Categories
Compliance Tip of the Day

Compliance Tip of the Day – Design Objectives for Compliance Training

Welcome to “Compliance Tip of the Day,” the podcast where we bring you daily insights and practical advice on navigating the ever-evolving landscape of compliance and regulatory requirements. Whether you’re a seasoned compliance professional or just starting your journey, we aim to provide bite-sized, actionable tips to help you stay on top of your compliance game. Join us as we explore the latest industry trends, share best practices, and demystify complex compliance issues to keep your organization on the right side of the law. Tune in daily for your dose of compliance wisdom, and let’s make compliance a little less daunting, one tip at a time.

What are the design objectives for your compliance training program?

For more on this topic, check out The Compliance Handbook, a Guide to Operationalizing Your Compliance Program, 6th Edition, which was recently released by LexisNexis and is available here.

Categories
Compliance Tip of the Day

Compliance Tip of the Day – Terminating Third Parties

Welcome to “Compliance Tip of the Day,” the podcast where we bring you daily insights and practical advice on navigating the ever-evolving landscape of compliance and regulatory requirements. Whether you’re a seasoned compliance professional or just starting your journey, we aim to provide bite-sized, actionable tips to help you stay on top of your compliance game. Join us as we explore the latest industry trends, share best practices, and demystify complex compliance issues to keep your organization on the right side of the law. Tune in daily for your dose of compliance wisdom, and let’s make compliance a little less daunting, one tip at a time.

Why you should plan for 3rd-party termination and how to do so.

For more on this topic, check out The Compliance Handbook, a Guide to Operationalizing Your Compliance Program, 6th Edition, which LexisNexis recently released. It is available here.

Categories
2 Gurus Talk Compliance

2 Gurus Talk Compliance – Episode 52 – The Big Jet Plane Edition

What happens when two top compliance commentators get together? They talk compliance, of course. Join Tom Fox and Kristy Grant-Hart in 2 Gurus Talk Compliance as they discuss the latest compliance issues in this week’s episode!

Stories this week include:

  • Trump closes tariff loophole on cheap online goods from China MSN)
  • If A.I. Systems Become Conscious, Should They Have Rights? (NYT)
  • Sarah Hadden & Corporate Compliance Insights: “Failure was always a possibility. It just wasn’t an option.” (Ideas & Answers)
  • ‘Everybody’s Replaceable’: The New Ways Bosses Talk About Workers (WSJ)
  • Florida man casually offers officer a vodka spritzer during police chase, officials say (Fox 35 Orlando)
  • The Board’s role in ransomware planning. (Harvard Law School Forum on Corporate Governance)
  • DOJ National Security Division issued a Declination. (Crime, Corruption and Compliance)
  • Based on whistleblower tips, UBS will pay $511MM for Credit Suisse’s failure to live up to DPA. (ComplianceWeek)
  • Malaysia wants Tim Leissner. (WSJ)
  • What is risk paralysis? (FT)

Resources:

Kristy Grant-Hart on LinkedIn

Prove Your Worth

Tom

Instagram

Facebook

YouTube

Twitter

LinkedIn

Categories
Blog

Preparing for the New Data Security Program, Part 2

Yesterday, I began a two-part blog post on preparing to respond to the Department of Justice’s (DOJ) new Data Security Program (DSP), which was released on April 8, 2025. Today, I want to conclude this series by reviewing additional key actions you can take now to prepare for the full effective date of October 6, 2025.

  • Set up internal processes for training, audit, and reporting.

The DSP does not just ask for policies; it demands proof of implementation. Your organization must build internal compliance muscle around training, auditing, and reporting specific to DSP obligations. Start with training. Who needs to know what? Procurement teams must understand vendor screening protocols. IT and security teams must recognize DSP risk categories. Legal must know the redlines on cross-border data sharing. Executives must understand their certification responsibilities. Everyone must grasp the stakes: violations carry real-world consequences, including civil penalties and criminal charges.

Next comes auditing. You must create audit plans that review DSP compliance across your data lifecycle, collection, storage, access, processing, sharing, and deletion. These audits should be independent, recurring, and specific to your Data Compliance Program. And don’t forget: if you engage in restricted transactions, you must conduct an audit and submit an annual compliance certification. This is not optional, but mandatory compliance activity is baked into the regulation.

Lastly, establish internal reporting mechanisms. That includes hotlines or portals for employees to report suspected violations and internal systems for escalating rejected transactions to compliance or legal. DSP requires you to report known or suspected breaches within 14 days. This is not a theoretical SLA; failing to meet the timeline is a compliance failure. Build templates, designate responsible officers, and track every report. If your whistleblower program is not integrated with your data governance team, you are already behind the proverbial 8-ball.

Think of this as building a new compliance pillar, just like you did for FCPA or anti-money laundering. It’s not about reinventing the wheel but about embedding DSP-specific requirements into the systems, teams, and culture you already rely on.

  • Engage your board and C-suite on DSP requirements. This is national security compliance, not just privacy.

One of the most underappreciated risks in corporate compliance today is the leadership’s assumption that DSP is just an extension of privacy laws. It is decidedly not. This is national security compliance. And that means the board and C-suite must be informed and actively engaged.

Start by educating the board on how the DSP aligns with existing fiduciary duties and oversight obligations. Directors must understand that data exposure to hostile foreign powers could result in enforcement actions, reputational damage, shareholder litigation, and, in some sectors, revocation of government contracts. This could raise the level of a material disclosure risk for public companies.

The C-suite also has new legal responsibilities. Senior officers must sign off on DSP compliance certifications, ensure audits are conducted, and provide adequate resources for risk management. That means CEOs, GCs, and CFOs are personally accountable for implementation, and their failure to act could aggravate an enforcement action. Bring DSP compliance into board audit committee agendas. Create executive-level working groups that include the CISO, Chief Privacy Officer, General Counsel, and Chief Compliance Officer. Produce quarterly dashboards showing compliance metrics, known or suspected violations, audit results, and third-party risk assessments.

Do not make the mistake of treating this like another privacy briefing. Treat it like an FCPA or sanctions discussion, with risk maps, case studies, DOJ priorities, and benchmark expectations, because this is not about theoretical data misuse. It’s about preventing hostile state actors’ strategic exploitation of American data. And that is a matter of national urgency. If your board does not understand this message, it is up to compliance to evangelize the message before regulators do it for you.

  • Start building your Data Compliance Program today—October 6, 2025, is not as far off as it seems.

October 6, 2025, may feel like a future problem, but let me assure you that the future is already knocking at your door. The DOJ has given us a roadmap and a runway. What you do with that time will define your compliance posture for years. Don’t treat the DSP as a regulatory cliff. Treat it as a strategic build.

Begin by appointing a DSP compliance lead with data governance and regulatory experience. Next, map your data flows, classify your datasets, and identify your exposure to restricted or prohibited transactions. Use that information to build a risk profile. That’s your foundation.

Then, develop your Data Compliance Program. Create written policies for due diligence, vendor screening, internal reporting, and audit procedures. Set up governance structures, designate accountable officers, and prepare for annual certifications. Do not wait until Q3 to scramble; start embedding controls into your existing compliance infrastructure now.

Use this runway to build muscle memory: conduct tabletop exercises, test your reporting protocols, and audit your readiness. Engage your business units with training, mock scenarios, and real-life case studies. The goal is not just compliance; it is about cultural adoption. You’ve already failed if your people see this as a box-checking exercise. The organizations that will thrive under DSP are the ones that treat this not as a regulatory burden but as an opportunity to lead. Because let’s face it: national security compliance is the new frontier. And October 6, 2025, won’t end this journey. It’s the beginning.

The DSP marks a seismic shift for compliance professionals in the era of data as a national security asset. This is not just another privacy framework but a national security regulation with teeth. U.S. companies must now treat data governance the way they’ve treated anti-bribery compliance or export controls: with rigor, documentation, and executive oversight. That starts with reviewing and aligning privacy policies to DSP-defined risk categories, especially around government-related and bulk-sensitive personal data.

Vendor agreements must be audited for exposure to covered persons or countries of concern and updated with enforceable clauses to prevent prohibited data transfers. Organizations must also build robust internal training, auditing, and reporting systems, with mandatory 14-day reporting windows for violations. Most critically, boards and C-suites must be actively engaged, and this is national security compliance, not just IT hygiene. The clock is ticking, with full enforcement kicking in on October 6, 2025. Compliance professionals have a unique opportunity to lead from the front, building a proactive, risk-based Data Compliance Program that integrates DSP mandates into business operations before DOJ examiners come knocking. The message is clear: Know your data. Know your risks.

Finally, take action before your inaction becomes your liability.

Categories
Compliance Tip of the Day

Compliance Tip of the Day – Using Supply Chain to Innovate in Compliance

Welcome to “Compliance Tip of the Day,” the podcast where we bring you daily insights and practical advice on navigating the ever-evolving landscape of compliance and regulatory requirements. Whether you’re a seasoned compliance professional or just starting your journey, we aim to provide bite-sized, actionable tips to help you stay on top of your compliance game. Join us as we explore the latest industry trends, share best practices, and demystify complex compliance issues to keep your organization on the right side of the law. Tune in daily for your dose of compliance wisdom, and let’s make compliance a little less daunting, one tip at a time.

How to use your supply chain partners to innovate for your compliance program.

For more on this topic, check out The Compliance Handbook, a Guide to Operationalizing Your Compliance Program, 6th Edition, which LexisNexis recently released. It is available here.

Categories
Blog

Preparing for the New Data Security Program, Part 1

Yesterday, I introduced the Department of Justice’s (DOJ) new Data Security Program (DSP), which was released on April 8, 2025, and implemented under Executive Order 14117. Today, I want to begin reviewing key actions you can take now to prepare for the full effective date of October 6, 2025. We will complete our review of key steps to take tomorrow.

1. Review your current data governance and privacy policies—align them with DSP risk categories.

Data governance is no longer just about classification and access rights; it’s now a frontline national security function. The DSP requires fundamentally rethinking how organizations define, inventory, and control sensitive data. Compliance officers must start with a forensic review of current data governance frameworks: What data are you collecting? Who touches it? Where does it live? Who can access it, and how is it transferred internally and externally? Once mapped, each dataset must be examined through the DSP lens: Is it government-related? Does it contain bulk sensitive personal data? Is it linked to current or former U.S. government personnel? These are not simply IT questions. These are compliance questions with profound legal implications.

Next, organizations must evaluate their privacy policies for blind spots. Many policies were written for GDPR or CCPA, not for adversarial data exfiltration by foreign intelligence services. If your data policies are not risk-aligned to DSP categories, such as data brokered to third parties or aggregated in ways that make re-identification likely, you are flying blind in a regulatory minefield. This isn’t a call for a quick redline but a strategic overhaul of how you structure data controls, policies, and risk frameworks. Collaborate with your CISO, but lead with your compliance hat on. The DOJ is not asking for IT security alone, and they are demanding accountable, auditable compliance with national security-grade rigor. Treat this like an FCPA compliance program: document everything, know your risk vectors, and escalate anomalies. The age of “data policy as an afterthought” is over. In the DSP era, data is not just a privacy concern but a geopolitical flashpoint.

2. Audit your third-party vendor agreements for exposure to covered persons or countries of concern.

Third-party risk just got geopolitical. Under the DSP, vendor due diligence has become a national security obligation. You must now screen for performance and financial viability and whether any foreign vendor, subcontractor, or partner is a “covered person” or tied to a country of concern like China, Russia, Iran, North Korea, Venezuela, or Cuba. Even indirect ownership or residency triggers a compliance obligation. That friendly cloud storage provider with a branch in Shenzhen? Is that IT support firm subcontracting code maintenance to Belarus? They may now be regulatory liabilities under the DSP.

Start with a comprehensive audit of all current vendor agreements, focusing on data-sharing terms, sub-licensing permissions, and geographic exposure. Can the vendor access, process, or host government-related or bulk-sensitive personal data? If so, is there a clause prohibiting onward transfer to covered persons or countries of concern? If not, you’re potentially out of compliance. You may need to renegotiate or terminate contracts that create risks you can’t control. Relying on “we didn’t know” is insufficient, as the DSP holds U.S. persons accountable for failing to implement reasonable and proportionate due diligence.

Also, consider implementing a DSP-specific screening protocol that goes beyond sanctions and AML lists and includes the DOJ’s Covered Persons List. Integrate this into your vendor onboarding, renewal, and periodic review processes. Remember, under the DSP, even inadvertent exposure can constitute a violation. That means it’s no longer enough to run a vendor through OFAC and call it a day. You need a national security screening lens. Compliance must lead this effort, not procurement, legal, or IT. If a vendor relationship enables DSP-prohibited access, the legal liability will land squarely on your doorstep.

3. Draft contractual clauses that prohibit data resale or access by covered entities.

The DSP has thrown a wrench into how we think about contract drafting. Referencing generic data use terms or standard confidentiality clauses is no longer sufficient. You’re exposed if your contracts do not explicitly prohibit the onward sale or transfer of covered data to countries of concern or covered persons. Under the DSP, exposure is not simply reputational but both civil and criminal.

Compliance teams should immediately collaborate with legal and procurement to update all relevant agreements. That includes data-sharing contracts, licensing, cloud service agreements, vendor onboarding templates, and M&A data room protocols. Insert clauses prohibiting foreign counterparties from transferring sensitive personal or government-related data to any covered person or country of concern. Go further: mandate that they notify you of any suspected breach and certify compliance annually.

Do not stop at language insertion. Require enforceability mechanisms, termination clauses, indemnification provisions, and audit rights. The DOJ clarified that including boilerplate language will not shield you from enforcement. You may have committed a prohibited transaction if you knew or should have known that a foreign vendor resold data to a hostile actor. Even the best legalese won’t save you without operational controls to back it up.

Consider maintaining a DSP Clause Library, a set of pre-approved terms for use across contracts by legal and compliance staff. Train your contract managers on red flags. Build escalation protocols when counterparties push back. And do not forget to update your templates as the DOJ issues more guidance. In short, think of DSP compliance clauses the way you would anti-corruption reps and warranties in an FCPA context: a first line of defense, but only effective when part of a broader compliance architecture.

The Department of Justice’s new Data Security Program, effective October 6, 2025, is a game-changer for corporate compliance. It redefines data governance as a national security obligation, requiring companies to align privacy policies with DSP risk categories and scrutinize third-party vendors for ties to covered persons or countries of concern. Compliance professionals must proactively draft enforceable contracts, build auditable training and reporting systems, and educate C-suites and boards that DSP is not “just privacy”; rather, it is national security compliance. With the clock ticking, the time to act is now. Join us tomorrow for Part 2, where we continue the roadmap to DSP readiness.

Categories
Innovation in Compliance

Innovation in Compliance: Innovative Approaches to Compliance and Training with Catherine Choe

Innovation comes in many areas, and compliance professionals need to be ready for it and embrace it. Join Tom Fox, the Voice of Compliance, as he visits with top innovative minds, thinkers, and creators in the award-winning Innovation in Compliance podcast. This series is introduced by Tom Fox and hosted by Roxeanne Petraeus. Ethena sponsors this special five-part series on Innovation in Compliance.

In this episode, Roxeanne Petraeus sits down with Catherine Choe, Chief of Staff to the Chief Legal Officer at Zendesk to discuss Choe’s unique career path leading to her current role at Zendesk. The conversation delves into compliance best practices, highlighting Choe’s insights on making training programs effective and engaging. They explore the implementation of innovative approaches like the ‘test out’ feature and the potential impact of AI on compliance. The discussion underscores the importance of a customer-centric approach and adaptability in compliance training.

Key highlights:

  • Catherine Choe’s Career Journey
  • Best Practices in Compliance
  • Operationalizing Compliance Training
  • Innovative Approaches: Test Out
  • AI’s Impact on Compliance
  • Feedback and Customization

Resources:

Catherine Choe on LinkedIn

Zendesk Website

Zendesk on LinkedIn

Ethena Website

Roxanne Petraeus on LinkedIn

Ethena on LinkedIn

Tom Fox

Instagram

Facebook

YouTube

Twitter

LinkedIn

Categories
Compliance Tip of the Day

Compliance Tip of the Day – Asking Questions to Further Compliance

Welcome to “Compliance Tip of the Day,” the podcast where we bring you daily insights and practical advice on navigating the ever-evolving landscape of compliance and regulatory requirements. Whether you’re a seasoned compliance professional or just starting your journey, we aim to provide bite-sized, actionable tips to help you stay on top of your compliance game. Join us as we explore the latest industry trends, share best practices, and demystify complex compliance issues to keep your organization on the right side of the law. Tune in daily for your dose of compliance wisdom, and let’s make compliance a little less daunting, one tip at a time.

How asking questions works to create trust and a culture of compliance.

For more on this topic, check out The Compliance Handbook, a Guide to Operationalizing Your Compliance Program, 6th Edition, which LexisNexis recently released. It is available here.

Categories
Great Women in Compliance

Great Women in Compliance – The Compliance Influencer with Bettina Palazzo

In this episode of Great Women and Compliance, Lisa speaks with Dr. Bettina Palazzo, a leader in business ethics, the founder of Palazzo Ethics Advisory, and the International Compliance Association Influencer of the Year in 2024. Bettina shares the experiences that led to her entering the field of business ethics and the profession’s evolution, particularly in Europe.

Bettina shares how she defines an ethics influencer and how all of us can become one. She gives ideas and strategies for effectively communicating ethics and compliance using positive messaging and how this can lead to a more ethical workplace and happier employees. She also introduces the “ethics gym,” a training concept designed to help leaders navigate ethical dilemmas and reinforce their commitment to ethical practices.

Two other fun facts: she met her husband, Guido Palazzo, at a business ethics conference and started the “F-Up Festival with Christian Hunt,” where E&C professionals can speak candidly about mistakes and lessons learned—the next one is on Thursday, May 15, at 11 a.m. ET!

Categories
Compliance Into the Weeds

Compliance into the Weeds: Leaving on a (Qatari) Jet Plane

The award-winning Compliance into the Weeds is the only weekly podcast that takes a deep dive into a compliance-related topic, literally going into the weeds to explore a subject more fully. Are you looking for some hard-hitting insights on compliance? Look no further than Compliance into the Weeds! With a nod to Peter, Paul, Mary, and John Denver, in this Compliance into the Weeds episode, Tom Fox and Matt Kelly deeply dive into the potential gift of a luxury Qatari jetliner to President Trump.

We discuss the launch of Trump’s meme coins and the Qatari government’s allegedly planned $400 million plane donation to Trump. The conversation examines the compliance and corruption risks these actions pose for U.S. and international businesses. Kelly emphasizes how these incidents challenge ethical standards and underscore the importance for companies to address new forms of corruption proactively within their anti-corruption programs.

Key highlights:

  • Trump’s Alleged Corruption: An Overview
  • The Meme Coins Controversy
  • The Qatari Plane Donation
  • Compliance and Integrity in the Face of Corruption

Resources:

Tom

Instagram

Facebook

YouTube

Twitter

LinkedIn

A multi-award-winning podcast, Compliance into the Weeds, was most recently honored as one of the Top 25 Regulatory Compliance Podcasts, the Top 10 Business Law Podcasts, and the Top 12 Risk Management Podcasts.