too often we overlook the fact that most data breaches are not the stuff of Tom Clancy ...
Read more

Cybersecurity Best Practices — How General Counsel Can Prepare For The Worst

Take note GCs: The question is not if you will have to respond to a cybersecurity incident—the question is when. That was the message from speakers and panelists at the Association of Corporate Counsel’s annual meeting this year. Indeed, the majority of all U.S. businesses have experienced at least one cybersecurity incident in the last year, with some ...
Read more

Responding to Crisis Effectively

In crisis, efforts toward the planning, training, and coordination of resources enable an organization to surge toward the protection of its assets and operations during disruption. However, what cannot be surged is stakeholder trust and confidence. Prior to crisis, a requisite level of capabilities must be developed and maintained to provide stakeholder confidence that assets ...
Read more

Real ID Act goes into effect for travelers January 22, 2018

If you have gone through airport security recently, you’ve probably seen these signs posted:Phase 4 of the Real ID act goes into full effect on January 22, 2018, requiring that travelers present a Real ID compliant form of identification when boarding domestic flights. At this point, the majority of state IDs and drivers licenses are ...
Read more

What American Companies Need to Know about the EU’s New General Data Protection Regulation

The General Data Protection Regulation (GDPR) is a new data privacy and security law in Europe that will go into force on May 25, 2018. Every organization that does business with EU customers, regardless of the home base of the organization, and regardless of the size of the organization, must come into compliance or risks ...
Read more

Venue Protection in an Asymmetric Environment

In the aftermath of the horrific shooting at the Mandalay Bay Resort in Las Vegas on October 1, hotel operators, cinema and restaurant managers as well as security personnel assigned to outdoor venues, have logically asked themselves how they can go about “hardening” the location. Specifically, what reliable measures can they take to make the ...
Read more

Cloud Computing Crash Course: Safety First

When it comes to privacy and security laws governing sensitive data, you don’t have to be a financial or health institution to have information that is subject to state and federal regulation. Almost every organization with employees stores some personally identifiable information. Simply storing an employee’s name, email address and date of birth will be ...
Read more

Cloud Computing Crash Course: Location, Location, Location

Cloud computing is the practice of enlisting a “cloud provider” to deliver data, applications and storage to users through the internet, which allows each user to share the computing resource and forego some on-premise technology. Cloud computing is generally categorized into three buckets. The cloud provider may: Host applications, thereby eliminating the need to install ...
Read more

An Often Overlooked Tool in Workplace Safety Prevention: The Near-Miss Investigation

OSHA defines a near miss as an incident in which no property was damaged and no personal injury was sustained, but where, given a slight shift in time or position, damage or injury easily could have occurred. Put simply, someone got lucky. Because there was no damage, these near miss incidents are often ignored or ...
Read more

5 Things All Businesses With Child Guests Should Include in a Child Protection Policy

Children and vulnerable adults (i.e., adults with disabilities who need assistance with self-care) face unique threats because of their inability to recognize and protect themselves from danger. Organizations that have direct or even indirect contact with children or vulnerable adults should create and adopt a child protection policy and related training program to better safeguard ...
Read more