Consumer Finance Monitor Podcast Episode: Challenges of Using the Current Law to Address Dark Patterns, with Guest Gregory Dickinson, Assistant Professor, St. Thomas University
Consumer Finance Monitor Podcast Episode: Should Written Contracts be Eliminated for Small Dollar Transactions? With David Hoffman, University of Pennsylvania Carey Law School
Troutman Pepper Attorneys Update Fair Lending Handbook for the American Association of Bank Directors - The Consumer Finance Podcast
Season 2 Episode 4 - Russia Enforcement and the involvement of DOJ's Task Force KleptoCapture
PLI's inSecurities Podcast: A View From the Inside
Consumer Finance Podcast Monitor Episode: The Consumer Financial Protection Bureau’s Final Section 1071 Rule on Small Business Data Collection: What You Need to Know, Part II, Guest David Skanderson
Podcast Episode 179: How to Start and Succeed at Creating Your Law Firm Podcast
Winstead HOA Law Webinar: Deed Restriction Compliance – Legal Process
The Labor Law Insider - Pause Before You Discipline: NLRB Turns Against Civility in Lion Elastomers Decision
A Glimpse Into the Other Side: Understanding the Perspective of Government Enforcers
The Justice Insiders Podcast: The Latest on Russia Sanctions and the Enhanced Enforcement Environment
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 142: Erica Barnes, Maynard Nexsen Attorney
PLI's inSecurities Podcast: Whistling the Same Tune: Building an Effective Whistleblower Program
Time to Amend the Defend Trade Secrets Act
PODCAST: Williams Mullen's Trending Now - An IP Podcast: NIL - Trending Issues Related to the NCAA’s Name, Image and Likeness Policy in 2023
PLI's inSecurities Podcast - Compliance and Enforcement Considerations for Private Funds & RIAs
State AG Pulse | State AGs and Feds: The Dynamics of Influence & Collaboration
The Presumption of Innocence Podcast: Episode 20 - Pitfalls and Perils: Employee Retention Credit Enforcement Trends
University of Miami NIL Enforcement Action – Highway to NIL Podcast
Paredes on SEC Policies & Priorities
On April 4, 2024, the Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) officially published its Notice of Proposed Rulemaking (NPRM) detailing significant new cybersecurity...more
Hospitals, health systems and providers are targets of cyberattacks at an alarming rate, putting patient data, electronic infrastructure and, most importantly, patient lives at risk. The Department of Health and Human...more
Data security is a top concern for organizations in today’s digital landscape. It protects data from unauthorized access, use, modification, or disclosure, and requires implementing technical, administrative, and physical...more
Agility and resiliency remain essential attributes for manufacturers in 2023. Manufacturers are no longer focused on figuring out when things will return to “normal.” Instead, they are applying lessons learned from the...more
On February 17, 2023, the US Department of Health and Human Services Office for Civil Rights (OCR) released two companion reports to Congress detailing its actions in 2021 to enforce the privacy, security, and breach...more
Gain critical strategies for managing reviews in the new Team Telecom environment. The American Conference Institute’s 2nd National Team Telecom Conference will take place in Washington D.C. on April 25, 2022, one day...more
Amid the escalating conflict in Ukraine and concerns of Russian cyber threats to the United States, President Joe Biden recently signed a $1.5 trillion government spending deal with serious cybersecurity reporting obligations...more
On February 23, 2022, Assistant Attorney General Matthew Olsen announced that the DOJ’s China Initiative was officially ending. He also announced DOJ’s new national security strategy - Strategy for Countering Nation-State...more
The U.S. Government is continuing its frequent and highly visible use of denied party lists as an important tool in administering the export control laws. Each of the Bureau of Industry and Security (BIS), the Office of...more
Companies and consumers alike are under perpetual assault from bad actors as IoT, work from home, and cloud migration – all intended to improve productivity – have expanded the cyber attack surface. The continually evolving...more