California Employment News: Gathering Information in a Workplace Investigation – Part 2 (Featured)
Compliance Tip of the Day: Podcasting for Compliance Training
Compliance Tip of the Day: Compliance Training Frequency
Compliance Tip of the Day: Using Supply Chain to Innovate in Compliance
Innovation in Compliance: Innovative Approaches to Compliance and Training with Catherine Choe
Work This Way: A Labor & Employment Law Podcast | Episode 46: The 2025 Greenville SHRM Conference with Tyler Clark and Brittany Goforth of GSHRM
Compliance tip of the Day: Communication Through Persuasion
Compliance Tip of the Day: Middle Managers as the Eyes and Ears of Compliance
Joe Green & Monica Rodriguez Kuniyoshi on Integrating Generative AI with Your Experts - Passle CMO Series Podcast RE-RELEASE:
Compliance Tip of the Day – Role of Chatbots in Compliance
FCPA Compliance Report: Kristy Grant-Hart on A 360° Review of the Future of Compliance
Compliance Tip of the Day: Embedded Compliance
A Blueprint for Efficient SRRs: Mastering Your Subject Rights Workflow
Law School Toolbox Podcast Episode 496: The Early BigLaw Recruiting Timeline (w/Sadie Jones)
Whistleblower Challenges and Employer Responses: One-on-One with Alex Barnard
Compliance Tip of the Day: Compliance By Design
Podcast - Parting Thoughts: Be a "Peddler of Common Sense"
Podcast - How to Use Humor and Anger Effectively in the Courtroom
Podcast - At Trial, Less Is More
Enhancing Workplace Feedback: Lessons From Harry Potter — Hiring to Firing Podcast
Physician compensation benchmarks like those from the Medical Group Management Association (MGMA) or the American Medical Group Associations) AMGA are commonly used in the healthcare industry. Organizations lean on them for...more
The National Security Agency (NSA), in coordination with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI) and cybersecurity agencies from Australia, New Zealand, and the...more
A recent breach involving Indian fintech company Kirana Pro serves as a reminder to organizations worldwide: even the most sophisticated cybersecurity technology cannot make up for poor administrative data security hygiene....more
A few weeks ago, at the Trade and Cargo Security Summit, held in New Orleans, we learned that CBP (Customs and Border Protection) WAS NOT going to discuss the current administration’s policy during the conference. (Cue the...more
The Washington Post (2013) found that one-sixth of all embezzlement cases in the U.S. involve nonprofit and religious organizations, ranking just behind the financial sector. This statistic is jarring but not entirely...more
The “Sovereign Citizen Movement” is a term used to describe the growing number of individuals who deny the authority and / or legitimacy of the U.S. government. While the “SovCit” movement originated decades ago, there...more
As cross-border litigation and regulatory investigations become increasingly common, document review professionals and providers are frequently tasked with reviewing documents spanning multiple languages....more
One would think an artificial intelligence company would be sensitized to the risk of AI hallucination in legal citations. One would be wrong. In Concord Music Group, Inc. v. Anthropic PBC, Magistrate Judge Susan Van Keulen...more
We have published a client guide to legal professional privilege under English law. This guide comprises: A decision tree: intended as a quick reference to help determine which documents can legitimately be withheld on...more
The Commodity Futures Training Commission’s (“CFTC”) Division of Market Oversight and Division of Clearing and Risk issued an advisory (the “Staff Advisory”) reminding designated contract markets (“DCMs”) and derivatives...more
All of us have been conditioned to worship at the altar of efficiency. I’ve watched countless people try to optimize their schedules down to the minute, transforming their professional lives into a series of predictable...more
As a business grows and adds new members to the team, it can be difficult to identify what role each person plays and their level of authority. While some have the ability to make important decisions on behalf of the...more
The National Security Agency’s Artificial Intelligence, Security Center (AISC), together with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Australian Signals...more
Audit preparedness is essential for every clinical research site. By operationalizing compliance in your daily procedures, you can effectively mitigate risk and ensure smooth inspections. Start by thoroughly educating key...more
Attend ACI's 19th Annual BIG FOUR Pharmaceutical Pricing Boot Camp for an intensive online bootcamp that will provide you with a thorough understanding of essential government contracting processes and pricing concepts for...more
Cross-jurisdiction cooperation in the fight against international corruption and bribery is intensifying. The UK’s Serious Fraud Office (SFO), France’s National Financial Prosecutor’s Office (PNF), and Switzerland’s Office of...more
Cyber security supply chain risks are growing, and attacks on vendors and other third parties cause severe disruption to businesses. For example, in recent years we have seen many incidents that have involved threat actors...more
While technology plays a pivotal role in cybersecurity, the human element is equally crucial. An organization's culture can significantly influence the effectiveness of its cybersecurity measures. A strong cybersecurity...more
The number one risk for trade secrets exfiltration is from insider threats—employees, contractors, or even executives with access to sensitive information who either intentionally or accidentally compromise it. Sometimes it’s...more
Welcome to “Compliance Tip of the Day,” the podcast where we bring you daily insights and practical advice on navigating the ever-evolving landscape of compliance and regulatory requirements. Whether you’re a seasoned...more
Innovation comes in many areas, and compliance professionals need to be ready for it and embrace it. Join Tom Fox, the Voice of Compliance, as he visits with top innovative minds, thinkers, and creators in the award-winning...more
Step into Wonderland and ensure you’re equipped to handle intellectual property theft investigations by seeing the entire picture of what’s on employee’s devices — even deleted data. Take a Curious Stroll Through the...more
As cyber threats become increasingly sophisticated, traditional security models that rely on perimeter defenses are no longer sufficient. Zero Trust Architecture (ZTA) offers a modern approach to security that assumes no user...more
Artificial intelligence (AI) as a field encapsulates machine learning, deep learning and generative AI. As the impact of these technologies continues to grow, industry leaders and regulators have been grappling with how to...more
Healthcare is a very personal experience. In order to receive the best care, individuals must share the most intimate details about themselves. For this reason, trust between patients and healthcare providers is crucial. Data...more