Compliance in the Former Soviet Central Asian Republics
Inside a $175M Deal: Tim McLoughlin & Joshua Hayes Live From RDU Startup Week
Tariffs and Trade Series: What Investors Need to Know
Managing Sanctions Compliance
Understanding Human Trafficking and Modern Slavery: A Business Imperative with Clint Palermo
Adventures in Compliance: The Novels – A Study in Scarlet, Introduction to Compliance Lessons
FCPA Compliance Report: Ellen Hunt on Compliance ROI and on a Due Diligence and the US Sentencing Guidelines
FCPA Compliance Report: Amanda Carty on a Due Diligence and Risk Management
Podcast - What Are Joint Ventures and When Should They Get Cleared?
The Demystification of Employee Retention Credits for Private Equity Deals — PE Pathways Podcast
OG Talks: Good Energy and Navigating Transactions
M&A Considerations for Serial Acquirers
PODCAST: Williams Mullen's Trending Now: An IP Podcast - IP and M&A Transactions
Implementing IP Best Practices to Maximize Exit Value
Tech Debt is Common. What does it mean for IPO readiness from a cybersecurity perspective?
Due Diligence in AI: Thinking like your biggest critic
Due Diligence in AI: 3 things you need to survive AI scrutiny
A Third Party's Perspective on Third Party Risk
The EU Corporate Sustainability Due Diligence Directive
Regulatory Phishing Podcast - The Impact of Cybersecurity Compliance on Corporate Transactions
The mining sector is increasingly at risk from cyber attacks, and many companies are racing to defend themselves against the backdrop of a rapidly changing threat landscape. Ross Phillipson and Anna Rudawski explore what is...more
The productivity paradox: Does more technology mean less growth? Nobel Prize-winning economist Robert Solow famously remarked, “You can see the computer age everywhere except in the productivity statistics.” This paradox...more
Editor's Note: In a significant study from MIT's CSAIL, researchers have unveiled vulnerabilities in smartphone ambient light sensors, highlighting them as potential channels for privacy breaches. This discovery underscores...more
Most people know what a deepfake is but have not put much thought into how it could affect business operations. Deepfakes are videos, pictures, or audio that have been convincingly manipulated to misrepresent a person saying...more
In recent years, especially through 2019 and 2020, the cyber insurance market in the U.S. has seen significant growth. Middle-market companies have been actively requesting cyber insurance policies with low rates and broad...more
Online sports betting has become a booming industry in recent years, with millions of people placing bets and wagers from their phones and computers. Ever since Murphy v. NCAA, the 2018 case in which the United States Supreme...more
The steady decoupling of the world’s two biggest economies has turned up the heat in the Indo-Pacific, and as great power competition intensifies, tensions are beginning to boil. Decades of economic development and US-led...more
Cyber risks are increasing, and as a result, due diligence inquiries and valuations are increasingly focusing on the cybersecurity and privacy risks inherent in a business’s collection, use, retention and disposal of data. ...more
The Canadian Institute’s 11th Annual Forum on U.S. Export & Re-Export Compliance for Canadian Operations will take place in Toronto on January 25–27! IN-PERSON and LIVESTREAM options available. Over the last decade, this...more
ACI’s and C5’s 10th Edition of Fraud, Asset Tracing & Recovery Miami conference is returning on January 24 – 25, 2022 in person! Deemed as the foremost, can’t-miss event for the Fraud community, it gathers the pre-eminent...more
Discussing third-party risk can be akin to opening Pandora’s box. Once you start discussing third-party risks, the conversation becomes quite complex, involving multiple stakeholders and outside organizations. All...more
Report on Patient Privacy 21, no. 10 (October, 2021) - Conducting a risk analysis is a basic tenet of security compliance, with the overarching goal of understanding where protected health information (PHI) “lives” in an...more
Compliance teams looking to stay ahead of the changing landscape need to be up to date on the latest developments. Join us for Global Compliance Updates in collaboration with the DIFC Academy, on 2–3 November 2021. This...more
As reported last week, a state-sponsored hacker may have breached multiple U.S. government networks through a widely-used software product offered by SolarWinds. The compromised product, known as Orion, helps organizations...more
The UK financial services regulators speak loudly and often about their forward-looking approach to supervision, which – rather than looking back – seeks to focus on future risks to firms and consumers. Yet, you only have to...more
Much of the world’s focus is on the COVID-19 pandemic, and rightfully so, but sanctions regulators also have their gazes fixed on another issue: the maritime industry. On May 14 2020, we saw the U.S. Departments of State and...more
In the latest edition of The Fine Print we highlight our Melbourne attorneys in addition to articles covering intellectual property due diligence, protecting your personal information in light of the Starwood/Marriott data...more
In 2016, Marriott International announced its acquisition of Starwood Hotels & Resorts Worldwide. Coined by Marriott as a "smooth transaction," the announcement of the acquisition received an overwhelmingly positive response....more
Marriott announced a major data breach, perhaps one of the largest in history. This breach illustrates the often made point that breaches and intrusions happen and go unnoticed for months or years....more
Cyber due diligence is quickly becoming the “new normal” for buyers in M&A transactions as they seek to protect themselves against cyber risk. Cyber due diligence, however, is only part of the solution. Many sophisticated...more
In this hoganlovells.com interview, Dr. Sebastian Lach discusses the massive liability shift that will occur as autonomous vehicles (AV) hit the roadways and the factors that will influence how insurers calculate risk....more
A company's board of directors has a duty to oversee all aspects of the company's risk management efforts. This includes a duty to recognize and minimize the company's exposure to cyber attacks. In today's increasingly...more
The risks associated with cyber-attacks and data breaches are growing in Canada and internationally and the costs associated with an organization preventing, detecting, responding to and recovering from such an incident can...more
Many of the largest retailer data security breaches have been caused or enabled by the acts or omissions of retailers’ vendors, such as the widely publicized incident at Target Corporation. Several such breaches occurred...more
As with the world economy, the shipping markets are currently experiencing a major bout of volatility. The wide range of matters we are handling in our maritime law practice certainly reflects the current swings the shipping...more