Compliance Perspectives: The FBI on Why and How to Work with the Office of the Private Sector
The Compliance Challenge: Managing Legal & Regulatory Risk
Webinar: How to Get Your Lawyers Sharing Successfully on LinkedIn - with @AdrianDayton
Polsinelli Podcasts - FDA Denies Amgen Citizen Petition in Biosimilar Dispute
FCPA Compliance and Ethics Report-Episode 51-Interview with Tim Haidar
ACADEMI's Suzanne Rich Folsom and PwC's Glenn Ware on Moral Hazard
What Companies Should Do to Prepare for Implementation of Cybersecurity Executive Order
Where Does the Cybersecurity Executive Order Hit and Miss the Mark?
As January 20, 2025, approaches, antitrust practitioners and the business communities are searching for clues whether the incoming Trump Administration and its antitrust officials will continue the Biden Administration’s...more
1. The Supervision Regime - Proportionality - The supervision regime is built on the principle of “proportionality,” in an effort to ensure that supervision remains effective and meets its underlying purposes without...more
On the heels of a $7.6 million payment by Cleveland Clinic to settle allegations of False Claims Act (FCA) violations and unallowable sharing of passwords, Michael Lauer, NIH deputy director for extramural research, penned a...more
The US Department of Justice Antitrust Division (DOJ) continues to send strong warnings to companies sharing information outside of their organizations, including through third-party reporting services or pricing software,...more
Quicker and easier sharing of customer information relating to economic crime concerns between firms in the UK financial sector has been encouraged by provisions in the Economic Crime and Corporate Transparency Act 2023...more
The corporate life of a nominee director has been characterized as having the potential to be “neither happy nor long.” In this Governance Insights article, we discuss the fundamental fiduciary considerations that nominee...more
Looking for compliance education and networking in your area? HCCA’s Regional Healthcare Compliance Conferences offer practitioners convenient, local compliance education on a wide variety of current and emerging topics...more
Particle Health Inc's 81-page antitrust lawsuit against Epic Systems Corporation, filed in federal court in New York on September 23, raises a number of important questions, including what extent of information sharing is...more
The EU Data Act is one of the cornerstones of the EU's Data Strategy and introduces a new and horizontal set of rules on data access and use to boost the EU's data economy. Most of the provisions of the Data Act will become...more
As part of our series on NABITA’s Industry Standards for Behavioral Intervention Teams, we will focus on Standard 7, which deals with the intersection of behavioral intervention and confidentiality. This standard emphasizes...more
Sharing personal data is necessary for most organisations, but it also entails certain data protection risks. Controllers who share personal data with others must, among other obligations, ensure that they comply with the...more
On August 28, the US Department of Justice (DOJ) Antitrust Division, which enforces the US antitrust laws including the Sherman Act and Clayton Act, and the Federal Trade Commission (FTC), which enforces the Federal Trade...more
The publication by the Joint Committee of the European Supervisory Authorities (ESAs) on (a) 17 July 2024 of the second batch of implementing materials and (b) 26 July 2024 of the sub-contracting of information and...more
The financial services and banking industry landscape continues to evolve in the face of new and emerging technologies. This phenomenon is especially prevalent in the sharing of consumer data between financial institutions...more
As industry and markets have progressed, the technology they create has seen a commensurate increase in complexity. In practice, this results in the hyper-specialization of businesses so that they may continue to innovate at...more
The Financial Crimes Enforcement Network (“FinCEN”) has issued its Year in Review for FY 2023 (“YIR”). It consists of five pages of infographics. According to FinCEN’s press release...more
On April 24, 2024, Congress made headlines by passing a complex foreign aid package, which included the much-discussed TikTok “divest-or-ban” legislation. What received less attention was the Protecting Americans’ Data from...more
Cyber, Privacy, and Technology Report - Welcome to your monthly rundown of all things cyber, privacy, and technology, where we highlight all the happenings you may have missed....more
CYBERSECURITY - Health Care Entities Continue to Get Pummeled by Cybersecurity Attacks - The newest health care entity to be hit by a cyberattack is Ascension Health, which operates 140 hospitals and 40 assisted living...more
The Federal Trade Commission (FTC) has assumed the authority to enforce unauthorized data disclosures under the Federal Trade Commission Act (FTC Act). During the past three weeks, the FTC has used this authority to go after...more
In the latest surge of lawsuits against retailers for embedding tracking technology into websites, yummy cookie company Crumbl was sued on May 1, 2024, for allegedly embedding web-tracking technology allowing third-party...more
In recent years, information exchange has become a priority for both government antitrust enforcers and private antitrust plaintiffs. Across industries, business practices such as benchmarking and algorithmic price setting...more
Cyberhackers—potentially frustrated by their limited ability to extort ransom from health care entities in attacks—have started extorting the patients themselves, threatening them with the release of information or...more
“Today’s consumer protection challenges require an all-hands-on-deck response, and our report details how the FTC is working closely with state enforcers to share information, stop fraud, and ensure fairness in the...more
On March 12, 2024, the Department of Defense (DoD) finalized a rule to open its Defense Industrial Base (DIB) Cybersecurity (CS) Program to all defense contractors who own or operate an unclassified information system that...more