Innovation in Compliance: Navigating Regulatory Changes and Compliance in Trade and Data Privacy with Stephanie Font
Top Healthcare Compliance Priorities for 2025
AI Legislation: The Statewide Spotlight - Regulatory Oversight Podcast
Podcast - Who Owns Your DNA? Lessons Learned from 23andMe
AI Legislation: The Statewide Spotlight — The Consumer Finance Podcast
Business Better Podcast Episode: Bridging Campuses: Legal Insights on Education Industry Consolidation – Privacy and Data Security
The Next FCRA Frontier: Identity Theft and CFPB Updates — FCRA Focus Podcast
Episode 366 -- DOJ Issues Data Security Program Requirements
The Privacy Insider Podcast Episode 13: Preserving Privacy and Social Connection with Christine Rosen of the American Enterprise Institute
AI in Employment: Navigating the Legal Landscape with Lessons from I, Robot — The Good Bot Podcast
FCPA Compliance Report: AI, Data Compliance, and Ownership - A Conversation with Andrew Hopkins
Innovations in Compliance: Data Collection & Cybersecurity with ModeOne’s Matt Rasmussen and Ryan Frye
Fintech Focus Podcast | Responding to a Cyber Attack – Key Considerations for GCs and CISOs
A Blueprint for Efficient SRRs: Mastering Your Subject Rights Workflow
What is the CCF?
AI in Employment: Navigating the Legal Landscape with Lessons from I, Robot — Hiring to Firing Podcast
A Less is More Strategy for Data Risk Mitigation
Auditing Your Hotline and Case Management System
Compliance and AI: Ali Khan on Implementing AI Risk Management Systems
Weathering the 2025 Whirlwind: How to Keep Calm & Carry On
On April 28, 2025, Congress passed the “TAKE IT DOWN Act.” In addition to criminalizing intentional publication of non-consensual intimate imagery, including computer-generated intimate imagery (collectively, NCII), the bill...more
Twelve current and former tennis professionals filed a proposed antitrust class action in New York federal court on Tuesday, accusing the sport’s governing bodies of operating as a “cartel” that manipulates pay and rankings,...more
Law enforcement officers often request or demand that Idaho hospitals draw blood or conduct other tests on patients for law enforcement purposes; nevertheless, the general rule remains that patients (including persons in...more
Public-private partnerships across the world between financial institutions, financial intelligence units and investigative authorities have laid the foundation to advance criminal investigations. However, there is further...more
While data from mobile devices is more frequently responsive in civil litigation than ever before, “true crime” aficionados know it’s routinely useful in criminal investigations. We take our devices with us and use them...more
The January 30, 2025 issue of the New England Journal of Medicine contains an article entitled “Providing Interstate Telehealth Abortion Services to Patients in Restrictive States.” In the second sentence, the authors write:...more
On January 17, the District of Columbia Circuit issued a pivotal opinion regarding the Fifth Amendment rights of a defendant-appellant compelled by the FBI to unlock his cellphone using his thumbprint. The D.C. Circuit’s...more
Understanding what is the chain of suspicion in a legal setting is extremely important, especially when it comes to a digital forensic examiner. The chain of custody is suspicion for things like criminal defense work,...more
In Angelyn A. Olson et al. v. The Consilio LLC, et al. filed in Tarrant County, Texas, plaintiff Angelyn Olson alleged that she was involved in other litigation during which an e-discovery service provider (Consilio) was...more
Ohio Attorney General Dave Yost’s office asked a federal judge on Thursday to intervene in a lawsuit filed by the Cleveland Browns to test the “Modell Law,” a state law designed to stop teams from leaving cities that...more
When I reflect on the relationship that our firm has with our clients, I’m most proud of the fact that you can always count on us. That often means defending complex litigation, steering you through regulatory threats,...more
Corporations must innovate and set themselves apart from their competition to achieve long-term success, but they cannot act with reckless abandon in doing so. Rather, they must strategically plan their moves to proactively...more
In today’s world of cyber threats, many companies have fallen victim to ransomware attacks. Corporate boards and senior executives face serious issues when their companies are attacked. The payment of ransom is not only...more
There appears to be a bit of a lull in corporate prosecutions lately. The big banner cases tend to involve crypto firms rather than household names. There are a few significant settlements, such as in opioid cases, but we...more
Our Privacy, Cyber & Data Strategy and White Collar, Government & Internal Investigations teams offer key takeaways that companies should consider in the wake of the Justice Department’s first prosecution of a corporate...more
Discussion with two former senior prosecutors on how to handle cases involving Japanese multinational corporations - It is not unusual for the U.S. Department of Justice to investigate non-U.S. multinational corporations...more
Report on Patient Privacy 22, no. 6 (June, 2022) - A report from the HHS Health Sector Cybersecurity Coordination Center (HC3) found that in early 2022, ransomware groups increasingly turned to legitimate software during...more
Dr. Melissa Dark is the Founder of DARK Enterprises, a non-profit organization dedicated to developing and supporting cybersecurity education at the secondary level. Before that, Dr. Dark worked in graduate and college...more
Federal authorities have recently described the threat of economic espionage from foreign entities as one of the greatest threats to the economic vitality of the United States, and this has led to an increase in...more
Uber went big on Thursday. Unfortunately, for everyone (including fans of cinnamon gum and oversized gingers) it was Big Red, as the ride-hailing company posted a $5.2 billion loss for Q2—its largest ever since it began...more
The privacy rights of individuals can be a tricky business, especially when it comes to companies that land themselves in hot water when they inadvertently violate an individual’s privacy rights. But what happens in the case...more
North Dakota criminal law currently contains penalties for misusing the personal information of another. That law has been expanded, and beginning August 1, 2019, it is a class B felony to use a skimmer or scanning device to...more
Quite a start to the week for consulting powerhouse McKinsey & Co., with a Times expose on the questionable relationship between McKinsey’s clients and the investments its hedge fund has made in those same clients, not to...more
We interrupt this week’s Travel Edition blog posts to honor David Bowie, who died yesterday. To say his album Diamond Dogs was a revelation is simply because it is the only word which comes close. During my final semester in...more
Welcome to the third issue of Focus on China Compliance for 2015. According to the FCPA Blog’s October 2015 Corporate Investigations List, China leads the countries reported to be involved in FCPA investigations with 29...more