One new and different item laid out in the Evaluation of Corporate Compliance Program (Evaluation), supplementing the Ten Hallmarks of an Effective Compliance Program from the 2012 FCPA Guidance, was ...
A few decades ago, simply knowing how your business was performing was a competitive advantage. Before computers, tracking and analyzing, even a handful of business metrics required dozens of people.
Just as risk assessment is the bedrock for an effective compliance program, root cause analysis (“RCA”) similarly underpins successful remediation of compliance violations. The DOJ’s March 2023 ...
Getting to the root cause is not always that straightforward. Businesses are using increasingly complex items of equipment like robotics, for example. Even something that is largely done by humans can ...
This is the final post in the Business Continuity Event Planning series. We close with a look at how to manage the process, how to improve response, recovery, and prevent recurrence of an event. In ...
As semiconductor devices become smaller and more complex, the product development lifecycle grows increasingly intricate. So, from early builds to pre-qualification testing, firmware development and ...
Every organization should have a computer incident response plan. A solid plan should serve two major functions. The first is to recover business functions as quickly as possible. The second is to ...
Recently, I was chatting with longtime colleague and friend, Keith Essency. I first met Keith when I worked in the Motorola Semiconductor business in marketing and he was on the engineering side. We ...
Over 50% of frontend ASIC hardware engineering time is spent on debugging and root cause analysis, spent churning through millions of lines of code and terabytes of waveform data. Despite this, there ...
Nothing is more frustrating for a fleet than bringing a truck back to a shop for a recurring problem. Given the cost of downtime, fleets expect repairs to be made correctly the first time. Yet, there ...