All Technology articles – Page 19
-
Article
‘Ethical Machines’ breaks down AI ethical risk mitigation planning
It’s only a matter of time before regulators legislate how companies vet artificial intelligence. Ethicist Reid Blackman’s new book, “Ethical Machines,” advises companies on how to implement AI ethical risk mitigation strategies and avoid regulatory, legal, and reputational fallout.
-
Article
Financial crime within the metaverse
The momentum gathering behind the “metaverse”—a universe of virtual worlds built on blockchain technology—should be of keen interest to everyone in the regulation and compliance space, given its potential impact in terms of business, ethics, financial crime, and safety.
-
Article
Survey: Spending on AI, new tech to increase despite known risks
Companies are set to ramp up spending on artificial intelligence and other technologies in the coming years despite expectations of rising legal disputes over its use and implementation, according to a new survey.
-
Article
Experts: How to move forward with the GDPR
Data privacy experts speaking at an industry event believe the mechanisms in place under the General Data Protection Regulation to ensure compliance, enforcement, and redress need revisiting—and quickly.
-
Article
Addressing fraud via social media
Fraud and social media have a special relationship, with the two frequently combining to cause harm, distress, and loss to an enormous number of people.
-
Article
Compliance leadership panel: Current state, future trends, more
Four senior compliance practitioners shared their insights on maintaining an ethical culture, embracing data analytics, determining compliance’s role in measuring ESG metrics, and more as part of a panel discussion at Compliance Week’s National Conference.
-
Article
Factors to consider when implementing risk assessment technology
With the growing demands of huge data sets, an everchanging regulatory landscape, and constantly evolving typologies, the challenge of assessing, documenting, and managing financial crime risk has never been greater.
-
Article
Four years of GDPR: New tech testing data privacy law’s longevity?
It has been four years since the European Union’s flagship data privacy legislation came into force, but concerns are already being raised about whether the General Data Protection Regulation is being outpaced by technological developments and their use of data.
-
Article
Wells Fargo unit fined $7M for AML transaction monitoring failures
For the second time in five years, a subsidiary of Wells Fargo has been charged by the Securities and Exchange Commission with failing to file suspicious activity reports in a timely manner due to deficiencies in the system it used to flag transactions.
-
Resource
Survey Report: How technology enables data protection
A Compliance Week and BRYTER survey analyzed 81 responses from compliance and legal practitioners who ranked data privacy and cybersecurity threats the No. 1 biggest risk entering 2022.
-
Article
Closing the data risk gap: How technology enables data protection
Legal and compliance teams ranked data privacy and cybersecurity threats the No. 1 biggest risk entering 2022. Further survey results reveal roadblocks to organizations’ proactive compliance.
-
Article
Clearview AI fined $22M in Italy over unlawful data collection
Facial image aggregator Clearview AI was fined €20 million (U.S. $22 million) for unlawfully processing the biometric and geolocation data of Italian citizens in violation of privacy laws including the General Data Protection Regulation.
-
Article
Top 10 reasons to attend Compliance Week 2022
A keynote with two SEC commissioners; interactive sessions on global sanctions, ESG, and ethical leadership; and a new conference location and format highlight Dave Lefort’s list of reasons to be excited for CW’s first in-person event in nearly three years.
-
Resource
White paper: How technology can power proactive risk management
Money laundering, cybercrime, corruption, trafficking: These are just a few of the many illegal activities that could be putting your business at risk, especially if you’re using outdated, manual processes.
-
Article
Transparency key to navigating modern employee monitoring risk landscape
The opening session of Compliance Week’s virtual Cyber Risk & Data Privacy Summit addressed the challenges of using technology to monitor employees while considering regulatory and ethical risks.
-
Article
Indictment: China-based Hytera stole trade secrets from Motorola
Hytera Communications allegedly conducted a scheme to systematically steal trade secrets from Motorola Solutions by hiring away Motorola employees who had developed its “walkie-talkie” product line, according to a federal indictment.
-
Premium
Epilogue: What happened to Betsy?
The “patient zero” of fictional private utility company Vulnerable Electric’s ransomware crisis learns her fate.
-
Premium
Chapter 4: Recovery and lessons learned post-ransomware attack
Whether fictional private utility company Vulnerable Electric pays the ransom or not in the aftermath of its cyber incident, the two pathways quickly splinter off in different directions with varied endings, each with important lessons to be learned.
-
Premium
Ransomware case study glossary
The field of cybersecurity features a growing list of terminology to describe the many forms, channels, and motivations behind cyberattacks and hacking culture. Learn further definitions for some key terms featured throughout the ransomware case study.
-
Premium
Chapter 3: Ransomware eradication prompts tough choice: To pay or not to pay?
No matter what, the deck is stacked against fictional private utility company Vulnerable Electric as it weighs whether to pay the $5 million ransom demanded by a cybercriminal who breached its systems. Which path do you take?