Podcast - A Comparative Guide to Obtaining an FCL: DCSA vs. the Intelligence Community
CHPS Podcast Episode 4: Tariffs and Trade Impact
SBR-Author’s Podcast: The Unseen Life of an Undercover Agent: A Conversation with Charlie Spillers
Daily Compliance News: May 21, 2025, The I Want You Back Edition
All Things Investigations: Task Force Strategies - Addressing New Government Priorities
Wiley's 2025 Key Trade Developments Series: CFIUS Review and Outbound Investments
Compliance Tip of the Day: Standing at the Turning Point
Regulatory Ramblings: Episode 68 - Why Geopolitical Risk Matters to Compliance and Legal Staff with Mark Nuttal and Chad Olsen
Episode 366 -- DOJ Issues Data Security Program Requirements
CHPS Podcast Episode 3: Unlocking America's Mineral Potential
No Password Required: SVP at SpyCloud Labs, Former Army Investigator, and Current Breakfast Champion
Sunday Book Review: April 13, 2025, The Books on Trade and Tariffs Edition
Podcast - The "I" in FOCI and AI: Innovation, Intelligence, Influence
Podcast - What Are Joint Ventures and When Should They Get Cleared?
FINCast Ep. 40 – 21st Century Financial Warfare: Technology, Economy, & National Security
All Things Investigations: Terrorism Designations of Mexican Cartels Fundamentally Enhances Risk for All Companies
Podcast - Reflecting on Careers in National Security Law
The Presumption of Innocence Podcast: Episode 54 - The Flaws of FARA: Feeble Oversight of Billions in Foreign Influence
Podcast - Navigating Regulatory Challenges in M&A Transactions
Foreign Correspondent: An FDI Podcast | Mapping the National Security Landscape for Investors
In the face of rising cybercrime, end-to-end encryption has become a point of tension between the protection of secrets, public security, and technological sovereignty. At stake: preserving encryption as a safeguard for...more
Quantum computing (QC) is poised to disrupt cybersecurity in ways that business leaders and legal professionals cannot afford to ignore. But what exactly is quantum computing, why does it pose such a significant threat to...more
As global trade policy evolves faster than ever, now is the time to connect with your peers, discover new strategies, and most importantly, hear from the regulatory agencies on the front lines of policy change. ACI’s 15th...more
On January 16, 2025, President Biden issued Executive Order 14144 on Strengthening and Promoting Innovation in the Nation’s Cybersecurity (the “EO”). Building on prior initiatives such as Executive Order 14028 and the...more
In this week’s edition of Consumer Protection Dispatch, we look at the latest regulatory developments from the U.S. Department of Commerce, Consumer Financial Protection Bureau, and the Securities and Exchange Commission...more
With six months into the Biden Administration, American Conference Institute invites you to join one-hour Complimentary Webinar on U.S.-China Export & Cyber Controls, which will take place on June 30th at 1:00pm EDT. The...more
As of March 29, 2021, the U.S. Department of Commerce's Bureau of Industry and Security (BIS) has implemented significant modifications to the Export Administration Regulations (EAR) that relax requirements on the...more
The Encryption Export List is the first list of controlled items after the issuance and implementation of China’s new Export Control Law. Under the previous legal regime, China imposed export licensing requirements on the...more
For a whole decade, ACI’s U.S. Export & Reexport Compliance for Canadian Operations conference continues to stand apart as the only practical, comprehensive event of its kind for the export compliance community in Canada. ...more
Crosmun v. The Trustees of Fayetteville Technical Community College Provides Much Needed Guidance to NC Courts on How to Properly Craft eDiscovery Protocols - The Court of Appeals decision in Crosmun is important because...more
The State Department has adopted an important new ITAR amendment confirming that if controlled technical data is encrypted using end-to-end encryption, the transfer of such data outside the U.S. is not considered an export...more
The most pressing question around the new FIRRMA regulations is “Will my transaction be covered?” To provide a bit of guidance on that point, we present an illustration from our upcoming Second Edition of The CFIUS Book due...more
• On December 26, 2019, DDTC published an interim final rule that would allow, under certain conditions, encrypted technical data and software that is subject to the ITAR to be sent, shipped or stored outside the United...more
The Standing Committee of the National People’s Congress released the Encryption Law of the People’s Republic of China (Draft) for public comment on July 5, 2019 (the “2019 Draft”). The Encryption Law is being enacted to do...more
New York Attorney General Announces Record Number of Data Breach Notices in 2016 - On March 21, 2017, the New York Attorney General's Office announced that it received 1,300 reported data breaches in 2016—a 60 percent...more
On June 6, 2016, during a speech at a Cybercrime Symposium co-organized by the Centers for Strategic and International Studies and the Department of Justice’s (“DOJ”) Computer Crime and Intellectual Property Section,...more
Last month’s terror attacks in Paris have re-ignited the long-standing debate between national security and privacy advocates over whether technology companies should be required to provide the government special access to...more
Cybersecurity, encryption, and government surveillance are daily challenges for public officials, corporations, and lawyers. On October 16, the Roger Williams University School of Law will present Cybersecurity and Law...more
Powerful new computational technology pioneered in e-commerce presents Chinese regulators with potential concerns and solutions to the perennial problem of information, pricing, and settlement capacity. Online payment...more
A group of top coding specialists published a paper on July 6, 2015, arguing that law enforcement’s desire to access encrypted data is not only unfeasible, but would also possibly imperil the security and privacy of global...more