Categories
Hidden Traffic Podcast

Updates, News and Resources

In this episode of Hidden Traffic, Gwen Hassan updates listeners on news and resources related to human trafficking. Here are some of the topics she covers:

  • Congratulations to Source Map for being named to Fast Company’s Most Innovative Companies list for their work in clean supply chain and mapping. 
  • Mekong Club’s recent publication of ‘Eight Tips for Brands to Prepare for Germany’s New Due Diligence Act’. Gwen encourages companies doing business in Germany to read the tips, which provide practical steps for compliance. 
  • Recent changes to the Global Fund to End Modern Slavery (GFEMS), including their new toolkit, which was developed in partnership with the National Survivor Network. The toolkit “provides practical tools for organizations to become more inclusive of human trafficking and modern slavery survivors in their approaches,” Gwen remarks.
  • A recent New York Times article entitled ‘Alone and Exploited’ highlights the prevalence of child labor in the US. The article discusses cases of child workers as young as 12 years old working in subcontractors of major companies such as Walmart and Target. 
  • Gwen discusses a new law in Arkansas that makes it easier for employers to employ children. She expresses concern about the potential for this law to exacerbate the problem of child labor and human trafficking in the US. She urges listeners to be aware of the issue and to support efforts to combat it.
  • “Bottom line,” Gwen points out, “is the prevalence of modern slavery and human trafficking within the United States continues to be even more serious and large than we believed originally…”

 

Resources:

Source Map

Fast Company – Most Innovative Companies

Mekong Club – Eight Tips for Brands to Prepare for Germany’s New Due Diligence Act

Global Fund to End Modern Slavery

National Survivor Network 

Meaningful Engagement of People With Lived Experience toolkit

New York Times – Alone and Exploited

Categories
Presidential Leadership Lessons for the Business Executive

Leadership Lessons from Presidents of the Republic of Texas – Sam Houston, Second Term

Presidential Leadership Lessons is a podcast hosted by Tom Fox. This continues a four-part series on leadership lessons not from US Presidents but from Presidents from the Republic of Texas, from 1836 to 1845. In this series, Tom is joined by Don Frazier, head of the Texas Center at Schreiner University in Kerrville TX to discuss the four Presidents who led Texas when it was a country. In this fourth episode, Tom and Don discuss the second term of Sam Houston.

In the second term of President Sam Houston, he was leading the Republic of Texas through a critical period of financial challenges. Don references the Texas Rangers, a defensive group established in 1823 which later became a paramilitary force during Houston’s tenure, and highlights the major impact the presence of the plantation south had on the US wanting to annex Texas. Ultimately, it was President Houston who was able to put things back on a level ground, allowing Texas to be annexed to the US and fly the U.S. flag. Don shares how he was able to ‘pull it off’ with the help of President Tyler and finally, President Polk who ‘poked the fish’ and finalized the annexation. Hear more interesting tidbits about Houston’s Presidency and related leadership lessons on the ‘Presidential Leadership Lessons’ podcast.

Key Highlights

The Challenges Faced by Sam Houston in His Second Term of Office in the Republic of Texas [00:35]

The History of the Texas Rangers [4:22]

The Annexation of Texas and the Mexican-American War [8:41]

The Benefits of Texas Annexation to the United States [12:45]

A Successful Fishing Trip and the Annexation of Texas 16:50]

Notable Quotes

1.         “Texas did not retain the right to succeed. They had they retain the right to divide into multiple states at some future date.”

2.         “The Republic of Texas is in dire straits.  It is going to go into complete default and economic collapse. You can’t get any financial backing to speak of. There’s lots of attempts, but there’s not a lot of people buying into the Texas dream. Most Texans are still wanting to be Americans and not Texans.”

3.         “What we’ll do is we’ll have officers that are on the payroll and then what they will do is they will fill out their ranks with volunteers that are providing their own weapons and stuff, and we’ll figure out how to settle up with them later. That’s where you start seeing people like Samuel Walker. People like Jack Hayes. These guys start showing up and they begin the regularization, the professionalization of the Rangers as a quasi-military force to essentially skirmish with the Comanches.”

4.         “So Indianola is the really, the big port in the Republic of Texas period. Galveston is shallow and they haven’t done a whole lot of improvements. He gives you the gateway to Matagorda. Matagorda gives you the gateway to San Antonio, gives you gateway to the San Antonio River Valley, the Guadalupe River Valley.”

Resources:

Don Frazier, Director The Texas Center

The Texas Center at Schreiner University

Categories
Daily Compliance News

March 31, 2023 – The Binance CCO Edition

Welcome to the Daily Compliance News. Each day, Tom Fox, the Voice of Compliance, brings you compliance-related stories to start your day. Sit back, enjoy a cup of morning coffee, and listen to the Daily Compliance News. All from the Compliance Podcast Network. Each day we consider four stories from the business world, compliance, ethics, risk management, leadership, or general interest for the compliance professional.

Stories we are following in today’s edition of Daily Compliance News:

· Binance CCO at the center of SEC charges. (WSJ)

· Ecuador President to face corruption charges. (FT)

· Tokyo Olympic corruption scandal is still causing Japan headaches. (NYT)

· West can help Ukraine rein in corruption. (Reuters)

Categories
Daily Compliance News

March 30, 2023 – The Retaliation Edition

Welcome to the Daily Compliance News. Each day, Tom Fox, the Voice of Compliance, brings you compliance-related stories to start your day. Sit back, enjoy a cup of morning coffee, and listen to the Daily Compliance News. All from the Compliance Podcast Network. Each day we consider four stories from the business world, compliance, ethics, risk management, leadership, or general interest for the compliance professional.

Stories we are following in today’s edition of Daily Compliance News:

·       Exxon climate foes hacked.  (WSJ)

·       Only bad employees are fired.  (NPR)

·       TikTok tracks geo-locations. (TechTheLead)

·       Companies urged to take stock of their climate damage. (WSJ)

Categories
Blog

Coming Conflict with China-Business Challenges and Responses: Cyber Spying and IP Theft

In the short span of the 21st Century, the world’s two top powers, the United States and China, have moved inexplicably toward a showdown. This evolved from a commercial competition into something more akin to permanent non-kinetic warfare. What does this mean for US business doing business in and with China? For this special 5-part blog post series, I visited with Brandon Daniels, President of Exiger, to explore issues diverse as a real danger, supply chain, exports, cyber-attacks, and IP theft from the business perspective and give the compliance and business executive their viewpoints on what you can do to not only prepare your company but protect it as well. In Part III, we consider export issues of US companies and rebalancing the global economy.

As tensions between the US and China continue to grow, so too does the threat of cyber espionage and intellectual property theft. According to the Pentagon, China-linked economic espionage cases have jumped 1300% over the past decade, and nearly half of all counterintelligence cases now involve China. Daniels sheds light on how China is stealing American Intellectual Property (IP) through intelligence services, nontraditional developers, academic partnerships, and hidden ownership of companies in the supply chain.

We not only consider the extent of China’s IP theft but provide some concrete steps for American companies to protect their crown jewels and seek recourse if they become the victim of cyber espionage. With trillions of dollars at stake, the US companies can no longer afford to be unprepared.

Here are some steps you can take for protection.:

  1. Protecting crown jewels by having stricter, more active and proactive containment of technologies that are subject to export control laws.
  2. Monitoring and identifying where there could be IP leakage through better due diligence of vendor and customer ecosystems.
  3. Taking aggressive action to show China that any IP theft will be discouraged and the company will be remunerated for it.
  1. More active and proactive containment of technologies

The first step to protecting your organization’s crown jewels from China’s non-kinetic warfare is to have stricter, more active, and proactive containment of technologies subject to export control laws. This means that public companies need to understand what are their “crown jewels” and how to protect them. They should be more aware of who their suppliers and customers are, and where those technologies are going. Your organization needs to be willing to call out and enforce international trade violations. This requires better due diligence when it comes to their vendor ecosystems, customer ecosystems, and where your organization is buying their technology from. Companies also need to ensure that they have contractual clauses around confidentiality and exposing information so that they can have legal recourse if their intellectual property is stolen. Finally, they should be willing to get serious and aggressive to show China that they will be remunerated for taking their IP.

  1. Monitoring and identifying IP leakage

Monitoring and identifying where there could be IP leakage through better due diligence of vendor and customer ecosystems is a critical step in protecting intellectual property (IP) from theft. To begin this process, companies must understand their supply chain and customer ecosystem(s) to identify any potential areas of vulnerability. Companies should consider conducting background checks on their vendors, as well as tracking and monitoring the movements of their customer data and products. Additionally, companies should be aware of any suspicious activity in their customer and vendor ecosystems and take steps to protect against any potential IP theft.

Companies should be aware of any trade regulations or laws that could be applicable to their products, and take the necessary steps to ensure they are compliant. Additionally, they should consider utilizing insurance or other risk mitigation methods to reduce the potential of IP leakage or theft. Finally, companies should be prepared to take legal action to enforce their IP rights if necessary. This could involve filing lawsuits or engaging in international trade court proceedings to seek remedies for any IP violations. By monitoring and identifying areas of potential IP leakage, companies can better protect their IP and ensure that it is not stolen or misused.

  1. Take aggressive action

Taking aggressive action to show China that any IP theft will be discouraged and the company will be remunerated for it. In other words, use the Rule of Law to not only protect your IP but also aggressively go after any IP theft through civil litigation. This all starts with protecting your crown jewels, which means having stricter containment of technologies that are subject to export control laws, and specifically doing this with regard to China. Companies should also monitor and identify potential areas of IP leakage, such as suppliers, customers and vendors, and perform better due diligence to ensure that the technology is not falling into the wrong hands. Finally, companies should not be afraid to take their cases to court. For example, Tang Energy Group successfully sued Aviation Industry Corp. of China, or AVIC for stealing their wind turbine technology and won a settlement in the tens of millions of dollars. By taking legal action, companies can demonstrate to China that any IP theft will not be tolerated and that they will be held accountable for their actions.

The threat of cyber espionage and intellectual property theft from China is real, and companies need to be aware of the implications and take action to protect their crown jewels. Companies should consider a three-step plan for protecting their IP and seeking recourse if it is stolen, including stricter containment of technologies that are subject to export control laws, monitoring and identifying potential areas of IP leakage, and taking aggressive action to show China that any IP theft will not be tolerated and will be remunerated. With the right steps in place, companies can protect their IP and ensure it is not stolen or misused. Take control of your IP today!

For a deeper dive into these issues, check out the 5-part podcast series with Tom Fox and Brandon Daniels, here.

Categories
Uncovering Hidden Risks

Ep 6 – Three Steps to Build a Comprehensive Data Security Strategy

Raman Kalyan, Director of Product Marketing, Microsoft and former podcast host, joins Erica Toelle and guest host Liz Willets on this week’s episode of Uncovering Hidden Risks. Raman’s team leads product marketing initiatives to increase broad enterprise adoption and awareness of Microsoft 365 Risk Management and Investigation solution categories while partnering closely with leaders across engineering, planning, and strategy teams to determine and recommend critical product/service investments. Raman discusses why a comprehensive data security approach is an essential consideration for companies, how to implement an effective data security strategy, and what he sees as the future of the data security space.

In This Episode, You Will Learn:
  • What it means to have a comprehensive data security approach
  • How you can leverage insights from risky insider activities
  • Why comprehensive data security should matter
Some Questions We Ask:
  • What does an end-to-end data protection strategy look like?
  • How do you balance data security without hindering employee productivity?
  • When should teams get started on their data security strategy?
Resources:

View Raman Kalyan on LinkedIn

View Liz Willets on LinkedIn

View Erica Toelle on LinkedIn

Related Microsoft Podcasts:          

Listen to: Afternoon Cyber Tea with Ann Johnson 

Listen to: Security Unlocked

Listen to: Security Unlocked: CISO Series with Bret Arsenault

Categories
31 Days to More Effective Compliance Programs

One Month to a More Effective Compliance Program for Business Ventures – Distributor Liability Under the FCPA

Three enforcement actions made clear that there were no distinctions between agents and distributors. They were the Smith & Nephew, Inc., Oracle (2012 and 2022), and Eli Lilly and Company. Each of these enforcement actions had different FCPA violations, and they each revealed separate steps a company should take to prevent and detect FCPA violations in their company.

These three separate bribery schemes call for three different but overlapping responses. The Lilly enforcement action also makes clear the need for internal audits to follow up with ongoing monitoring and auditing. Internal audit can help determine the reasonableness of a commission rate outside the accepted corporate norm. The 2012 and 2022 Oracle enforcement actions demonstrated that Oracle needed to institute the proper controls to prevent its employees at Oracle India from creating and misusing the parked funds in the distributor’s account. The Company needed to audit and compare the distributor’s margin against the end user price to ensure excess margins were not being built into the pricing structure. Smith & Nephew did not perform sufficient due diligence on these distributors, nor did they document any.

Further, the distributor was domiciled in a location separate and apart, the UK, from the sole location it was designed to deliver products or services into, Greece. This clearly demonstrated that the entities were used for a purpose the company wished to hide from Greek authorities. While it is true that a distributor might sell products in a country different than its domicile, if the products are going into a single country, this should have raised several Red Flags.

Three Key Takeaways:

  1. Use auditing and monitoring.
  2. Distributors will be treated the same as other business ventures.
  3. Robust due diligence must be performed.
Categories
Coming Conflict with China

Coming Conflict with China: Part 3 – Exports and Rebalancing the Global Economy

In the short span of the 21st Century, the world’s top powers, the United States and China, have moved inexplicably toward a showdown. This evolved from a commercial competition into something more akin to permanent non-kinetic warfare. What does this mean for US business doing business in and with China? In this special 5-part series, Tom Fox and Brandon Daniels, CEO of Exiger, a leading global third-party and supply chain management software company, explore issues diverse as a real danger, supply chain, exports, cyber-attacks, and IP theft from the business perspective and give the compliance and business executive their viewpoints on what you can do to not only prepare your company but protect it as well. In Part III, we consider issues related to US exports to China and markets for US products if the China market is closed off to US companies.

The US-China conflict is intensifying, and as a result, businesses that export to China are feeling the strain. US companies exported nearly $149 billion worth of goods to China, but China still exports over $400 billion to the US. Do these trade deficits still matter? What happens when your biggest customer is no longer available? How do you go about finding new markets and reshoring customers? Join us as we explore this and other export issues in Part 3 of this special five-part series.

Key Highlights:

1. The importance of balancing the US-China economic relationship in light of the current crisis.
2. How does a business consider customer location an existential risk?
3. The potential for global economic rebalancing through collaboration between democracies.

Notable Quote

“We have to figure out how to make this a global market and ensure that this doesn’t just become some sort of nationalistic retrenchment.”
Resources

Exiger

Tom Fox

Connect with me on the following sites:

Instagram

Facebook

YouTube

Twitter

LinkedIn

Other episodes in this Series:
Episode 1-From Potential Conflict to Real Danger

Episode 2-Supply Chain Issues

Categories
The Hill Country Podcast

Peggy Vesper on Painting Hill Country Landscapes

Welcome to award-winning The Hill Country Podcast. The Texas Hill Country is one of the most beautiful places on earth. In this podcast, Hill Country resident Tom Fox visits with the people and organizations that make this the most unique areas of Texas. Join Tom as he explores the people, places and their activities of the Texas Hill Country.  In this episode, host Tom Fox visits Utopia artist Peggy Vesper.

Tom explores with Peggy her journey to Utopia, Texas and how she found her passion for painting. She explains how she began painting with acrylic since she is a fast painter and likes to work quickly. She shares her experiences painting pet portraits and later exploring the vibrant art community in Utopia, Texas. Peggy reveals how she began to focus on the views of the landscape in the Hill Country. Lastly, we learn about Peggy’s daughter following her dreams and majoring in fine arts. Don’t forget to check out Peggy Best’s website for updates on upcoming shows.

 Key Highlights

The Appeal of Utopia

Managing Stress Through Art: A Journey to Finding Creative Release with Acrylic Painting

The Art Scene and Community in Utopia, Texas

The Art of Painting Landscapes: Peggy’s Unique Approach

The Power of Encouraging Dreams in a Supportive Environment

Sharing Artwork on Social Media

 Notable Quotes 

1.     “I just set up a little table and started doing pet portraits.”

2.     “I had several friends that I made by going to the shows and artists that, you know, would give me tips and such. And I thought they have the most incredible life.”

3.     “And I love the acrylic. Because I paint quickly and I am not a patient person. o I loved it because all of a sudden you made a mistake, you could just do it over again, ma’am.”

 Resources

Peggy Vesper

Categories
FCPA Compliance Report

Khayot Salijanov – Compliance in Uzbekistan

Welcome to the award-winning FCPA Compliance Report, the longest-running podcast in compliance. In this episode, I am joined by Khayot Salijanov, a Master’s Degree candidate at the University of Pittsburgh. He is originally from Uzbekistan, and we discuss compliance in emerging markets. We discussed the history of compliance and corruption in Uzbekistan and the government’s steps to increase compliance through laws like public procurement and creating an anti-corruption agency. Khayot then provides insight into the two biggest challenges faced in 2020, communication and conducting effective investigations, as well as emphasizing the importance of leadership buy-in. Finally, Khayot suggests that to start a management consulting career; one should focus on creating relationships and ownership, creating value, and gaining leadership buy-in. 

Key Highlights

·      The History of Compliance In Uzbekistan

·      Protecting Yourself When Doing Business in Uzbekistan

·      The Importance of Leadership Involvement in Creating a Robust Compliance Program

·      Creating Business Value Through Compliance Programs

 Notable Quotes

·      “And also it has a good program, a good tailored program, including ethics and risk management also sustainable business issues, which I’m interested in because I think sustainable business is part of compliance.”

·      “It’s essential to create family-based ownership to achieve success.”

·      “The government’s anti-corruption and anti-bribery policy has changed drastically.”

·      “Absolutely. Thank you for inviting and having me, Thomas. I have a lot of things to tell our listeners about Uzbekistan, specifically about compliance.”

·      “These events mark the beginning of designing and implementing corporate compliance standards in the private sector.”

Resources

Khayot Salijanov on LinkedIn

Tom

Instagram

Facebook

YouTube

Twitter

LinkedIn