A coalition of House Democrats is calling for an investigation into two top Justice Department officials, arguing they violated the code of conduct in taking actions on cases in which they were previously involved. Rep. Dan Goldman (D-N.Y.), along with six other members, asked Department of ...
To the extent that the company uses AI and similar technologies in its business or as part of its compliance program, are controls in place to monitor and ensure its trustworthiness, reliability, and use in compliance with applicable law and the company’s code of conduct? How is accountability...
Third Parties:The Guide highlighted that companies will be held liable for the conduct of their third parties, including agents, independent contractors, and consultants. The Guide emphasized that companies that are aware of the probability of misconduct may be held liable even if they do not posse...
To the extent that the company uses AI and similar technologies in its business or as part of its compliance program, are controls in place to monitor and ensure its trustworthiness, reliability and use in compliance with applicable law and the company's code of conduct? Do controls exist...
Train the directors, officers, and employees of newly acquired businesses or merged entities, and when appropriate, train agents and business partners, on the FCPA and other relevant anti-corruption laws and the company's code of conduct and compliance policies and procedures; ...
The new guidelines do not, however, provide significant details about the circumstances under which these types of conduct likely violate the antitrust laws, nor do they identify any principles that would guide the agencies' decisions about when to bring an enforcement action. Instead, the ...
Cryptography has been used for thousands of years to code messages and is still widely used to protect credit cards, ecommerce sites, and passwords. Cyber privateering A method governments and private organizations use to hire professional hackers or even criminal hacking groups to conduct espionage...
Confidential Reporting –All companies should implement an efficient and trusted mechanism by which employees can anonymously or confidentially report allegations of a breach of the company’s code of conduct, company policies, or suspected or actual misconduct. Additionally, prosecutors are encouraged to...
"North Korean IT workers have copied company code repositories, such as GitHub, to their own user profiles and personal cloud accounts. While not uncommon among software developers, this activity represents a large-scale risk of theft of company code," theFBI wrote in the alert. ...
"The court left to the district court on remand the task of fashioning an appropriate decree to remedy the effects of Microsoft's unlawful conduct and restore competition, to the extent possible," the brief states. "It is time for that process to go forward." ...