Categories
31 Days to More Effective Compliance Programs

One Month to a More Effective Compliance Program for Business Ventures-Why Business Ventures are Different than 3rd Parties

Business ventures, whether JVs, partnerships, franchises, team agreements, strategic alliances or one of the myriad types of business relationships a U.S. company can form outside the U.S., are different than the usual risk presented by third-parties under compliance requirements such as those mandated by the FCPA. The problems for companies is that they tend to treat business venture risk the same as third-party risk. They are different and must be managed differently.

The bottom line is that may compliance practitioners have not thought through the specific risks of business ventures such as JVs, franchises, strategic alliances, teaming partner or others as opposed to sales agents or representatives on the sales side of the business. I hope that this will help facilitate a discussion that maybe people will begin to think about more of the issues, more of the risk parameters and perhaps put a better risk management strategy in place.
Three key takeaways:

  1. Business ventures bring different FCPA risks from third-parties.
  2. JVs have both external compliance risks and corporate governance risks.
  3. Use your full compliance tool kit for business ventures in managing the FCPA risk for franchises.
Categories
Coming Conflict with China

Coming Conflict with China: Part 4 – Cyber Spying and IP Theft

In the short span of the 21st Century, the world’s two top powers, the United States and China, have moved inexplicably toward a showdown. This evolved from a commercial competition into something more akin to permanent non-kinetic warfare. What does this mean for US business doing business in and with China? In this special 5-part Series, Tom Fox and Brandon Daniels, CEO of Exiger, a leading global third-party and supply chain management software company, explore issues diverse as a real danger, supply chain, exports, cyber-attacks, and IP theft from the business perspective and give the compliance and business executive their viewpoints on what you can do to not only prepare your company but protect it as well. In Part IV, China’s aggressive tactics to steal intellectual property, we consider the responses to protect the US’s IP and how to take aggressive action against the Chinese government to seek remuneration for stolen assets.

What are China’s aggressive tactics in stealing intellectual property from countries all over the world? Through intelligence gathering, academic partnerships, and supply chain buyouts, China has managed to copy and counterfeit American business products and other technologies. Companies must harden their defenses and refuse to stand for IP theft by using the Rule of Law to take a stand against the theft of US intellectual property. Through a concerted effort, companies can fight back and reclaim their assets.

Key Highlights:

1. How is China aggressively stealing intellectual property and technology?

  1. How is counterfeiting built into the Chinese economic model?
  2. Why is the Rule of Law a critical recourse for companies whose intellectual property is stolen by China?

Notable Quote

“We foment innovation everywhere; anyone, anywhere, can be an innovator, can invent, and can end up getting the rewards from that.”

Resources

Exiger

Tom Fox

Connect with me on the following sites:

Instagram

Facebook

YouTube

Twitter

LinkedIn

Other episodes in this Series:
Episode 1-From Potential Conflict to Real Danger

Episode 2-Supply Chain Issues

Episode 3-Exports and Rebalancing the Global Economy

Categories
Hidden Traffic Podcast

Updates, News and Resources

In this episode of Hidden Traffic, Gwen Hassan updates listeners on news and resources related to human trafficking. Here are some of the topics she covers:

  • Congratulations to Source Map for being named to Fast Company’s Most Innovative Companies list for their work in clean supply chain and mapping. 
  • Mekong Club’s recent publication of ‘Eight Tips for Brands to Prepare for Germany’s New Due Diligence Act’. Gwen encourages companies doing business in Germany to read the tips, which provide practical steps for compliance. 
  • Recent changes to the Global Fund to End Modern Slavery (GFEMS), including their new toolkit, which was developed in partnership with the National Survivor Network. The toolkit “provides practical tools for organizations to become more inclusive of human trafficking and modern slavery survivors in their approaches,” Gwen remarks.
  • A recent New York Times article entitled ‘Alone and Exploited’ highlights the prevalence of child labor in the US. The article discusses cases of child workers as young as 12 years old working in subcontractors of major companies such as Walmart and Target. 
  • Gwen discusses a new law in Arkansas that makes it easier for employers to employ children. She expresses concern about the potential for this law to exacerbate the problem of child labor and human trafficking in the US. She urges listeners to be aware of the issue and to support efforts to combat it.
  • “Bottom line,” Gwen points out, “is the prevalence of modern slavery and human trafficking within the United States continues to be even more serious and large than we believed originally…”

 

Resources:

Source Map

Fast Company – Most Innovative Companies

Mekong Club – Eight Tips for Brands to Prepare for Germany’s New Due Diligence Act

Global Fund to End Modern Slavery

National Survivor Network 

Meaningful Engagement of People With Lived Experience toolkit

New York Times – Alone and Exploited

Categories
Presidential Leadership Lessons for the Business Executive

Leadership Lessons from Presidents of the Republic of Texas – Sam Houston, Second Term

Presidential Leadership Lessons is a podcast hosted by Tom Fox. This continues a four-part series on leadership lessons not from US Presidents but from Presidents from the Republic of Texas, from 1836 to 1845. In this series, Tom is joined by Don Frazier, head of the Texas Center at Schreiner University in Kerrville TX to discuss the four Presidents who led Texas when it was a country. In this fourth episode, Tom and Don discuss the second term of Sam Houston.

In the second term of President Sam Houston, he was leading the Republic of Texas through a critical period of financial challenges. Don references the Texas Rangers, a defensive group established in 1823 which later became a paramilitary force during Houston’s tenure, and highlights the major impact the presence of the plantation south had on the US wanting to annex Texas. Ultimately, it was President Houston who was able to put things back on a level ground, allowing Texas to be annexed to the US and fly the U.S. flag. Don shares how he was able to ‘pull it off’ with the help of President Tyler and finally, President Polk who ‘poked the fish’ and finalized the annexation. Hear more interesting tidbits about Houston’s Presidency and related leadership lessons on the ‘Presidential Leadership Lessons’ podcast.

Key Highlights

The Challenges Faced by Sam Houston in His Second Term of Office in the Republic of Texas [00:35]

The History of the Texas Rangers [4:22]

The Annexation of Texas and the Mexican-American War [8:41]

The Benefits of Texas Annexation to the United States [12:45]

A Successful Fishing Trip and the Annexation of Texas 16:50]

Notable Quotes

1.         “Texas did not retain the right to succeed. They had they retain the right to divide into multiple states at some future date.”

2.         “The Republic of Texas is in dire straits.  It is going to go into complete default and economic collapse. You can’t get any financial backing to speak of. There’s lots of attempts, but there’s not a lot of people buying into the Texas dream. Most Texans are still wanting to be Americans and not Texans.”

3.         “What we’ll do is we’ll have officers that are on the payroll and then what they will do is they will fill out their ranks with volunteers that are providing their own weapons and stuff, and we’ll figure out how to settle up with them later. That’s where you start seeing people like Samuel Walker. People like Jack Hayes. These guys start showing up and they begin the regularization, the professionalization of the Rangers as a quasi-military force to essentially skirmish with the Comanches.”

4.         “So Indianola is the really, the big port in the Republic of Texas period. Galveston is shallow and they haven’t done a whole lot of improvements. He gives you the gateway to Matagorda. Matagorda gives you the gateway to San Antonio, gives you gateway to the San Antonio River Valley, the Guadalupe River Valley.”

Resources:

Don Frazier, Director The Texas Center

The Texas Center at Schreiner University

Categories
Daily Compliance News

March 31, 2023 – The Binance CCO Edition

Welcome to the Daily Compliance News. Each day, Tom Fox, the Voice of Compliance, brings you compliance-related stories to start your day. Sit back, enjoy a cup of morning coffee, and listen to the Daily Compliance News. All from the Compliance Podcast Network. Each day we consider four stories from the business world, compliance, ethics, risk management, leadership, or general interest for the compliance professional.

Stories we are following in today’s edition of Daily Compliance News:

· Binance CCO at the center of SEC charges. (WSJ)

· Ecuador President to face corruption charges. (FT)

· Tokyo Olympic corruption scandal is still causing Japan headaches. (NYT)

· West can help Ukraine rein in corruption. (Reuters)

Categories
Daily Compliance News

March 30, 2023 – The Retaliation Edition

Welcome to the Daily Compliance News. Each day, Tom Fox, the Voice of Compliance, brings you compliance-related stories to start your day. Sit back, enjoy a cup of morning coffee, and listen to the Daily Compliance News. All from the Compliance Podcast Network. Each day we consider four stories from the business world, compliance, ethics, risk management, leadership, or general interest for the compliance professional.

Stories we are following in today’s edition of Daily Compliance News:

·       Exxon climate foes hacked.  (WSJ)

·       Only bad employees are fired.  (NPR)

·       TikTok tracks geo-locations. (TechTheLead)

·       Companies urged to take stock of their climate damage. (WSJ)

Categories
Blog

Coming Conflict with China-Business Challenges and Responses: Cyber Spying and IP Theft

In the short span of the 21st Century, the world’s two top powers, the United States and China, have moved inexplicably toward a showdown. This evolved from a commercial competition into something more akin to permanent non-kinetic warfare. What does this mean for US business doing business in and with China? For this special 5-part blog post series, I visited with Brandon Daniels, President of Exiger, to explore issues diverse as a real danger, supply chain, exports, cyber-attacks, and IP theft from the business perspective and give the compliance and business executive their viewpoints on what you can do to not only prepare your company but protect it as well. In Part III, we consider export issues of US companies and rebalancing the global economy.

As tensions between the US and China continue to grow, so too does the threat of cyber espionage and intellectual property theft. According to the Pentagon, China-linked economic espionage cases have jumped 1300% over the past decade, and nearly half of all counterintelligence cases now involve China. Daniels sheds light on how China is stealing American Intellectual Property (IP) through intelligence services, nontraditional developers, academic partnerships, and hidden ownership of companies in the supply chain.

We not only consider the extent of China’s IP theft but provide some concrete steps for American companies to protect their crown jewels and seek recourse if they become the victim of cyber espionage. With trillions of dollars at stake, the US companies can no longer afford to be unprepared.

Here are some steps you can take for protection.:

  1. Protecting crown jewels by having stricter, more active and proactive containment of technologies that are subject to export control laws.
  2. Monitoring and identifying where there could be IP leakage through better due diligence of vendor and customer ecosystems.
  3. Taking aggressive action to show China that any IP theft will be discouraged and the company will be remunerated for it.
  1. More active and proactive containment of technologies

The first step to protecting your organization’s crown jewels from China’s non-kinetic warfare is to have stricter, more active, and proactive containment of technologies subject to export control laws. This means that public companies need to understand what are their “crown jewels” and how to protect them. They should be more aware of who their suppliers and customers are, and where those technologies are going. Your organization needs to be willing to call out and enforce international trade violations. This requires better due diligence when it comes to their vendor ecosystems, customer ecosystems, and where your organization is buying their technology from. Companies also need to ensure that they have contractual clauses around confidentiality and exposing information so that they can have legal recourse if their intellectual property is stolen. Finally, they should be willing to get serious and aggressive to show China that they will be remunerated for taking their IP.

  1. Monitoring and identifying IP leakage

Monitoring and identifying where there could be IP leakage through better due diligence of vendor and customer ecosystems is a critical step in protecting intellectual property (IP) from theft. To begin this process, companies must understand their supply chain and customer ecosystem(s) to identify any potential areas of vulnerability. Companies should consider conducting background checks on their vendors, as well as tracking and monitoring the movements of their customer data and products. Additionally, companies should be aware of any suspicious activity in their customer and vendor ecosystems and take steps to protect against any potential IP theft.

Companies should be aware of any trade regulations or laws that could be applicable to their products, and take the necessary steps to ensure they are compliant. Additionally, they should consider utilizing insurance or other risk mitigation methods to reduce the potential of IP leakage or theft. Finally, companies should be prepared to take legal action to enforce their IP rights if necessary. This could involve filing lawsuits or engaging in international trade court proceedings to seek remedies for any IP violations. By monitoring and identifying areas of potential IP leakage, companies can better protect their IP and ensure that it is not stolen or misused.

  1. Take aggressive action

Taking aggressive action to show China that any IP theft will be discouraged and the company will be remunerated for it. In other words, use the Rule of Law to not only protect your IP but also aggressively go after any IP theft through civil litigation. This all starts with protecting your crown jewels, which means having stricter containment of technologies that are subject to export control laws, and specifically doing this with regard to China. Companies should also monitor and identify potential areas of IP leakage, such as suppliers, customers and vendors, and perform better due diligence to ensure that the technology is not falling into the wrong hands. Finally, companies should not be afraid to take their cases to court. For example, Tang Energy Group successfully sued Aviation Industry Corp. of China, or AVIC for stealing their wind turbine technology and won a settlement in the tens of millions of dollars. By taking legal action, companies can demonstrate to China that any IP theft will not be tolerated and that they will be held accountable for their actions.

The threat of cyber espionage and intellectual property theft from China is real, and companies need to be aware of the implications and take action to protect their crown jewels. Companies should consider a three-step plan for protecting their IP and seeking recourse if it is stolen, including stricter containment of technologies that are subject to export control laws, monitoring and identifying potential areas of IP leakage, and taking aggressive action to show China that any IP theft will not be tolerated and will be remunerated. With the right steps in place, companies can protect their IP and ensure it is not stolen or misused. Take control of your IP today!

For a deeper dive into these issues, check out the 5-part podcast series with Tom Fox and Brandon Daniels, here.