Compliance Tip of the Day: Crowd Sourcing Risk Intelligence
What is the CCF?
Compliance Perspectives: The FBI on Why and How to Work with the Office of the Private Sector
The Compliance Challenge: Managing Legal & Regulatory Risk
Webinar: How to Get Your Lawyers Sharing Successfully on LinkedIn - with @AdrianDayton
Polsinelli Podcasts - FDA Denies Amgen Citizen Petition in Biosimilar Dispute
FCPA Compliance and Ethics Report-Episode 51-Interview with Tim Haidar
ACADEMI's Suzanne Rich Folsom and PwC's Glenn Ware on Moral Hazard
What Companies Should Do to Prepare for Implementation of Cybersecurity Executive Order
Where Does the Cybersecurity Executive Order Hit and Miss the Mark?
What you need to know - • Japan’s Fair Trade Commission (“JFTC”) welcomed its new Chair, Mr. Eiji Chatani in May 2025. Chair Chatani’s enforcement priorities revolve around promoting innovation and reinvigorating Japan’s...more
One of the highly contested issues in antitrust in recent years contemplates in which circumstances, if any, the use of a pricing algorithm by competitors to set or influence pricing can violate the antitrust laws. We have...more
Last week, the Australian Government announced (link) plans to establish a national AI Safety Institute (AISI) in early 2026, marking a significant step toward ensuring the safe development and deployment of advanced...more
This Finance Alert provides an overview of the latest Financial Transactions and Reports Analysis Centre of Canada (FINTRAC) guidance to assist reporting entities (REs) that wish to participate in the recent voluntary...more
Congress included in the appropriations bill of November 12, 2025, an extension of the Cybersecurity Information Sharing Act of 2015 (CISA 2015), 6 U.S.C. §§ 1501–10, through January 30, 2026....more
A group of 40 Democratic lawmakers have sent a letter to 19 state governors warning that they may be “inadvertently sharing drivers’ data with federal immigration authorities.”...more
Cybersecurity risks are evolving, in part because bad actors – including scammers and fraudsters – are leveraging widely available artificial intelligence (AI) tools for nefarious purposes. In the escalating fraud landscape,...more
When the Colonial Pipeline ransomware attack paralyzed fuel distribution across the East Coast in 2021, both government and private entities raced to exchange cyber threat data to prevent further disruption....more
On October 15, 2025, Judge Jerry W. Blackwell of the United States District Court for the District of Minnesota granted in part and denied in part defendants’ motions to dismiss a multidistrict litigation alleging a...more
The expiration of the Cybersecurity Information Sharing Act of 2015 (CISA 2015 or the Act) on September 30, 2025 has quietly reshaped how organizations should approach cyber threat intelligence sharing. For the past decade,...more
The day before the recent federal government shutdown, a ten-year old cybersecurity law expired before it could be reauthorized. The Cybersecurity Information Sharing Act of 2015 (“CISA”) provided a mechanism for private...more
The recent shutdown of the federal government has left many critical services in limbo, including the nation’s primary cybersecurity agency. Amid the ongoing budget standoff in Congress, funding for the Cybersecurity and...more
On October 7, 2025, the Federal Communications Commission (FCC) released a draft Notice of Proposed Rulemaking (NPRM) that would seek comment on major reforms to its space and earth station licensing frameworks. The draft...more
On 9 September 2025, the UK Competition and Markets Authority (CMA) published new guidance on how competition law applies to recruiting workers, setting pay and other working conditions. The guidance builds on a recent string...more
On Tuesday, September 30, 2025, the Cybersecurity Information Sharing Act of 2015 (CISA 2015) expired after its 10-year effective period lapsed without reauthorization from Congress, in the wake of a government shutdown that...more
On September 30, 2025, the Cybersecurity Information Sharing Act of 2015 (“CISA 2015” or the “Act”) expired as it reached the end of its effective period without being reauthorized by Congress. Intended to enhance sharing of...more
Landmark cybersecurity information sharing legislation that provided both affirmative authorizations and liability protections expired on September 30, 2025, creating uncertainties about future sharing activities. When it was...more
With the new fiscal year upon us, it is official – the legal protections for sharing of cyber threat information among private sector entities and with the federal government were not renewed by Congress and have expired. The...more
The Cybersecurity Information Sharing Act of 2015 (“CISA”) expired yesterday on September 30, 2025. Though Congress discussed renewing the statute prior to its expiration, CISA was not officially reauthorized by the...more
The Cybersecurity Information Sharing Act of 2015 (“CISA 2015”, codified at 6 U.S.C. §§ 1501 et seq.) is scheduled to expire on September 30, 2025, absent last-moment reauthorization from Congress....more
The Cybersecurity Information Sharing Act of 2015 (CISA 2015) is set to expire on September 30, alongside a potential government shutdown. (While an extension is included in the House-passed continuing resolution, that bill...more
On 9 September 2025, the UK Competition and Markets Authority (CMA) published new guidance on how competition law applies to recruitment and HR processes, “Competing for Talent” (the Guidance). The Guidance targets HR...more
The Federal Trade Commission announced on September 11 that it is issuing orders to seven companies that provide consumer-facing AI-powered chatbots. The Commission is seeking information on how these companies measure, test...more
On September 5, FinCEN, in consultation with the FDIC, NCUA and the OCC, issued guidance to encourage the voluntarily cross-border sharing of information among financial institutions. ...more
In late August, the Attorney General Alliance, led by then-Chair and former Alaska Attorney General Treg Taylor, convened the Chair’s Initiative in Girdwood, Alaska titled Cyber Awareness: Addressing Digital Threats at Home...more