The Presumption of Innocence Podcast: Episode 41 - The Dynamics of Decision-Making: Psychology and the Criminal Justice System
Podcast - Uncovering the FTC's Criminal Liaison Efforts
INTERPOL and Child Kidnapping Cases. What are INTERPOL’s Abilities and Limitations?
How can a private individual report to INTERPOL?
How can law enforcement officials access and use the INTERPOL notice system?
The Justice Insiders Podcast: The DOJ Wants You! - Part II: Voluntary Disclosures
Gary Kalman on Corruption and Compliance Programs
Book Discussion with Brittany Barnett, Author of A Knock at Midnight, and Tanya Eiserer (WFAA-TV)
Compliance Perspectives: Ethics and Policing in the UK
Chicago Mayor Lori Lightfoot on Policing Reform
The ABCs of Employee Theft [More With McGlinchey Ep. 7]
Nota Bene Episode 90: U.S. Q3 Check In: Stimulus, Relief, Election, and Direction with Elizabeth Frazee and Jonathan Meyer
[WEBINAR] Exploring the CPRA’s Investigatory Privilege
Devil in the Details: Gilbert King on Truth and Transparency in the Judicial Process
Is Your Health Care Facility Prepared for an Active Shooter?
What if I am pulled over and suspected of driving under the influence?
How the Rise in Undercover Investigations is Changing the Law
A Moment of Simple Justice - Undercover Lover
A Moment of Simple Justice - Death by Cop
A Moment of Simple Justice - Ferguson & the Media
Report on Patient Privacy Volume 23, no 2 (February 2023) DCH Health Systems, based in Tuscaloosa, Ala., said it fired an employee in December after a routine privacy audit revealed evidence that the worker had accessed some...more
On August 20, 2020, former Uber Chief Security Officer Joe Sullivan was charged with obstruction of justice and misprision of a felony for knowingly concealing a hack of Uber in 2016. Based on Sullivan’s complaint,...more
After a security incident is identified organizations often consider whether to share information concerning the incident with government agencies. If the incident involved criminal conduct, federal law enforcement agencies –...more
The best way for a company to handle a data breach is to be prepared. As we discuss in our data breach readiness handbook, preparation includes, among other things, drafting an incident response plan, reviewing...more
You are general counsel to a company, and your CEO steps into your office, clutching his iPhone in one hand and wiping sweat from his brow with the other, and tells you that a compromising photograph of him was stolen from...more