Steps Your Nonprofit Can Take to Mitigate Fraud Risks - Part 2
Why Retailers and Merchants Should Pay Attention to the CFPB - The Consumer Finance Podcast
The Justice Insiders Podcast - The Ever-Expanding Net: Corporate Compliance in an Era of Increasing Trade Sanctions and Restrictions
Fraud Risks at Nonprofit Organizations - Part 1
False Claims Act Insights - If Everything Matters, Nothing Does: Parsing Materiality in FCA Disputes
AGG Talks: Cross-Border Business Podcast - Episode 18: Navigating U.S. Sanctions and Their Implications for Non-U.S. Individuals and Entities
Navigating U.S. Sanctions and Their Implications for Non-U.S. Individuals and Entities
Power, Privacy, and Protection: Unpacking Security Challenges in the Energy Sector - Energy Law Insights
FCA Uncovered: Mitigating Risk in the Regulatory Spotlight — Regulatory Oversight Podcast
JONES DAY PRESENTS®: Cross-Border Trade Secret Litigation in the United States
Navigating Employment and Separation Agreements: Lessons From Al Pacino's Serpico — Hiring to Firing Podcast
What's the Tea in L&E? Love Contracts: Consensual Relationships in the Workplace
CMO Series EP131 - Noni Garratt-Wall of Charles Russell Speechlys on The Art Of A Law Firm Rebrand
Life After Love Gone Wrong Podcast: Season 3, Episode 4 - Splitting Costs: Forensic Accounting in Divorce
No Password Required: Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a World-Class Awkward Hugger
What to Do If the Government Knocks on Your Company’s Door … or Breaks It Down – Speaking of Litigation Podcast
Marketing Minute with NP Strategy (Video): How to Respond to a Cyber Security Breach
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 157: Sarah Glover, Maynard Nexsen Cybersecurity Attorney
ESG, DEI and Compliance
[Podcast] AI: The Next Big Thing in Government Contracting
When thinking of archetypal unicorns in the technology sector, carbon capture is rarely top of mind. However, a December report by McKinsey & Co. stated that global investment in carbon capture technologies is predicted to...more
As technology continues to evolve, the use of generative artificial intelligence (AI) in business operations is reshaping the way we approach standard tech transactions. The traditional pillars of contract negotiation –...more
In recent years unexpected supply chain disruptions made it difficult for some automotive suppliers to manufacture components needed to fulfill their downstream orders on time and on budget. Although looking to alternate...more
On December 3, 2020, HaystackID shared an educational webcast designed to inform and update legal and data discovery professionals on considerations and approaches that can help organizations proactively and reactively...more
Big data sets are the “new normal” of discovery and bring with them six sinister large data set challenges, as recently detailed in my colleague Nick’s article. These challenges range from classics like overly broad...more
Collectively, we have sent an average of 306.4 billion emails each day in 2020. Add to that 23 billion text messages and other messaging apps, and you get roughly 41 million messages sent every minute. Not surprisingly, there...more
In December 2019, the Division of Corporation Finance (Staff) of the U.S. Securities and Exchange Commission (SEC) published new "CF Disclosure Guidance: Topic No. 8" (Guidance) regarding disclosure obligations companies...more
Co-working spaces are quickly becoming the Uber equivalent to office space rentals for remote-work professionals. On Monday morning, log onto an app and reserve a cubicle space down the street at a price much cheaper than a...more
Unit pricing and other confidential information contained within your bid documents may be recognized as a trade secret under Ohio’s Uniform Trade Secret Act and similar federal laws. What does that mean? In simple terms, it...more
On their own, blockchain technology, open source software, and patents each present legal issues that are often complex and frequently misunderstood. When combined, the complexity and misunderstandings of these three topics...more
If you’re going to demote or terminate your in-house tech expert, you should plan that event very carefully. Our firm is now helping a client with damage control and data recovery upon discovering – a week after their...more
Due to the increasing number of successful and attempted cyber-attacks and increased government scrutiny surrounding protection of confidential information, companies cannot ignore the various risks associated with potential...more