Countdown to GDPR Compliance is a complimentary webinar that I will be moderating on Thursday, December 7, 2017, at 12:00 PM Central. This is the second webinar in a three-part series sponsored by Mackrell International and will focus on Compliance for Non-EU Companies. You don't want to miss it! Moderator: Shawn Tuma Presenter: Marta Stephanian, … Continue reading Complimentary Webinar: Countdown to #GDPR – Compliance for Non-EU Companies
I thought you may like an invitation to attend two complimentary webinars that I will be doing this coming week: YOURS, MINE, OURS: Protecting the Data Gathered and Exchanged in Litigation, Association of Certified E-Discovery Specialists (ACEDS) Monday, August 7, 2017 @ 12:00 CDT LINK for more information FULL VIDEO (see below) Securing IoT Data: Compliance, … Continue reading Invitation for 2 Webinars: Protecting Data Exchanged in Discovery and Securing IoT Data
Now that the WannaCry ransomware has your attention and the attention of everybody else, it is time to start thinking about your company's cybersecurity legal and compliance obligations. Do you know whether your company will be impacted by New York's expansive and global reaching Cybersecurity Regulations? The new Regulations govern many companies that do business … Continue reading Webinar: Global reaching Cybersecurity Regulations in New York, will they impact your company?
The National Labor Relations Board (NLRB) has continued its assault on businesses and their ability to legitimately protect their computer systems and information against unauthorized non-business use by employees. A few weeks ago, I wrote 3 Important Points on Computer Policies in which I stressed (1) why your company must have them but (2) that … Continue reading Computer Use Policies – Are Your Company’s Illegal According to the NLRB?
IMPORTANT POINT #1: YOUR BUSINESS MUST HAVE A COMPUTER USE POLICY IN PLACE Computer Use Policies (or Acceptable Use Policies, as they are often referred to) are must haves for today's businesses. Such policies are a foundational component in how a business creates a culture of security with its workforce by establishing expectations on what are … Continue reading 3 Important Points on Computer Use Policies