Podcast - Cybersecurity Roundup: Analyzing New and Proposed Rules for Contractors
Long-Term Part-Time Employee Eligibility Rules Now in Effect — Troutman Pepper Podcast
Exámenes de constitucionalidad a la reforma tributaria ¿en qué vamos?
Excitement, Turbulence & Confusion: The Top 10 Employment Law Issues That Affected Federal Contractors in 2023
The New Proposed Regulations on DAFs: Taxable Distributions and the Penalty Tax
New Proposed Regulations Defining Donor Advised Fund Terms
An Introduction to DAFs and Overview of the Newly Proposed DAF Regulations
Podcast: What Employers Should Know about the Pregnant Workers Fairness Act [More with McGlinchey, Ep. 62]
Monthly Minute | Current and Proposed Crypto Regulation
#WorkforceWednesday: AI Technology Regulations, Transparency in AI, OSHA's Permanent COVID-19 Standard - Employment Law This Week®
Overview of California’s New Proposed Cannabis Regulations
Proposed EU Regulation on AI - Impact and Ripple Effect
More CBD Certainty: Clearing Confusion over Hemp in New York State
JONES DAY TALKS®: Proposed Regs Implement FIRRMA, Expand CFIUS’s Jurisdiction Over Foreign Investments
Podcast: Health Reimbursement Arrangements
Qualified Opportunity Zone Fund Investments
New York has released proposed cybersecurity regulations for hospitals. The regulations, which were published in The State Register on Dec. 6 and will undergo a 60-day public comment period ending on Feb. 5, are designed to...more
Editor’s Note: In regulatory news, the Colorado AG published a second version of its proposed regulations. In U.S. litigation, Meta and TikTok both faced further litigation, and an Illinois court ruled that J&M Plating must...more
China is continuing to move forward with its first comprehensive privacy law. China recently issued a second version of the draft Personal Information Protection Law (Draft PIPL) which will be open for public comments until...more
Addressing cybersecurity risks invariably involves very technical matters. As a result, in many companies the IT department has been responsible for developing and implementing cybersecurity plans and procedures....more