5 Key Takeaways | 2024 Emerging Trends: Delaware Unclaimed Property VDA and Multistate Audits
Common Scenarios Triggering False Claims Act Violations, Part 3: Claims and Investigations
Compliance Tip of the Day: Machine Learning for Internal Audit
DE Under 3: OFCCP Changes Up Important Technical Details of its Audit Selection Process in First FY 2024 CSAL
Preparing for a Government Healthcare Audit
What Can A Tax Attorney Do For You? A Podcast With Janathan Allen
Navigating GSA Audits Compliance Strategies and Best Practices
DE Under 3: US DOL Inspector General’s Office Plans to Review Effectiveness of OFCCP Compliance Evaluations
DE Under 3: What Federal Contractors Need to Know About OFCCP's New Audit Scheduling Letter
DE Under 3: What’s New in OFCCP’s Latest Audit Scheduling Letter for Supply & Service Contractors
Independent Audits of Nonprofit Organizations With Douglas Cook
DE Under 3: U.S. OPM Proposed Allowing Federal Managers To Avoid Most Qualified Candidates To Pick Those Who Offer Better “Fit”
AGG Talks: Home Health & Hospice - Reimbursement Audits and Appeals
After ALJ: Options and Opportunities in the Face of an Unfavorable ALJ Decision
The Presumption of Innocence Podcast: Episode 21 - Conservation Easement Donations: Tax Shelter or Charitable Contribution Deduction?
Compliance and Managing from the Middle
I Understood There Would Be No Math: Audits, Extrapolations, and a New Set of Rules
JONES DAY PRESENTS®: Trade Secret Audits: Enhanced Mapping, Protecting Access and Creating Understanding
Constangy Webinar - DEI Audits: Tools to Enhance Your DEI Practices
[Podcast] New Year, New PAC: Have a Successful PAC Audit in 2023
Preparing for a Rule 26(f) meet and confer and codifying eDiscovery workflow decisions into an ESI protocol is more technically complex and challenging than ever before. In large part, this increased complexity is due to the...more
In the legal operations realm, eDiscovery has always been a critical function, but the rapid advent of digital technologies has dramatically increased its complexity. While these advancements offer new tools for communication...more
For those engaged in eDiscovery, protecting companies’ sensitive data is only increasing in importance. Each year, the odds that a company or its law firm will experience a data breach grow. According to the Identity...more
If you—or your child—have ever been in a live performance, you know that it hardly matters how much time and effort the cast and crew have put in: the moment that curtain goes up, everything changes. Actors who know their...more
Learn how the latest eDiscovery technology and investigative techniques used by the world’s top regulatory agencies, including the UN War crimes tribunals, Alberta Securities Commission, and the European Commission’s...more
On November 14, the Benelux Chapter of the Association of Certified eDiscovery Specialists (ACEDS) organizes a unique panel discussion on eDiscovery best-practices for internal investigations. As the number of regulators...more
The HHS Office for Civil Rights (OCR) must improve its oversight and enforcement of patient information privacy and security rules by “covered entities” and their business associates under the Health Information Portability...more
Everyone in healthcare knows that the next round of HIPAA audits is coming. Covered entities and business associates have long been advised to review and update their HIPAA security risk analyses, have business associate...more