DoorDash Fined for CCPA Violations

By Matt Dumiak | February 23, 2024

California Attorney General Rob Bonta reached a $375,000 settlement with DoorDash, after allegations that the food delivery company violated the…

Read More

Do Not Disturb Act Proposes TCPA Amendments & AI Disclosures

By CompliancePoint | February 23, 2024

House bill H.R.7116, named the Do Not Disturb Act, introduced to Congress in January proposes significant changes to the TCPA,…

Read More

West Virginia Lawmakers Propose New Telemarketing Restrictions

By Kara Urbaniak | February 20, 2024

Two new bills proposed in West Virginia would restrict telemarketing practices. Introduced in late January, these bills mirror many of…

Read More

DoD Releases Video Detailing CMMC

By CompliancePoint | February 16, 2024

The public comment period for the proposed Cybersecurity Maturity Model Certification (CMMC) rule is open until February 26, 2024. To…

Read More

Mitigating Internal Security Threats in Healthcare

By Carol Amick | February 14, 2024

Over the past several years healthcare organizations have received warnings from the Department of Health and Human Services (HHS), the…

Read More

The First CPRA Regulations are Now Enforceable

By Matt Dumiak | February 13, 2024

The California Privacy Protection Agency (CPPA) can begin enforcing the first group of California Privacy Rights Act (CPRA) amendments to…

Read More

FCC Cracks Down on AI-generated Voices in Robocalls

By Kevin Mayfield | February 9, 2024

The Federal Communications Commission (FCC) took action to stop the use of AI-generated voices in unsolicited robocalls. The Commission voted…

Read More

HITRUST Policy and Procedure Documentation Requirements

By Carol Amick | February 7, 2024

If you are considering a HITRUST Risk-Based, 2-year (r2) Assessment one of the areas you will need to evaluate is…

Read More

Getting Started with Penetration Testing

By Matt Lawson | February 7, 2024

What is Penetration Testing Penetration testing is a common procedure and an important element of an effective cybersecurity program. A…

Read More

AHA Warns of Attacks Targeting Hospital IT Help Desks

By Carol Amick | January 30, 2024

Hospital IT help desks have been the target of sophisticated social engineering schemes designed to enable payment fraud according to…

Read More

Finding a credible expert with the appropriate background, expertise, and credentials can be difficult. CompliancePoint is here to help.

Our Clients

Copyright © 2025 CompliancePoint, Inc. All Rights Reserved | Privacy Statement | Accessibility | Disclosure | Trust | Sitemap

PossibleNOW - a sister company

Connect with us on social media