California Employment News: Creating the Report for a Workplace Investigation – Part 4 (Featured)
Compliance Tip of the Day: Assessing Internal Controls
Compliance Tip of the Day: COSO Objective 5 – Monitoring Activities
Compliance Tip of the Day: COSO Objective 3 – Control Activities
Compliance Tip of the Day – COSO Objective 1 – Control Environment
Hiring Smarter: Best Practices for Interviews: What's the Tea in L&E?
Compliance Tip of the Day: Code of Conduct as an Internal Control
California Employment News: Gathering Information in a Workplace Investigation – Part 2 (Featured)
Compliance Tip of the Day: Risk Assessments and Internal Controls
FCPA Compliance Report: The Role of Culture and Data in Fraud Risk Management - A Conversation with Vincent Walden
Compliance Tip of the Day: Podcasting for Compliance Training
Compliance Tip of the Day: Compliance Training Frequency
Compliance Tip of the Day: Using Supply Chain to Innovate in Compliance
Innovation in Compliance: Innovative Approaches to Compliance and Training with Catherine Choe
Work This Way: A Labor & Employment Law Podcast | Episode 46: The 2025 Greenville SHRM Conference with Tyler Clark and Brittany Goforth of GSHRM
Compliance tip of the Day: Communication Through Persuasion
Compliance Tip of the Day: Middle Managers as the Eyes and Ears of Compliance
Joe Green & Monica Rodriguez Kuniyoshi on Integrating Generative AI with Your Experts - Passle CMO Series Podcast RE-RELEASE:
Compliance Tip of the Day – Role of Chatbots in Compliance
FCPA Compliance Report: Kristy Grant-Hart on A 360° Review of the Future of Compliance
The 34th President of the United States, Dwight D. Eisenhower, once told a captivated audience that ”Plans are worthless, but planning is everything.”...more
Welcome to “Compliance Tip of the Day,” the podcast that brings you daily insights and practical advice on navigating the ever-evolving landscape of compliance and regulatory requirements. Whether you’re a seasoned compliance...more
Complex projects and public-private partnerships (P3s) are easy to define but hard to execute as they involve collaborations between public entities and private sector firms to finance, build, maintain and operate...more
Social media is used by both organizations and employees—as a marketing tool for business, for entertainment, or for interacting with friends and family....more
When you are in the business of creating content, it’s crucial to know when licenses or permissions are required to use the intellectual property of others (such as copyright and trademarks). In this article, we explore what...more
In an age of artificial intelligence and technological advances that improve the quality of deep fake programming, companies must remain vigilant to protect their brand and assets. They also have to be wary of who is applying...more
An organization’s code of conduct often serves as the foundation upon which other elements of the compliance program—such as employee training and communications—are built. More than just a tool for establishing baseline...more
In this episode of What’s the Tea in L&E, Labor & Employment attorney Mike Gardner joins host Leah Stiegler for a deep dive into best practices for conducting interviews. They highlight the critical role of documentation in...more
As recent innovations in automotive technology continue to fuel unprecedented growth across the industry, companies must adapt their privacy and confidentiality capabilities to safeguard highly valuable trade secrets. With...more
Physician compensation benchmarks like those from the Medical Group Management Association (MGMA) or the American Medical Group Associations) AMGA are commonly used in the healthcare industry. Organizations lean on them for...more
The National Security Agency (NSA), in coordination with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI) and cybersecurity agencies from Australia, New Zealand, and the...more
A recent breach involving Indian fintech company Kirana Pro serves as a reminder to organizations worldwide: even the most sophisticated cybersecurity technology cannot make up for poor administrative data security hygiene....more
A few weeks ago, at the Trade and Cargo Security Summit, held in New Orleans, we learned that CBP (Customs and Border Protection) WAS NOT going to discuss the current administration’s policy during the conference. (Cue the...more
The Washington Post (2013) found that one-sixth of all embezzlement cases in the U.S. involve nonprofit and religious organizations, ranking just behind the financial sector. This statistic is jarring but not entirely...more
The “Sovereign Citizen Movement” is a term used to describe the growing number of individuals who deny the authority and / or legitimacy of the U.S. government. While the “SovCit” movement originated decades ago, there...more
As cross-border litigation and regulatory investigations become increasingly common, document review professionals and providers are frequently tasked with reviewing documents spanning multiple languages....more
One would think an artificial intelligence company would be sensitized to the risk of AI hallucination in legal citations. One would be wrong. In Concord Music Group, Inc. v. Anthropic PBC, Magistrate Judge Susan Van Keulen...more
We have published a client guide to legal professional privilege under English law. This guide comprises: A decision tree: intended as a quick reference to help determine which documents can legitimately be withheld on...more
The Commodity Futures Training Commission’s (“CFTC”) Division of Market Oversight and Division of Clearing and Risk issued an advisory (the “Staff Advisory”) reminding designated contract markets (“DCMs”) and derivatives...more
Welcome to the award-winning FCPA Compliance Report, the longest-running podcast in compliance. This is a very special episode. Today, Tom Fox cross-posts an episode from the BCG Podcast. In it, host Hanjo Siebert visits with...more