Cross Industry Functions
Refine Search
![HIPAA vs SAMHSA (42 CFR Part 2) HIPAA vs SAMHSA (42 CFR Part 2)](https://www.grceducators.com/image/cache/catalog/Speaker/85x95/BRIAN-L-TUTTLE-80x90.png)
HIPAA vs SAMHSA (42 CFR Part 2)
This lesson will be addressing how practice/business managers (or compliance offers) need to ensure their organization is complying with the Federal Substance Abuse and Mental Health Administration (SAMHSA) regulations (42 CFR Part 2) and how this differs from the HIPAA (Health Insurance Portability and Accountability Act) Privacy and Security Regulations. Both regulations carry significant civil and even c..
![How Effective is Your Foreign Corrupt Practices Act (FCPA) Program? How Effective is Your Foreign Corrupt Practices Act (FCPA) Program?](https://www.grceducators.com/image/cache/catalog/Speaker/85x95/CHRIS-DOXEY-80x90.png)
How Effective is Your Foreign Corrupt Practices Act (FCPA) Program?
As FCPA enforcement has gone through the roof in recent years - along with the fines for noncompliance - many companies have made FCPA compliance a priority. But when an employee or third party steps out of line, the first thing regulators will look for is the effectiveness of the compliance program.When it comes to managing and monitoring bribery malpractices, performing data analysis and internal controls..
![How ISO/IEC 27001 Can Help Achieve GDPR Compliance & Reduce Data Breach Risks How ISO/IEC 27001 Can Help Achieve GDPR Compliance & Reduce Data Breach Risks](https://www.grceducators.com/image/cache/catalog/Speaker/85x95/ROBERT_E_DAVIS-80x90.png)
How ISO/IEC 27001 Can Help Achieve GDPR Compliance & Reduce Data Breach Risks
Organizational IT usage categorization can be either support transaction processing or decision-making. Transaction-based information systems process data for routine business activities, whereas a decision-based information system commonly advises managers and professionals in non-routine judgments. Accordingly, information systems represent an architectural component that collects data, processes transact..
![How to Achieve Flawless Execution How to Achieve Flawless Execution](https://www.grceducators.com/image/cache/catalog/Speaker/85x95/DAVID-ROHLANDER-80x90.png)
How to Achieve Flawless Execution
Flawless execution is the ultimate practical behavior that the most successful companies strive to attain. The stories about Steve Jobs demanding perfection at Apple are legion. The quality and design excellence of Apple products is also common knowledge. This webinar will show you how to attain flawless execution without sacrificing people or human dignity.Errors, mistakes, and oversights are some of the m..
![How to Administer Vendor Assessments How to Administer Vendor Assessments](https://www.grceducators.com/image/cache/catalog/2022-Speaker%20/85-95/kenneth%20jones-1-80x90.jpg)
How to Administer Vendor Assessments
A Responsibility Check should be done before an award or contract is made to a vendor. This process will help ensure that a vendor is capable and reliable. Participants will learn how to Document an Assessment Review. They will learn ways to do Customization for vendor Types. Attendees will be able to understand what a Verification Check List is and how to create and use one. In addition, they will be given..
![How to Analyze the Income Statement How to Analyze the Income Statement](https://www.grceducators.com/image/cache/catalog/2022-Speaker%20/85-95/Ronal%20A%20Sereika-80x90.jpg)
How to Analyze the Income Statement
Many people may have financial statements in front of them but they do not know what they should be looking for. The Financial Statements can be seen as a Maze as there is so much information and people do not know where to start looking first. This live webinar will show people where they can find the income statement information they need and then depending on their needs (Are they looking to invest in th..
![How to Apply ISO 27001 Principles to Enterprise Risk Management In 2018 How to Apply ISO 27001 Principles to Enterprise Risk Management In 2018](https://www.grceducators.com/image/cache/catalog/Speaker/85x95/MICHAEL_C_REDMOND-80x90.png)
How to Apply ISO 27001 Principles to Enterprise Risk Management In 2018
ISO 27001 describes how to manage information security in a company. According to its documentation, ISO 27001 was developed to "provide a model for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an information security management system." By applying ISO 27001 standards effectively in your organization you can ensure robust security for your organization's vital inf..
![How to Assess Risks and Evaluate Controls How to Assess Risks and Evaluate Controls](https://www.grceducators.com/image/cache/catalog/Speaker/85x95/JONNIE_KEITH-80x90.png)
How to Assess Risks and Evaluate Controls
Every organization is set up to accomplish its primary business objective. Whether it is a “for-profit” organization or a “not-for-profit” organization, there is always a primary business objective. And whenever there is an objective, there is always the risk that the objective will not be achieved. Management has the responsibility to assess risks and establish controls to ensure that business objecti..
![How to Become an Influential & Empowered Leader – With or Without a Title How to Become an Influential & Empowered Leader – With or Without a Title](https://www.grceducators.com/image/cache/catalog/Speaker/85x95/MAURA_SWEENEY-80x90.png)
How to Become an Influential & Empowered Leader – With or Without a Title
With shifting corporate cultures requiring change management expertise, this webinar focuses on the mindsets, practices and emotional intelligence of the leader or aspiring leader. Discover not only how to facilitate and empower positive change, but how to start by becoming the “changed one” yourself.Stringent notions of management and top-down pyramid corporate structures are constantly being challenged. D..
![How to Build and Use 360 Degree Feedback How to Build and Use 360 Degree Feedback](https://www.grceducators.com/image/cache/catalog/Speaker/85x95/CHRIS-DEVANY-80x90.png)
How to Build and Use 360 Degree Feedback
Would you like to understand the complete and critical steps of the 360 degree feedback process?. How about learning the keys to identifying an effective 360 degree feedback instrument?How about being able to access important information regarding the selection of raters?. Would you like your team to improve performance?If you answered “yes” to any of these questions, then come laugh, listen and learn as Ch..
![How to Conduct a Harassment & Bullying Investigation How to Conduct a Harassment & Bullying Investigation](https://www.grceducators.com/image/cache/catalog/Speaker/85x95/SUSAN_STRAUSS-80x90.png)
How to Conduct a Harassment & Bullying Investigation
The EEOC requires that employers receiving a complaint, or otherwise learning of alleged harassment in the workplace, “investigate promptly and thoroughly…take immediate and appropriate corrective action by doing whatever is necessary to end the harassment, make the victim whole by restoring lost employment benefits or opportunities, and prevent the misconduct from recurring”. That’s a tall order to ensure ..
![How to Conduct a Mock OSHA Audit How to Conduct a Mock OSHA Audit](https://www.grceducators.com/image/cache/catalog/Speaker/85x95/STEVEN_ST_LAURENT-80x90.png)
How to Conduct a Mock OSHA Audit
Are you overwhelmed or scared and at the thought of OSHA conducting a walk-through of your facility? Many owners, plant managers, supervisors, and even safety professionals are overwhelmed and often don’t take the time necessary to conduct a thorough Mock OSHA Audit. Don't wait until someone gets hurt or OSHA fines you to get serious about evaluating the hazards in your work practices and in your work..
![How to Conduct an Effective Workplace Investigation How to Conduct an Effective Workplace Investigation](https://www.grceducators.com/image/cache/catalog/Speaker/85x95/MICHAEL_D_HABERMAN-80x90.png)
How to Conduct an Effective Workplace Investigation
In today’s workplace, there are numerous situations that can cause problems for employers that need to be followed up on and investigated by HR. These include claims of harassment, claims of discrimination, claims of a hostile environment, claims of retaliation, claims of improper pay practices, and many more claims of improper management practices. HR usually ends up with the responsibility for conducting ..
![How to Detect and Prevent Employee Fraud How to Detect and Prevent Employee Fraud](https://www.grceducators.com/image/cache/catalog/Speaker/85x95/PETER_GOLDMANN-80x90.png)
How to Detect and Prevent Employee Fraud
Employee fraud has become a serious and persistent cause of financial losses and reputational damage to organizations of all kinds... More and more employees are committing crimes such as embezzlement, check fraud, falsification of financial statements, collusion with corrupt vendors, and, most recently with Volkswagen, fraudulent manipulation of product specifications. Making matters worse, computer and In..
![How to Develop a Solid Customs Compliance Program How to Develop a Solid Customs Compliance Program](https://www.grceducators.com/image/cache/catalog/Speaker/85x95/JO-ANNE_DANIELS-80x90.png)
How to Develop a Solid Customs Compliance Program
The takeaway for each participant is to understand the ABC’s of customs compliance and learn how to develop a program that is tailored to its company’s size, supply chain, product, and risks. The program will outline the key elements of a solid customs compliance program and provide guidance on how to develop or take corrective actions to ensure compliance and protect the company. This webinar will give the..