Compliance in the Former Soviet Central Asian Republics
Inside a $175M Deal: Tim McLoughlin & Joshua Hayes Live From RDU Startup Week
Tariffs and Trade Series: What Investors Need to Know
Managing Sanctions Compliance
Understanding Human Trafficking and Modern Slavery: A Business Imperative with Clint Palermo
Adventures in Compliance: The Novels – A Study in Scarlet, Introduction to Compliance Lessons
FCPA Compliance Report: Ellen Hunt on Compliance ROI and on a Due Diligence and the US Sentencing Guidelines
FCPA Compliance Report: Amanda Carty on a Due Diligence and Risk Management
Podcast - What Are Joint Ventures and When Should They Get Cleared?
The Demystification of Employee Retention Credits for Private Equity Deals — PE Pathways Podcast
OG Talks: Good Energy and Navigating Transactions
M&A Considerations for Serial Acquirers
PODCAST: Williams Mullen's Trending Now: An IP Podcast - IP and M&A Transactions
Implementing IP Best Practices to Maximize Exit Value
Tech Debt is Common. What does it mean for IPO readiness from a cybersecurity perspective?
Due Diligence in AI: Thinking like your biggest critic
Due Diligence in AI: 3 things you need to survive AI scrutiny
A Third Party's Perspective on Third Party Risk
The EU Corporate Sustainability Due Diligence Directive
Regulatory Phishing Podcast - The Impact of Cybersecurity Compliance on Corporate Transactions
What Is Vendor Onboarding? Vendor onboarding is the process of establishing a company as an approved provider of technology, goods, or services to your organization. It’s also an essential early step in the vendor risk...more
Keypoint: The New York State Department of Financial Services (NYDFS) issued an industry letter outlining the threats posed to U.S. companies who hire remote technology workers linked to North Korea and may embezzle funds...more
Effective information security is no longer just dependent on an organisation’s own internal cybersecurity controls. The UK Information Commissioner’s Office (ICO) highlights that third-party service providers are processing...more
Revised regulations restricting investments in Chinese companies developing semiconductors and microelectronics, quantum information technologies, and artificial intelligence systems are taking shape and could soon be in...more
In the aftermath of what could be one of the most widespread global information technology outages in history, organizations are putting a renewed focus on combating old vulnerabilities that can have cascading effects. ...more
On June 21, 2024, the Biden administration rolled out its outbound investment screening regulations. Last year, the Biden administration published an advanced notice of proposed rulemaking (ANPRM) that outlined the broad...more
...As the world grapples with the rapid advancement of artificial intelligence (AI) technologies, concerns about the potential risks and unintended consequences have understandably taken center stage. While some advocate for...more
Last week, Paul Hastings attended the Securities and Exchange Commission (SEC) Speaks 2024 event presented by the Practising Law Institute (PLI) in cooperation with the SEC on April 1 and 2. The SEC Speaks program provides...more
What is a Management Body? Under both DORA and NIS2, a management body can be a body with managerial and/or supervisory functions. The powers and structure of management bodies vary within the EU Member State, and managerial...more
StoneTurn Partner Sarah Keeling and Senior Adviser Richard Mackintosh host a discussion on the evolving risk landscape, examining geopolitical shifts, emerging threats in the Middle East, and the impact of AI on security....more
Numerous laws (U.K. Bribery Act guidance document, German Supply Chain Act, Foreign Corrupt Practices Act resource guide, OECD Due Diligence Guidance for Responsible Supply Chains of Minerals from Conflict-Affected and...more
Corporations make game-changing business decisions every single day. In 2021, over 23,500 merger and acquisition deals closed in the EU alone, with another 23,161 deal closures in the US....more
A Federal Trade Commission Civil Investigative Demand is an administrative subpoena utilized by the Federal Trade Commission (and other regulatory agencies, such as a state Attorney General) to obtain documentary materials...more
Before a deal closes on a merger or acquisition, due diligence investigation will ensue to confirm goal alignment and identify any obstacles present. There are several integral components of this process such as identifying...more
Cyber risks are increasing, and as a result, due diligence inquiries and valuations are increasingly focusing on the cybersecurity and privacy risks inherent in a business’s collection, use, retention and disposal of data. ...more
It’s common for eDiscovery professionals to talk about the “additional” use cases – beyond litigation – that have emerged in recent years for eDiscovery technology and workflows. Those use cases include data privacy...more
Find out why IT plays a critical role throughout the entire M&A process....more
In an era of increased M&A transactions, organizations must understand the risks and potential liabilities associated with the personal information they obtain on their customers, vendors, and employees....more
The concept of early case assessment (ECA) hasn’t changed with the times — the name of the game is still getting a clear, upfront picture of the issue at hand, as well as any liabilities or potential costs. But what has...more
For a whole decade, ACI’s U.S. Export & Reexport Compliance for Canadian Operations conference continues to stand apart as the only practical, comprehensive event of its kind for the export compliance community in Canada. ...more
Now that DOD has released the final version of the Cybersecurity Maturity Model Certification (CMMC) guidelines, all contractors that work directly or indirectly on Department of Defense (DOD) contracts should be preparing to...more
“To err is human,” but in an industry as seemingly driven by precision as eDiscovery, errors are all too common. Yes, mistakes are going to happen. Which is why we can fall back on processes and procedures to ensure that even...more
The concept of human rights due diligence is at the heart of the UN Guiding Principles on Business and Human Rights (“UNGPs“) and is finding its way into a growing body of legislation around the world...more
Due to the dramatic increase and changing nature of cyber risks, mergers and acquisitions due diligence should expand to address cyber risks, available risk mitigation practices, and available insurance. Acquiring companies...more
Global companies are getting compliance overload, especially when it comes to third party risks. As we have seen over the years, third-party risk management involves significant risks on anti-corruption, AML, fraud,...more