Risk Management ( Page 4 )

  • Home
  • Posts Tagged "Risk Management"
  •  ( Page 4 )

Security in Bars, Taverns, and Nightclubs

In many parts of countries around the world, the neighborhood bar provides a location for friends to gather. Taverns and restaurants offer patrons a place to drink and dine. Nightclubs offer a high energy atmosphere that combines dancing and the consumption of alcohol. Hotels, motels, and entertainment complexes often contain bars, taverns, restaurants and nightclubs. ...
Read more

Understanding Post-Storm Business Interruption Coverage

The full extent of economic damage from this year’s devastating hurricanes—Harvey, Irma, Juan and Maria—will not be evident for some time. That impact is likely to extend well beyond the Gulf states, Puerto Rico and the Virgin Islands to the greater United States and even global economy. Damage to major oil refineries and chemical, plastics ...
Read more

Defending Trade Secrets In The Gig Economy

Waking up to news of another major data breach seems to have become a daily routine. On the front pages and cable news, we hear about hackers, rogue governments, and shadowy figures involved with these data breaches. But too often we overlook the fact that most data breaches are not the stuff of Tom Clancy ...
Read more

Cybersecurity Best Practices — How General Counsel Can Prepare For The Worst

Take note GCs: The question is not if you will have to respond to a cybersecurity incident—the question is when. That was the message from speakers and panelists at the Association of Corporate Counsel’s annual meeting this year. Indeed, the majority of all U.S. businesses have experienced at least one cybersecurity incident in the last year, with some ...
Read more

Responding to Crisis Effectively

In crisis, efforts toward the planning, training, and coordination of resources enable an organization to surge toward the protection of its assets and operations during disruption. However, what cannot be surged is stakeholder trust and confidence. Prior to crisis, a requisite level of capabilities must be developed and maintained to provide stakeholder confidence that assets ...
Read more

Real ID Act goes into effect for travelers January 22, 2018

If you have gone through airport security recently, you’ve probably seen these signs posted:Phase 4 of the Real ID act goes into full effect on January 22, 2018, requiring that travelers present a Real ID compliant form of identification when boarding domestic flights. At this point, the majority of state IDs and drivers licenses are ...
Read more

What American Companies Need to Know about the EU’s New General Data Protection Regulation

The General Data Protection Regulation (GDPR) is a new data privacy and security law in Europe that will go into force on May 25, 2018. Every organization that does business with EU customers, regardless of the home base of the organization, and regardless of the size of the organization, must come into compliance or risks ...
Read more

Venue Protection in an Asymmetric Environment

In the aftermath of the horrific shooting at the Mandalay Bay Resort in Las Vegas on October 1, hotel operators, cinema and restaurant managers as well as security personnel assigned to outdoor venues, have logically asked themselves how they can go about “hardening” the location. Specifically, what reliable measures can they take to make the ...
Read more

Cloud Computing Crash Course: Safety First

When it comes to privacy and security laws governing sensitive data, you don’t have to be a financial or health institution to have information that is subject to state and federal regulation. Almost every organization with employees stores some personally identifiable information. Simply storing an employee’s name, email address and date of birth will be ...
Read more

Cloud Computing Crash Course: Location, Location, Location

Cloud computing is the practice of enlisting a “cloud provider” to deliver data, applications and storage to users through the internet, which allows each user to share the computing resource and forego some on-premise technology. Cloud computing is generally categorized into three buckets. The cloud provider may: Host applications, thereby eliminating the need to install ...
Read more