A Leer, A Pat, A Joke, A Gesture, An Innuendo, A Kiss: Are You Prepared To Be the Next Social Media Blitz, Identified on #MeToo, or a Headline in the Newspaper?
Harvey Weinstein, Matt Lauer, Charlie Rose, Al Franken, Garrison Keillor, members of Congress, and various State lawmakers have been accused of sexual harassment and/or sexual assault. But there is a difference between pulling one’s pants down in front of a female colleague at work and touching a woman on her buttocks during a photo op—isn’t there? What is that difference? Are both examples considered sexua..
Privacy Management PII is a must today. Clients, employees and other stakeholders expect their information to be held private when given to an organization. This is even in the face of breach. ISO/IEC covers establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002. Personally identifi..
IT governance (ITG) is defined as the processes that ensure the effective and efficient use of IT in enabling an organization to achieve its goals. Organizations today are subject to many regulations governing the protection of confidential information, financial accountability, data retention, and disaster recovery, among others. They're also under pressure from shareholders, stakeholders, and customers.To..
Protecting your organization's information is critical for the successful management and smooth operation of your organization. Utilizing information security management systems aid your organization in managing and protecting your valuable data and information assets. They not only help to keep your confidential information secure but also provide customers and stakeholders with confidence in your risk man..
This webinar examines the scope and nature of employee dishonesty and explains the risks to employers and organizations of all types. It goes on to deal with the practical aspects of prevention and response to victimization, as well as balancing the need to assure that corrective and deterrent programs and policies do not unduly interfere with normal operations and opportunities and do not generate other ma..
Antidumping (AD) occurs when foreign manufacturers sell goods in the United States less than fair value, causing injury to the U.S. industry. AD cases are company specific; the duty is calculated to bridge the gap back to fair market value.Countervailing duties (CVD) cases are established when a foreign government provides assistance and subsidies, such as tax breaks to manufacturers that export goods to th..