Episode 371 -- DOJ's New Corporate Enforcement Program
Everything Compliance: Episode 154, The Law Firms in Trouble Edition
Compliance Tip of the Day: Measuring Compliance Training Effectiveness
SBR-Author’s Podcast: The Unseen Life of an Undercover Agent: A Conversation with Charlie Spillers
Daily Compliance News: May 19, 2025, The Definition of Corruption Edition
10 For 10: Top Compliance Stories For the Week Ending May 17, 2025
Daily Compliance News: May 15, 2025, The Downfall in Davos Edition
Daily Compliance News: May 14, 2025, The Widened Whistleblower Program Edition
Everything Compliance: Episode 153, The CW 25 Edition
The JustPod: A Discussion with Defense Counsel Rocco Cipparone and Angie Levy on January 6 Prosecutions
Compliance into the Weeds: USRA Declination Case Study - Self-Disclosure Best Practices
False Claims Act Insights - Trump DOJ Sharpens Its Focus on Healthcare Fraud
Daily Compliance News: May 1, 2025, The 100 Days of Corruption Edition
Podcast - Every Case Is a New World
Episode 366 -- DOJ Issues Data Security Program Requirements
Episode 365 -- Four Sanctions Cases Everyone Should Know
False Claims Act Insights - DOJ’s Reliance on FCA to Pursue Covid-Related Fraud
Compliance into the Weeds: The Uncertain Future of Compliance Monitors under the Trump Administration
The Presumption of Innocence Podcast: Episode 59 - Enforcement Priorities of the Second Trump Administration: DOJ Focus
10 For 10: Top Compliance Stories For the Week Ending April 12, 2025
In light of recent reports of cyberattacks on telecommunications companies, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) issued a series of reports and statements recommending secure communications,...more
While the balance of security, privacy, and public safety has always been a concern, recent cyberattacks have highlighted conflicting guidance by United States government officials, creating potential pitfalls for businesses....more
With six months into the Biden Administration, American Conference Institute invites you to join one-hour Complimentary Webinar on U.S.-China Export & Cyber Controls, which will take place on June 30th at 1:00pm EDT. The...more
On May 12, 2021, President Biden issued an Executive Order on Improving the Nation’s Cybersecurity following a series of highly publicized cybersecurity incidents during the first four months of his presidency, including the...more
Report on Supply Chain Compliance 3, no. 23 (December 10, 2020) - Officials from the United Kingdom, United States, Australia, New Zealand, Canada, India and Japan released a statement calling for big tech firms to allow...more
IN THIS ISSUE • Anticorruption Developments • Export Control Sanctions and Customs Enforcement • Export Control and Sanctions Developments • Global Investigations Resources • Writing and Speaking Engagements ...more
On November 29, 2018, in a speech at the Georgetown University Law School, Deputy Attorney General Rod Rosenstein renewed his call for tech companies to build into their products the means for law enforcement to legally...more
In the ongoing and contentious litigation between Uber and Google's autonomous (self-driving) vehicle unit (Waymo v. Uber), allegations have arisen that one party has hidden relevant information, in part by use of...more
In this month's edition of our Privacy & Cybersecurity Update, we examine the European Commission's annual review of the Privacy Shield, a potential threat to the European Union's "standard contractual clauses," a push by...more
Texas-based e-commerce company Zaappaaz, Inc.—doing business as WB Promotions, Inc., Wrist-Band.com, and Customlanyard.net—and its president both agreed to plead guilty to conspiring to fix prices for customized promotional...more
This issue of Skadden’s semiannual Cross-Border Investigations Update takes a look at recent cases and enforcement trends, including proposed amendments to China’s commercial bribery law, the use in U.S. courts of compelled...more
On June 6, 2016, during a speech at a Cybercrime Symposium co-organized by the Centers for Strategic and International Studies and the Department of Justice’s (“DOJ”) Computer Crime and Intellectual Property Section,...more
Just before the 2016 Memorial Day holiday weekend in the United States, which falls at the end of May, news outlets reported that the bipartisan effort to revolutionize the regulation of cryptography in the United States was...more
A pair of recent cases pitted the U.S. Department of Justice (DOJ) against Apple, Inc. (Apple) in a Herculean struggle between asserted interests in national security and privacy. In both cases, the DOJ relied on the same...more
On April 13, 2016, Senate Intelligence Committee Chairman Richard Burr (R-NC) and Vice Chairwoman Dianne Feinstein (D-CA) released a new draft of a bill that would effectively prohibit unbreakable encryption and require...more
In the ongoing iPhone encryption battle between the Department of Justice (“DOJ”) and Apple, March 22, 2016 might have been a pivotal moment in the national discourse on digital privacy rights, encryption, and the bounds of...more
In what is quickly becoming one of the closest-watched cases in the country, Apple is now at loggerheads with the Department of Justice and FBI over its refusal to unlock the iPhone of one of the San Bernardino shooters....more
The Justice Department’s dispute with Apple related to encryption on the iPhone used by one of the San Bernardino shooters has reinvigorated the national debate on digital privacy. Though it is not clear how the California...more
Apple must help the FBI unlock an iPhone used by one of the attackers in the San Bernardino, Calif. assault in December, a federal magistrate judge ruled this week. The ruling handed the government an important victory in an...more
On January 25, 2016, at the State of the Net Internet Policy Conference in Washington, D.C., Assistant Attorney General Leslie Caldwell from the Department of Justice and Commissioner Terrell McSweeny from the Federal Trade...more
Everyone in healthcare knows that the next round of HIPAA audits is coming. Covered entities and business associates have long been advised to review and update their HIPAA security risk analyses, have business associate...more
As technology developers continue to push the envelope on services and applications affecting the daily lives of consumers, the intersection of technology and privacy is becoming increasingly fraught with legal implications...more
In This Issue: - Five Core antitrust Principles For mergers of health insurers By: James M. Burns. On July 9, WellPoint and Amerigroup, two prominent health insurers, announced that they intended to merge in a...more