Ad Law Tool Kit Show – Episode 11 – State Attorney General Investigations
Compliance Tip of the Day: Cross Border Investigations, Part 1
Better Investigative Interviewing
What to Do If the Government Knocks on Your Company’s Door … or Breaks It Down – Speaking of Litigation Podcast
Bank Investigations and Enforcement Actions: Lessons Learned — The Consumer Finance Podcast
PLI's inSecurities Podcast - Opening the Securities Enforcement Answer Book
AGG Talks: Antitrust and White-Collar Crime Roundup - The Mar-a-Lago Trump Indictment
AGG Talks: Antitrust and White-Collar Crime Roundup - Inside the World of No-Poach Investigations and Indictments
Healthcare Providers: Make Sure You Know When You Need a Criminal Attorney
Why Your Data is Key to Reducing Risk and Increasing Efficiency During Investigations and Litigation
State AG Pulse | State AGs and Feds: The Dynamics of Influence & Collaboration
The Risk Roundtable: Pre-Existing Conditions and Abdullah Credits in New Jersey Workers' Compensation
The Justice Insiders Podcast: Feds Danske to a New Tune
The Rules They Are A-Changin’: CMS Proposes a Significant Change to the 60-Day Repayment Rule
Predatory Behavior Alleged Against OSHA Addressed During Orange County Board of Education Board Meeting Led by Greg Rolen
Early Returns with Jan Baran Podcast: There's a New Chair in Town – Dara Lindenbaum and the FEC Agenda Looking Towards 2024
Evaluating Fraud Under the Bank Secrecy Act - The Crypto Exchange Podcast
How Law Firms and Lobbyists Can Work Together: A Look Into Lobbyists’ Role Among State AGs - Regulatory Oversight Podcast
Torres Talks Trade Podcast- Episode 13- When Government Agencies Come Knocking
Keeping Up With the Bureau Episode 1: Overview of CFPB and State AG Initiatives/Expansion - The Consumer Finance Podcast
As data volumes grow, the use of technology to make sense of it is increasing – especially within disputes and investigations where the key data is buried within thousands or millions of documents, emails, text messages,...more
Last week, HHS published its final rule outlining disincentives for certain healthcare providers that have committed information blocking (the Final Rule). The Final Rule also provides information related to OIG’s...more
The Cybersecurity and Infrastructure Agency (CISA) is seeking comment on a proposed rule to implement reporting requirements for critical infrastructure entities, including health care entities, on cyberattacks and ransomware...more
One of the biggest threats to modern corporations involves departing employees who take confidential business information (CBI) and/or trade secrets with them prior to or upon their departure. Indeed, the misappropriation of...more
Editor’s Note: In a rapidly evolving technological landscape, understanding the capabilities and limitations of platforms like Microsoft 365 (M365) is crucial for law firms, especially in the realms of eDiscovery and...more
Report on Patient Privacy Volume 23, no 7 (July 2023) In two public talks this spring, Melanie Fontes Rainer, director of the HHS Office for Civil Rights (OCR), said completing the 2021 proposed regulation extensively...more
On July 3, 2023, the US Department of Health and Human Services Office of Inspector General (OIG) published its long-awaited final rule implementing the 21st Century Cures Act provisions authorizing OIG to investigate claims...more
Corporations make game-changing business decisions every single day. In 2021, over 23,500 merger and acquisition deals closed in the EU alone, with another 23,161 deal closures in the US....more
Forensic engineering and accident investigation is a diverse and comprehensive field that involves the examination and analysis of both physical and electronic evidence. An integral part of the accident investigation process...more
Banking looks very different today than it did even 20 years ago. Banks have far fewer face-to-face interactions as more customers migrate to online or app-based banking services....more
It’s been another interesting year in the world of legal technology, and we here at Hanzo have covered a variety of topics in 2022. Last week, we covered the first 10 of our top 20 ediscovery and compliance blogs. Today we...more
A Federal Trade Commission Civil Investigative Demand is an administrative subpoena utilized by the Federal Trade Commission (and other regulatory agencies, such as a state Attorney General) to obtain documentary materials...more
It’s common for eDiscovery professionals to talk about the “additional” use cases – beyond litigation – that have emerged in recent years for eDiscovery technology and workflows. Those use cases include data privacy...more
Multi-national organizations battle fraud and corruption risks daily given the size, scale, and complexities of their businesses, increased regulation and enforcement, and challenges preparing for a post-pandemic fraud...more
Back in May 2019, the Trump Administration issued Executive Order 13873, which was meant to police the use of certain information and communications technology and services (ICTS) purchased from "foreign adversaries." Then,...more
Data collection is not a departmental island — in fact, it’s crucial that key departments, including IT, legal, and compliance, work together to get the job done right. Unfortunately, this is easier said than done, and teams...more
Absent proper precautions, companies may be forced to produce or otherwise disclose third-party forensic reports generated during a post-breach investigation. Historically, when a data breach has occurred, companies have...more
One of the first things a company should do when it suspects that its trade secrets have been compromised or that an employee has violated post-employment restrictive covenants is to conduct an investigation. ...more
Today’s data climate presents unique challenges and opportunities for legal professionals responsible for conducting investigations. As data volumes accelerate and new data types continue to emerge, traditional approaches to...more
With cybercrime on the rise, organizations have increasingly found themselves subject to litigation or regulatory investigations related to breaches. Documents and information created before breaches, such as security...more