Steps Your Nonprofit Can Take to Mitigate Fraud Risks - Part 2
Fraud Risks at Nonprofit Organizations - Part 1
Digital Planning Podcast Episode: Estate Planning and the Corporate Transparency Act
The Presumption of Innocence Podcast: Episode 38 - A Blueprint for Compliance: The Fraud Pentagon Theory
FCA Uncovered: Mitigating Risk in the Regulatory Spotlight — Regulatory Oversight Podcast
Tackling Credit Push Fraud: Understanding Nacha's Risk Management Package (Part Two) — Payments Pros: The Payments Law Podcast
False Claims Act Insights - Think You Know Whistleblowers? Think Again.
PilieroMazza Annual Review What DOJ’s Annual FCA Report Means for Government Contractors
Ad Law Tool Kit Show – Episode 6 – Mitigating Class Action Exposure
Compliance into the Weeds: The ACFE 2024 Anti-Fraud Technology Benchmarking Report
AD Nauseam: Cabbage Soup v. Keto Diet: The Evolving FTC and NAD Approach to Post-Holiday Weight Loss Claims
The Justice Insiders Podcast: The Sam Bankman-Fried Trial: Defendants Testifying (Poorly), FOMO, and How to Actually Blame Lawyers
Detecting Fraud in New Jersey Workers' Compensation
The Presumption of Innocence Podcast: Episode 25 - An Investigative Journalist’s Insight Into the COVID-19 Fraud Strike Force
Medical Device Legal News with Sam Bernstein: Episode 11
JONES DAY TALKS®: Looking for ESG Fraud – CFTC Solicits Carbon Markets Whistleblowers
ChatGPT Risks for Compliance Programs
The Justice Insiders Podcast: Varsity Blues Reversals Turn DOJ Red
Giving Compliance Advice
Crypto Enforcement Actions - The Crypto Exchange Podcast
Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the week of June 17-23. Here’s what’s...more
In the ever-evolving business operations landscape, the early identification and containment of compliance risks has become a paramount concern for organizations worldwide. As someone deeply involved in both government and...more
On May 30, the Benelux department of ACEDS (Association of Certified eDiscovery Specialists) is organizing an exclusive event in Amsterdam. Are you interested in the latest developments in the field of artificial...more
Corporations need to do more internal investigations than ever before. They need investigations to be able to respond adequately and timely to requests from regulators....more
Corporate fraud is rampant - and nearly half of companies aren’t even investigating it. That’s the message from PwC’s Global Economic Crime and Fraud Survey 2020, which surveyed more than 5,000 companies globally about...more
Increased cellular speed through mobile devices offer increased opportunity for fraudsters to circumvent corporate IT controls by using shadow IT platforms to infiltrate proprietary and confidential data at scale, wreak havoc...more
Firm Administration – Expense Reporting – Oversight – Discipline - Trick or Treat Editors' Note: Aside from a global pandemic, is there anything more bizarre and troubling than lawyers stealing seemingly paltry sums from...more
Eliminating the risk of business email compromise (BEC) attacks requires all parties to a financial transaction to pay close attention to email security, financial controls, and communication protocols. Key Points: ...more
Power Company Fined for Contractor Copying Data to its Own Insecure Network - Vendor management continues to be a problem for all industries, but some are scarier than others. The North American Electric Reliability Corp....more
In United States v. Nosal, 676 F.3d 854 (9th Cir. 2012) (en banc), the court held that the Computer Fraud and Abuse Act, 18 U.S.C. § 1030, prohibits unlawful access to a computer but not unauthorized use of computerized...more