Two new bills proposed in West Virginia would restrict telemarketing practices. Introduced in late January, these bills mirror many of…
Read MoreThe public comment period for the proposed Cybersecurity Maturity Model Certification (CMMC) rule is open until February 26, 2024. To…
Read MoreOver the past several years healthcare organizations have received warnings from the Department of Health and Human Services (HHS), the…
Read MoreThe California Privacy Protection Agency (CPPA) can begin enforcing the first group of California Privacy Rights Act (CPRA) amendments to…
Read MoreThe Federal Communications Commission (FCC) took action to stop the use of AI-generated voices in unsolicited robocalls. The Commission voted…
Read MoreIf you are considering a HITRUST Risk-Based, 2-year (r2) Assessment one of the areas you will need to evaluate is…
Read MoreWhat is Penetration Testing Penetration testing is a common procedure and an important element of an effective cybersecurity program. A…
Read MoreHospital IT help desks have been the target of sophisticated social engineering schemes designed to enable payment fraud according to…
Read MoreIn recent months, companies facing Florida Telephone Solicitation Act (FTSA) class actions have relished in significant victories in key court…
Read MoreIf your company is delivering more than 5000 emails per day to @gmail.com domains, in June 2024, you’ll find some…
Read MoreFinding a credible expert with the appropriate background, expertise, and credentials can be difficult. CompliancePoint is here to help.
Our Clients
Copyright © 2024 CompliancePoint, Inc. All Rights Reserved | Privacy Statement | Accessibility | Disclosure | Trust | Sitemap
Connect with us on social media