Fraud Prevention Techniques for Nonprofit Organizations - Part 3
Steps Your Nonprofit Can Take to Mitigate Fraud Risks - Part 2
Why Retailers and Merchants Should Pay Attention to the CFPB - The Consumer Finance Podcast
The Justice Insiders Podcast - The Ever-Expanding Net: Corporate Compliance in an Era of Increasing Trade Sanctions and Restrictions
Fraud Risks at Nonprofit Organizations - Part 1
False Claims Act Insights - If Everything Matters, Nothing Does: Parsing Materiality in FCA Disputes
AGG Talks: Cross-Border Business Podcast - Episode 18: Navigating U.S. Sanctions and Their Implications for Non-U.S. Individuals and Entities
Navigating U.S. Sanctions and Their Implications for Non-U.S. Individuals and Entities
Power, Privacy, and Protection: Unpacking Security Challenges in the Energy Sector - Energy Law Insights
FCA Uncovered: Mitigating Risk in the Regulatory Spotlight — Regulatory Oversight Podcast
JONES DAY PRESENTS®: Cross-Border Trade Secret Litigation in the United States
Navigating Employment and Separation Agreements: Lessons From Al Pacino's Serpico — Hiring to Firing Podcast
What's the Tea in L&E? Love Contracts: Consensual Relationships in the Workplace
CMO Series EP131 - Noni Garratt-Wall of Charles Russell Speechlys on The Art Of A Law Firm Rebrand
Life After Love Gone Wrong Podcast: Season 3, Episode 4 - Splitting Costs: Forensic Accounting in Divorce
No Password Required: Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a World-Class Awkward Hugger
What to Do If the Government Knocks on Your Company’s Door … or Breaks It Down – Speaking of Litigation Podcast
Marketing Minute with NP Strategy (Video): How to Respond to a Cyber Security Breach
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 157: Sarah Glover, Maynard Nexsen Cybersecurity Attorney
ESG, DEI and Compliance
Hosted by the American Conference Institute, the 19th Annual FCPA & Anti-Corruption Conference for the Life Sciences Industry returns for another exciting year with carefully researched programming based on critical findings...more
On February 28, 2024, President Biden issued Executive Order 14117 (the EO) on “Preventing Access to Americans’ Bulk Sensitive Personal Data and United States Government-Related Data by Countries of Concern” that would...more
Looking for compliance education and networking in your area? SCCE & HCCA’s Regional Compliance & Ethics Conferences bring compliance practitioners from all disciplines together for convenient, local compliance education....more
Hear directly from the enforcement community - Want to gain insight into properly monitoring, detecting, investigating, and managing violations? Join us at HCCA’s Annual Healthcare Enforcement Compliance Conference to...more
Editor’s Note: From time to time, ComplexDiscovery highlights publicly available or privately purchasable announcements, content updates, and research from cyber, data, and legal discovery providers, research organizations,...more
Connecticut Passes the Fifth US State Consumer Privacy Law - The Connecticut governor has formally signed and passed An Act Concerning Personal Data Privacy and Online Monitoring (CPDA), making this law the fifth US state...more
Between export bans and the numerous entities and individuals now restricted from transacting in the global economy, organizations worldwide must evaluate the legal, reputational, and cybersecurity impacts on their supply...more
How does the U.S. Department of Justice (DOJ) intend to leverage its enforcement authority under the False Claims Act to advance DOJ’s recently announced Civil Cyber-Fraud Initiative? In this episode of Diagnosing Health...more
On February 23, 2022, Assistant Attorney General Matthew Olsen announced that the DOJ’s China Initiative was officially ending. He also announced DOJ’s new national security strategy - Strategy for Countering Nation-State...more
On September 21, 2021, the U.S. Department of the Treasury’s Office of Foreign Assets Control (“OFAC”) announced several actions focused on disrupting criminal digital finance infrastructure, including virtual currency...more
The Computer Fraud and Abuse Act (CFAA), codified at 18 U.S.C. Section 1030, is one of the U.S. Department of Justice’s most potent weapons in its fight against cybercrimes. It outlines numerous offenses, and it imposes...more
On July 15, 2021, the DOJ and DHS together with additional federal partners launched StopRansomware.gov, a one-stop hub intended to help the private and public sector mitigate the threat of ransomware. The website includes a...more
Our Virtual Regional Compliance Conferences provide updates on the latest news in regulatory requirements, compliance enforcement, and strategies to develop effective compliance programs. Watch, listen, and ask questions from...more
In this month's edition of our Privacy & Cybersecurity Update, we examine the National Institute of Standards and Technology's four principles of the "explainability" of artificial intelligence and the U.K. Information...more
The potential statutory damages under the CCPA dwarf almost every previous large data breach settlement in the United States. To mitigate the risk of this increased exposure, companies need to take key steps to ensure they...more
Enforcement activity under the Obama administration often made headlines for the eye-popping level of fines, with the Foreign Corrupt Practices Act (FCPA), Anti-Money Laundering (AML) regulations, and economic sanctions...more
On July 25 and 26, 2016, industry stakeholders assembled in Arlington, Virginia, to participate in the Medical Device Cybersecurity Risk Mitigation Conference sponsored by Q1 Productions. The conference focused on the...more
The new battleground for Plaintiffs filing ADA accessibility cases involves claims of barriers not in physical space but in cyber space. The Plaintiffs’ bar has become more aggressive in filing claims asserting that public...more
Companies are reminded of the need for strong internal controls. The US Securities and Exchange Commission (SEC) and the Department of Justice (DOJ) recently filed civil and criminal actions in the largest hacking and...more
I. Cybersecurity; Its Importance and Relevance – How We Got to Where We Are Today - In the past few months, the White House, Home Depot, JP Morgan, Hard Rock Hotels, Tesla, the St. Louis Federal Reserve, the Internal...more
Another federal agency has weighed in with “guidance” on cybersecurity preparation and breach response. The Department of Justice (DOJ) is the latest to issue guidance on how companies should respond to data breaches. The...more