AI Risks for Government Contractors: Navigating Disputes and Litigation
Navigating GSA Audits Compliance Strategies and Best Practices
What’s the Tea in L&E? Is There Such a Thing as a Purely Verbal Counseling?
California Employment News: Synthesizing Evidence in a Workplace Investigation (Part 3)
Pamela Para on Effective Investigations in Healthcare
Jannica Houben and Katarzyna Golonka on Complex Investigations
Ashley Coselli and Daniel Wendt on Difficult Anti-Corruption Due Diligence Projects
Practical Training for Project Managers & Supervisors Two-Part Webinar Series: Part Two
Legal Use Case 7 Part II: The Prescription
[Webinar] Common Massachusetts Cannabis Business Compliance Pitfalls
Department of Labor Imposes Additional Requirement on Employer-Provided Health Services
Compliance Perspectives: Compliance Officer Liability Risk
Navigating the New Normal: Risk Management and Legal Considerations for Real Estate Companies
Search Warrant Protocol: Stop a Bad Day from Getting Worse [More with McGlinchey Ep. 6]
Maximizing PPP Loan Forgiveness | Webinar
Nota Bene Episode 76: The Impact of COVID-19 on Force Majeure Clauses in Business Contracts
Podcast: Questions & Concerns About Documentation: A Conversation with Colin Adams, M-III Partners
Podcast: Credit Funds: Replacing LIBOR – Steps To Consider Taking Now
Cybersecurity in the investment management industry
This Week in FCPA-Episode 80, The Last Jedi Edition
A HIPAA compliance assessment is an evaluation of an organization's practices, policies, and procedures to ensure that they align with requirements from the Health Insurance Portability and Accountability Act (“HIPAA”). It...more
A Written Information Security Plan, or “WISP,” is essential for any organization that handles sensitive personal information. Here’s a quick breakdown of who needs a WISP and why, as well as a checklist to develop one:...more
In the global trade universe, where time holds huge importance, weak security practices in your international operations could be detrimental to your business. Customs and Border Protection (CBP), the folks behind CTPAT, are...more
When I think of a portal my mind goes immediately to science fiction gateways in time. The literary skills of H.G. Wells in the classic Time Machine, or some of the works of Michael Crichton. Traversing the fantastical realms...more
Over the last week, organizations around the globe have struggled to bring operations back online following a botched software update from cybersecurity company CrowdStrike. As the dust settles, affected organizations should...more
At the recent In-House Counsel Seminar, three Ward and Smith attorneys presented a realistic role play response to an incidence of wire fraud, addressing red flags associated with fraudulent communications, corporate incident...more
In December 2023, European Union (EU) lawmakers reached an agreement on the EU AI Act. In our prior article titled “An Introduction to the EU AI Act,” we focused on the applicability, timing, and penalties of the EU AI...more
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the UK National Cyber Security Centre (UK NCSC), along with partner agencies from 17 nations, have released Guidelines for Secure AI System Development (the...more
As businesses expand their operations across continents, navigating the complex web of immigration processes becomes essential. However, these processes can often be a daunting maze filled with paperwork, deadlines, and...more
This program is designed to ensure that you and your business stay prepared and in compliance with new developments in federal and Illinois labor and employment laws. You'll gain invaluable insights on a range of topics...more
The National Association of Insurance Commissioners (NAIC) has issued a model bulletin exposure draft on the use of algorithms, predictive models and artificial intelligence (AI) systems by insurers. In short, users of...more
The proliferation of U.S. sanctions and other regulations affecting cross-border transactions has implications for directors, who may be personally liable for violations in some cases. Meanwhile, the Securities and Exchange...more
US and EU Life Sciences Law firms Fieldfisher & Gardner Law recently held a CLE event in Silicon Valley covering Healthcare Compliance, Data Privacy and Regulatory hot topics for MedTech and Pharma companies. Discussion...more
How do you ensure that your business complies with every law, rule, and regulation that governs its operations? Are you doing everything you can to write sound policies, monitor compliance, and respond to issues?...more
The Defense Federal Acquisition Regulation Supplement (DFARS) is a set of rules that apply to federal defense contractors with access to Controlled Unclassified Information (CUI) and Covered Defense Information (CDI). Defense...more
Our Virtual Regional Healthcare Compliance Conferences provide updates on the latest news in regulatory requirement, compliance enforcement, and strategies to develop effective compliance programs. Watch, listen, and ask...more
Benjamin Franklin once said, “The handshake of the host affects the taste of the roast.” He was right: a simple handshake introduction can be telling, not least of all in the context of internal investigations. Most obvious,...more
A new guidance document from the FDA lists considerations and suggested steps to reduce the likelihood of cybersecurity breaches in medical devices....more