Episode 372 -- DOJ Applies False Claims Act to Tariff and Trade Violations
Hot Topics in International Trade - Tariff Mitigation Strategies
Daily Compliance News: May 30, 2025, The Leissner Sentenced Edition
Regulatory Ramblings: Episode 70 – Lessons for Compliance from a Law Enforcement Career + Regional Geopolitical Risks in 2025 with Mark Nuttall and Steve Vickers
Daily Compliance News: May 21, 2025, The I Want You Back Edition
Hot Topics in International Trade Terrified by Tariffs Braumiller Law
2 Gurus Talk Compliance: Episode 52 – The Big Jet Plane Edition
10 For 10: Top Compliance Stories For the Week Ending May 10, 2025
Daily Compliance News: May 6, 2025 the Made in China Edition
Daily Compliance News: May 5, 2025, The Washing Edition
Daily Compliance News: April 30, 2025, The 4 AM Wake-Up Call Edition
10 For 10: Top Compliance Stories For the Week Ending April 26, 2025
Daily Compliance News: April 25, 2025, The Trouble in Travel Edition
What's the Buzz in the Battery World With Roger Miksad, BCI – Battery + Storage Podcast
State AG Pulse | “Don’t Mess With Our Health or Our Kids!”
Daily Compliance News: April 21, 2025, The Tribute to Pope Francis Edition
Daily Compliance News: April 17, 2025, The Musk Fights BEE's Edition
Tit For Tat US China Trade War
Daily Compliance News: April 14, 2025, The Cascade of Corruption Edition
Sunday Book Review: April 13, 2025, The Books on Trade and Tariffs Edition
This monthly report outlines key developments in China’s data protection sector for March. The following events merit special attention...more
New York, Texas, and Virginia are the first states to ban DeepSeek, the Chinese-owned generative artificial intelligence (AI) application, on state-owned devices and networks....more
Revised regulations restricting investments in Chinese companies developing semiconductors and microelectronics, quantum information technologies, and artificial intelligence systems are taking shape and could soon be in...more
On June 21, 2024, the Biden administration rolled out its outbound investment screening regulations. Last year, the Biden administration published an advanced notice of proposed rulemaking (ANPRM) that outlined the broad...more
On June 21, 2024, the US Department of the Treasury (Treasury) released proposed new federal regulations (Proposed Rules) that, if implemented, would prohibit or require notification of a broad range of outbound investment...more
In one of the most clear-eyed and sobering assessments of the cyberthreat China poses to our nation’s critical infrastructure, the country’s foremost cybersecurity leaders recently testified that the Chinese Communist Party...more
Over the last several months, companies have become entangled in an increasingly complex web of new and expanded sanctions and export control restrictions related to Russia in response to its war on Ukraine. The current...more
A recent executive order issued by President Biden aims to prohibit or oversee investments in certain sensitive technologies that could threaten the national security of the United States. The executive order, which was...more
The National Institutes of Science and Technology (NIST) Information Technology Laboratory recently released guidance entitled “Software Supply Chain Security Guidance,” in response to directives set forth in President...more
China’s State Council on August 17 released the Critical Information Infrastructure Security Protection Regulations (“Regulations”) effective September 1, a key administrative regulation in the implementation of the 2016...more
On January 9, 2021, the Biden Administration issued Executive Order (EO) 14034, to further address the declared national emergency with respect to the information and communications technology and services (ICTS) supply...more
The new measure, which will come into effect on June 1, 2020, will potentially affect operators of critical information infrastructures as well as their domestic and overseas suppliers. Affected companies should now take...more
Hackers who targeted airport currency exchange mainstay Travelex in a ransomware attack on New Year’s Eve have alerted British media that they possess 5 GB of sensitive customer data from the company “since gaining access to...more
Facebook wages a war on misinformation. On Monday, Facebook announced it will start removing videos altered by artificial intelligence that are likely to mislead people into thinking that a subject of the video made...more
Vicious malware continues to be deployed by China-based attackers. A new strain of malware, dubbed “HiddenWasp,” which has the ability to remotely infect computers, has been discovered by a security researcher at Intezar. The...more
The Chinese government has recently issued a flurry of regulations and standards, several in draft form for public comment, to implement the Cybersecurity Law. These mostly reflect a lengthy policy development process...more
The cybersecurity classified protection regime attracted significant attention when it was included in the Peoples Republic of China (PRC) Cyber Security Law promulgated in 2017 (the CSL). The CSL mandates that network...more
On May 15, 2019, President Trump issued an executive order (EO), "Executive Order on Securing the Information and Communications Technology and Services Supply Chain," prohibiting certain transactions involving...more
In an effort to phase out what many in the security world believe are threats to the cybersecurity posture of governmental agencies and private entities alike...more
This is the fifth blog post in a series analyzing the 2019 National Defense Authorization Act (NDAA) as signed into law on Aug. 13, 2018. Stay tuned for more blog posts covering additional topics in the near future from...more
On December 29, 2017, the Standardization Administration of China, jointly with the PRC General Administration of Quality Supervision, Inspection and Quarantine, issued the Information Security Technology – Personal...more
China's 2015 State Security Law, which substantively amended and supplemented its first version issued in 1993, lays down the foundations for cyber security review. The law provides that the state needs to build a network and...more
The Securities and Exchange Commission (SEC) settled a Foreign Corrupt Practices Act (FCPA) enforcement action against an individual earlier this month when it announced the resolution of a matter involving Jun Ping Zhang,...more