Fraud Prevention Techniques for Nonprofit Organizations - Part 3
AGG Talks: Women in Tech Law Podcast - Episode 4: Preparing for a Transaction? What Emerging Growth Companies Need to Know
Meeting the Needs of General Counsel: Beyond the Basics of Legal Advice - On Record PR
Steps Your Nonprofit Can Take to Mitigate Fraud Risks - Part 2
A Third Party's Perspective on Third Party Risk
Why Time Matters: Partners Lindsay Gerdes and Michael J. Bronson on Swift Action in Government Investigations
Consumer Finance Monitor Podcast Episode: Why do Fintechs Want to Become Banks?
Privacy Issues from Third-Party Website Tags
What's the Tea in L&E? Employee Devices: What is #NSFW?
Episode 331- NAVEX State of Risk and Compliance Programs
What the Board Should Be Asking About the Compliance Program
Video: Artificial Intelligence Use in Political Campaigns
Episode 329 -- Bryn Sedlacek from Aravo on TPRM Holistic Risks and Unified Visibility
Compliance Lessons from Dating in Your 50s
The Justice Insiders Podcast - AI-Washing: Everything Old Is New Again
The AI Shakeup: New Tech Innovations and the Future of Corporate Law
Principled Podcast: S11E7 | Fortifying Ethical Frameworks: Navigating Emerging Risks in the Middle East
Managing Compliance Risk for Human Trafficking and Modern Slavery
Common Scenarios Triggering False Claims Act Violations, Part 3: Claims and Investigations
Navigating Bank-Fintech Partnerships: Avoiding Common Pitfalls — The Consumer Finance Podcast
Some might say there’s little difference between dealing with the devil and being a federal contractor. And for the unwary or unprepared, that may not be far off. Federal contracting comes with a litany of “fine print” that...more
Much has been and will be written on responsibility determinations and compliance programs in federal contracting, particularly at the intersection of cybersecurity and recent developments. Although a federal contract is not...more
The DE OFCCP Week in Review (WIR) is a simple, fast and direct summary of relevant happenings in the OFCCP regulatory environment, authored by experts John C. Fox, Candee J. Chambers and Cynthia L. Hackerott. In today’s...more
On May 14, 2024, the National Institute of Standards and Technology (NIST) dropped the third remix…er, revision…of its Special Publication (SP) 800-171, “Protecting Controlled Unclassified Information in Nonfederal Systems...more
On December 26, 2023, the Department of Defense (“DoD”) belatedly gifted defense contractors and subcontractors a Proposed Rule on the Cybersecurity Maturity Model Certification (“CMMC”) Program. DoD also released eight CMMC...more
Welcome to Jenner & Block’s Government Contracts Legal Round‑Up, a biweekly update on important government contracts developments. This update offers brief summaries of key developments for government contracts legal,...more
The Biden administration issued a widely anticipated executive order on artificial intelligence (“AI”) earlier this week. The Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence...more
In what can best be described as a tsunami of cybersecurity regulation, the Federal Acquisition Regulation (FAR) Council—consisting of the Department of Defense (DoD), General Services Administration (GSA), and National...more
The Biden Administration released its Fall 2022 regulatory agenda (Regulatory Agenda) on Jan. 4, 2023. In it, the administration outlined regulations aimed at cybersecurity requirements for government contractors, the...more
In November 2022, the U.S. government, acting through the Department of Defense, General Services Administration, and National Aeronautics & Space Administration, issued a proposed rule that would amend the Federal...more
Stay on top of the complexities in aerospace, defense, and government compliance - Few industries are as heavily regulated as aerospace, defense, and government contracting, and few also have such a large investment in...more
If a company has one or more Organizational Conflicts of Interest (“OCIs”), its ability to compete for (or perform) a government contract in a fair and equitable manner is inherently called into question. In the context of a...more
President Biden signed an executive order to bolster the federal government’s cybersecurity posture on May 12. The order focuses on implementing vital improvements to networks of federal departments and agencies, many of...more
On May 12. 2021, President Biden signed an Executive Order aimed at improving the Nation’s Cybersecurity by curtailing data breaches and malicious cyber campaigns. The Order comes in response to a number of recent...more
Key Takeaways - Slave, forced, and child labor is a modern-day reality impacting some 40 million people throughout the world, by some estimates. Such practices are—and have always been—repugnant, and certainly have no place...more
With the novel coronavirus (COVID-19) spreading outside of China at an ever-increasing rate, government contractors should prepare for possible service and payment interruptions. In addition, the administration is considering...more
In this white paper I consider what market access is, provide an overview of trade compliance, Federal Acquisition Register (FAR) flow downs, the value of continuous monitoring and the origins of laws impacting market access....more
I recently had the chance to visit with Travis Miller, General Counsel (GC), and I discuss how the regulatory requirements of the Federal Acquisitions Regulations (FARs) impact access to markets and supply chain compliance....more
Most of the posts I write on bid protests are written from the protester’s point of view. Recently, however, I was asked by a contract awardee whether he should intervene in a protest challenging his award. The short answer...more
I recently had the opportunity to present an online CLE for LawLine on Risk Management in Government Contracting. This is my second time presenting a course for LawLine (I previously taught a course on Small Business...more
The U.S. Government is renewing its focus on mitigating technological risks by regulating the supply chain for various goods and services. ...more
• First, an awardee is responsible for keeping tabs on what happens in a protest of its award, or it may not be able to submit its own challenge if the protest is sustained. • Second, mere compliance with cybersecurity...more
In this presentation: - Why cybersecurity matters - Recently-implemented cybersecurity rules and laws - Rapid reporting of cyber incidents and additional cybersecurity measures coming soon -...more
Program and culture assessments - Assessments have long been recognized as having a critical impact on the effectiveness of ethics and compliance efforts. Best practice programs have often employed assessments – formal...more