- Sample Forms, Policies, and Contracts
While the Cybersecurity Regulations require several technical controls (e.g., monitoring network activity and implementing multi-factor authentication and encryption), most of the requirements involve instituting information governance (“IG”) practices and structures to manage cyber risks. In the following, we set out five steps which address the key IG issues and requirements that can help your organization come into compliance with the Cybersecurity Regulations.
- ArticlesTop Ten Things Every Government Contractor Should Know About Post-Government Employment and “Revolving Door” Restrictions (US)
Before even beginning to discuss employment with a government employee, contractors should understand the statutory and regulatory restrictions, as well as the significant penalties that may result from violating those restrictions. Read this list of helpful pointers to learn more.
- ArticlesEqual Pay Day 2016 in the United States: What Employers Need To Know To Comply With Recent Laws Designed To Decrease The Wage Gap Between Men And Women
Pay equality between men and women demands an employer's attention now more than ever. In the United States, both federal and state governments have enacted strict laws and regulations to close the wage gap between men and women. This Quick Overview will share advice to maintain compliance.