SCOTUS McLaughlin Ruling Cracks Open FCC TCPA Interpretations

By Tony Jarnigan | July 1, 2025

The U.S. Supreme Court has rendered a much-anticipated decision this month that is sure to have huge implications for telemarketing…

Performing a HIPAA Security Risk Assessment

By Sarah Reckling | June 24, 2025

Under HIPAA, a covered entity or business associate must perform an annual HIPAA Security Risk Assessment. However, the Rule does…

Keller Williams Sued for TCPA Violations

By Kevin Mayfield | June 24, 2025

A plaintiff in New York has filed a class action lawsuit against Keller Williams Realty for sending text messages that…

NIST Releases Zero Trust Architecture Guidance

By Steve Haley | June 23, 2025

NIST has released Special Publication 1800-35 to help organizations implement a zero trust architecture (ZTA). The new guidance augments NIST…

Texas Bill to Strengthen Private Right of Action

By Ella Murphy | June 10, 2025

Texas Governor Greg Abbott signed Senate Bill 140 into law. The goal of this bill is to protect consumers from…

The Potential Next Wave of TCPA Litigation: Consent Revocation

By Megan Rose | June 9, 2025

The Federal Communications Commission’s (FCC) updated consent revocation rules have opened the door to a new category of potential class…

TCPA Lawsuits on the Rise in 2025

By CompliancePoint | June 9, 2025

2025 has been a busy year for TCPA lawsuits. From January 1st to April 30th, 880 TCPA lawsuits were filed,…

New State Laws Strengthen Privacy Protections for Minors

By Matt Dumiak | June 3, 2025

2025 has been a quiet year thus far when it comes to states passing comprehensive data privacy laws, with no…

Beyond CAN-SPAM: Understanding Preemption and the Scope of State Email Laws

By Tony Jarnigan | May 30, 2025

When organizations think about email compliance, they typically just think of the 2003 federal CAN-SPAM (Controlling the Assault of Non-Solicited…

Cybersecurity in Healthcare: Going Beyond the HIPAA Security Rule

By Alec Harrell | May 28, 2025

Cybersecurity in healthcare comes with an extra layer of complexity. Healthcare organizations must protect electronic protected health information (ePHI) to…

Finding a credible expert with the appropriate background, expertise, and credentials can be difficult. CompliancePoint is here to help.

Our Clients

Copyright © 2026 CompliancePoint, Inc. All Rights Reserved | Privacy Statement | Accessibility | Disclosure | Trust | Sitemap

PossibleNOW - a sister company

Connect with us on social media