Beyond the Bylaws: The Medical Staff Show | The Role of Bylaws in Medical Staff Governance, Part II
The Presumption of Innocence Podcast: Episode 60 - Enforcement Priorities of the Second Trump Administration: Employee Retention Tax Credit
Compliance Tip Of the Day: Using AI to Transform Whistleblower Response
Because That’s What Heroes Do: Deep Space 9 – Episode 30: Deep Trek Themes from Tacking into the Wind
FCPA Compliance Report: Amanda Carty on a Due Diligence and Risk Management
FCPA Compliance Report: Kristy Grant-Hart on A 360° Review of the Future of Compliance
Great Women in Compliance: Creating Space to Speak Up: The Story Behind Psst.org
Work This Way: A Labor & Employment Law Podcast | Episode 43: How Employers Can Navigate White Collar Crime with Erica Barnes & Christian Dysart of Maynard Nexsen
The Presumption of Innocence Podcast: Episode 59 - Enforcement Priorities of the Second Trump Administration: DOJ Focus
Creativity and Compliance: Bringing Joy to Compliance: A Conversation with Virginia MacSuibhne
Beyond the Bylaws: The Medical Staff Show - The Role of Bylaws in Medical Staff Governance, Part I
Compliance Tip of the Day: Embedded Compliance
Auditing Your Hotline and Case Management System
Compliance and AI: Ali Khan on Implementing AI Risk Management Systems
Compliance Tip of the Day: AI for Whistleblower Anonymity
Compliance Tip of the Day: Taming Complexity
Improving Your Code of Conduct
Envisioning a Compliant Workforce
Updating the Research Compliance Handbook
Investigations and Cognitive Interviews
The Department of Defense stands at a critical crossroads in how it processes, authorizes, and utilizes data in operational environments. Despite living in an era of unprecedented information availability, our military...more
A recently unsealed case against Pennsylvania State University: - Serves as yet another example of the increased use of the False Claims Act (FCA) in cybersecurity enforcement. - Underscores the need for companies...more
DoD recently released a policy addressing unwanted foreign influence on DoD-funded research. According to the policy, DoD will conduct risk-based security reviews and assess potential conflicts of interest and conflicts of...more
The Department of Homeland Security amended its regulations due to the urgent need to protect Controlled Unclassified Information. On June 21, 2023, the Department of Homeland Security (DHS or Department) issued a final...more
The Canadian Institute’s 11th Annual Forum on U.S. Export & Re-Export Compliance for Canadian Operations will take place in Toronto on January 25–27! IN-PERSON and LIVESTREAM options available. Over the last decade, this...more
The Department of Defense (DOD) recently announced several changes to its Cybersecurity Maturity Model Certification program. The program applies to those who serve as contractors and suppliers to the DOD. As described in our...more
The Department of Defense (DoD) and the Civilian Agency Acquisition Council (CAAC) have both issued new Class Deviations from the FARs that implement Executive Order 14042, Ensuring Adequate COVID Safety Protocols for Federal...more
The U.S. Government Accountability Office (“GAO”) recently released a new report finding that Army and Navy contracting officials were unaware of their oversight responsibilities regarding combating trafficking in persons....more
As the U.S. Department of Defense (DoD) seeks to increase funding for artificial intelligence (AI) technologies for defense and national security purposes, a new policy memorandum directs the DoD to take steps to ensure that...more
America’s data is under attack. Solar Winds and other recent headline-grabbing stories have demonstrated that foreign adversaries are eager to hack into computer systems for a wide range of purposes. The US Department of...more
People like to say that cybersecurity threats are constantly evolving. So perhaps it’s fitting that cybersecurity compliance is undergoing a significant evolution of its own this year, too. That evolution is the arrival of...more
Two significant changes are underway by the Defense Counterintelligence and Security Agency (DCSA) – both of which require the immediate attention of businesses that hold a U.S. security clearance or are in the process of...more
The Department of Defense’s (DOD) Cybersecurity Maturity Model Certification (CMMC) requirements are coming, impacting DOD contractors big and small. This important new certification, if responded to proactively, will help...more
Now that DOD has released the final version of the Cybersecurity Maturity Model Certification (CMMC) guidelines, all contractors that work directly or indirectly on Department of Defense (DOD) contracts should be preparing to...more
Report on Research Compliance 17, no. 3 (February 20, 2020) - Despite its earlier agreement to repay just $5,442 in costs questioned by the National Science Foundation (NSF) Office of Inspector General, the University of...more
In 2019, cybersecurity has become top-of-mind for most federal government contractors and agencies that share sensitive information. In addition to updated Department of Defense guidance and procedures for evaluating...more
Is this a Start of Something New for Third-Party Management? The demand for responsible cybersecurity in business is ubiquitous. The need to protect information is not limited to the financial services, insurance and...more
DEPARTMENT OF LABOR - US Department of Labor reinstates Wage and Hour opinion letters - The U.S. Department of Labor will reinstate the issuance of opinion letters, U.S. Secretary of Labor Alexander Acosta announced on...more
The 2018 National Defense Authorization Act (“NDAA” or “Act”) includes changes that could make the Department of Defense (“DoD”) a more effective and knowledgeable purchaser of Intellectual Property (“IP”) and promote more...more