Compliance in the Former Soviet Central Asian Republics
Inside a $175M Deal: Tim McLoughlin & Joshua Hayes Live From RDU Startup Week
Tariffs and Trade Series: What Investors Need to Know
Managing Sanctions Compliance
Understanding Human Trafficking and Modern Slavery: A Business Imperative with Clint Palermo
Adventures in Compliance: The Novels – A Study in Scarlet, Introduction to Compliance Lessons
FCPA Compliance Report: Ellen Hunt on Compliance ROI and on a Due Diligence and the US Sentencing Guidelines
FCPA Compliance Report: Amanda Carty on a Due Diligence and Risk Management
Podcast - What Are Joint Ventures and When Should They Get Cleared?
The Demystification of Employee Retention Credits for Private Equity Deals — PE Pathways Podcast
OG Talks: Good Energy and Navigating Transactions
M&A Considerations for Serial Acquirers
PODCAST: Williams Mullen's Trending Now: An IP Podcast - IP and M&A Transactions
Implementing IP Best Practices to Maximize Exit Value
Tech Debt is Common. What does it mean for IPO readiness from a cybersecurity perspective?
Due Diligence in AI: Thinking like your biggest critic
Due Diligence in AI: 3 things you need to survive AI scrutiny
A Third Party's Perspective on Third Party Risk
The EU Corporate Sustainability Due Diligence Directive
Regulatory Phishing Podcast - The Impact of Cybersecurity Compliance on Corporate Transactions
M&A in the AI sector is redefining deal risk, especially when sensitive data is involved. As AI companies power breakthroughs in biotech, healthcare, defense, and critical infrastructure, the stakes for companies acquiring...more
Many expect that deal activity will increase in 2025. As we approach the end of the first quarter, it is helpful to keep in mind privacy and data security issues that can potentially derail a deal. We discussed this in a...more
In the realm of mergers and acquisitions (M&A), due diligence is a critical phase where a buyer’s acquisition team assesses potential risks and opportunities before finalizing the terms of an agreement to purchase its target...more
The only thing truly certain about the proposed U.S. outbound investment regulatory regime is that a lot of uncertainty remains. But industry responses garnered during the comment period may, at least partly, foretell the...more
Cyber risks are increasing, and as a result, due diligence inquiries and valuations are increasingly focusing on the cybersecurity and privacy risks inherent in a business’s collection, use, retention and disposal of data. ...more
When entering into any merger or acquisition (both a stock deal and an asset deal), there are numerous privacy and data security issues that must be evaluated and addressed from the beginning. Most companies in today’s online...more
Privacy and security diligence has become standard in M&A transactions, but a one-size-fits-all approach won’t work. While form questionnaires have their place, companies need to know when to take a deeper, more technical...more
Now that DOD has released the final version of the Cybersecurity Maturity Model Certification (CMMC) guidelines, all contractors that work directly or indirectly on Department of Defense (DOD) contracts should be preparing to...more
The Need for Cyber Due Diligence in M&A Transactions - As technology continues to advance, allowing more companies to collect, share, and use data, privacy and cybersecurity due diligence in the M&A context becomes even more...more
Cybersecurity and protection of sensitive data from external and insider threats are critical for federal contractors across all industries and in all market positions. Each significant data breach or cyber incident and...more
As data is quickly becoming a significant corporate asset, lawyers in corporate transactions need to consider the associated legal risks. Failure to understand and address these risks can result in significant future costs to...more
Cyber due diligence is quickly becoming the “new normal” for buyers in M&A transactions as they seek to protect themselves against cyber risk. Cyber due diligence, however, is only part of the solution. Many sophisticated...more
When a company is acquired, the buyer ultimately becomes responsible for the data security practices of the company that it acquired. This is true with regard to litigation risks, reputational risks, and regulatory risks. ...more
Almost all parties are required to exchange personal data as part of a merger and acquisition transaction. With data breaches on the rise, any buyer in a M&A transaction cannot afford to ignore privacy and data security...more