Episode 335 -- The New DOJ Whistleblower Program
Navigating the Labyrinth of Private Equity Investments in Health Care – Diagnosing Health Care
AGG Talks: Women in Tech Law Podcast - Episode 3: Cybersecurity and FCA Compliance: Essential Insights for Tech Leaders
False Claims Act Insights - Are All Healthcare “Kickbacks” Subject to FCA Liability?
#WorkforceWednesday®: New DOJ Whistleblower Program - What Employers Must Know - Employment Law This Week®
The Presumption of Innocence Podcast: Episode 43 - New Horizons: Impact of Recent Appellate Circuit Rulings on White-Collar Criminal Defense Law
Redlining Isn’t What it Used To Be
Episode 333 -- The Boeing Proposed Plea Agreement
DOJ’s New Self-Disclosure Policy and Corporate Whistleblower Awards Pilot Program
False Claims Act Insights - Assessing the Fallout from a Thermonuclear FCA Verdict
FCPA Survival Guide - Step 8 - Investing in Compliance
False Claims Act Insights - Eureka! Government Investigators Seek Out Research Misconduct
Episode 328 -- Sanctions Enforcement Risks and Redlines
Common Scenarios Triggering False Claims Act Violations, Part 1: Gov. Contracts and Cybersecurity
Cannabis Law Now Podcast: What’s Next for Schedule III Marijuana
Redlining Complications Caused by Implementation of 2020 Census Tracts
FCPA Survival Guide: Step 3 - Extensive Remediation
Episode 324 -- Third-Party Risks and Sanctions Compliance
The Justice Insiders Podcast: DOJ’s Cacophony of Whistles
The Latest on Healthcare Enforcement
The Federal Trade Commission’s Bureau of Competition and the Department of Justice Antitrust Division released a joint statement reiterating document preservation obligations for companies and individuals that are the subject...more
Over a year following enactment of the U.S. “Clarifying Lawful Overseas Use of Data” or CLOUD Act, significant questions remain unanswered about the law and its potential impact on global investigations involving cloud stored...more
On Friday morning, March 23, President Trump signed the $1.3 trillion omnibus spending bill into law, including the Clarifying Lawful Overseas Use of Data (CLOUD) Act, and in doing so established a sea change in the rules for...more
On June 6, 2016, during a speech at a Cybercrime Symposium co-organized by the Centers for Strategic and International Studies and the Department of Justice’s (“DOJ”) Computer Crime and Intellectual Property Section,...more
Prior to the Information Age, sensitive papers were stored in file cabinets and drawers. When home computers arrived, information was digitized and moved to hard drives or other electronic media, still possessed by the user....more
The Second Circuit’s challenge in considering the validity of a U.S. Stored Communications Act warrant to Microsoft for e-mails located on servers in Ireland involves interpreting the SCA, which was enacted nearly three...more
The U.S. Senate Committee on the Judiciary held a hearing to discuss reforms to the Electronic Communications Privacy Act (“ECPA”) proposed in Senate bill S. 356, The Electronic Communications Privacy Act Amendments Act of...more
Jacqui Merrill, an Associate at The Volkov Law Group, joins us with a posting on the SEC’s request for increased access to emails. In a Senate Judiciary Committee meeting held on September 16, 2015, Securities and...more
There continue to be regular developments in the business and human rights field that warrant attention from both companies and their stakeholders. New legislation and regulation, shifting policy positions, and developments...more
As technology developers continue to push the envelope on services and applications affecting the daily lives of consumers, the intersection of technology and privacy is becoming increasingly fraught with legal implications...more
Chief Judge Loretta A. Preska of the U.S. District Court for the Southern District of New York affirmed Magistrate Judge James C. Francis IV’s opinion and ordered that the U.S. Department of Justice (DOJ) could compel...more
The Federal Trade Commission and the Department of Justice yesterday issued a joint policy statement on the sharing of cybersecurity information. Declaring that “properly designed cyber threat information sharing is not...more