A Leer, A Pat, A Joke, A Gesture, An Innuendo, A Kiss: Are You Prepared To Be the Next Social Media Blitz, Identified on #MeToo, or a Headline in the Newspaper?
Harvey Weinstein, Matt Lauer, Charlie Rose, Al Franken, Garrison Keillor, members of Congress, and various State lawmakers have been accused of sexual harassment and/or sexual assault. But there is a difference between pulling one’s pants down in front of a female colleague at work and touching a woman on her buttocks during a photo op—isn’t there? What is that difference? Are both examples considered sexua..
This webinar examines the scope and nature of employee dishonesty and explains the risks to employers and organizations of all types. It goes on to deal with the practical aspects of prevention and response to victimization, as well as balancing the need to assure that corrective and deterrent programs and policies do not unduly interfere with normal operations and opportunities and do not generate other ma..
IT governance (ITG) is defined as the processes that ensure the effective and efficient use of IT in enabling an organization to achieve its goals. Organizations today are subject to many regulations governing the protection of confidential information, financial accountability, data retention, and disaster recovery, among others. They're also under pressure from shareholders, stakeholders, and customers.To..
The California Consumer Privacy Act of 2018 (the “Act”) was signed into law by California Governor Jerry Brown on June 28, 2018. The Act gives consumers” (defined as natural persons who are California residents) specified basic rights in relation to their personal information. The Act requires that companies make certain disclosures to consumers via their privacy policies, or otherwise at the time the perso..
ISO 27001 describes how to manage information security in a company. According to its documentation, ISO 27001 was developed to "provide a model for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an information security management system." By applying ISO 27001 standards effectively in your organization you can ensure robust security for your organization's vital inf..
Successful business continuity planningInvolves the entire organization Requires clear and consistent communication Encompasses how employees will communicate, where they will go and how they will keep doing their jobsPrepares the organization for disruptive eventsWhy is BCP Important? 61% of companies surveyed had to invoke their BCP 43% had to invoke it more than onceKey Causes: Natural Disaster, Power Ou..
A robust Information Security Management System manages and securities information security in a company. Governance, Risk, and Compliance are three areas needed to enhance confidentiality, the integrity of data and availability of data. Protecting your organization's information is critical for the successful management and smooth operation of your organization. A robust Information Security Management Sys..
Antidumping (AD) occurs when foreign manufacturers sell goods in the United States less than fair value, causing injury to the U.S. industry. AD cases are company specific; the duty is calculated to bridge the gap back to fair market value.Countervailing duties (CVD) cases are established when a foreign government provides assistance and subsidies, such as tax breaks to manufacturers that export goods to th..