Rethinking Records Retention
2024 Payments Year in Review: CFPB and FTC Regulatory Trends – Part Four — Payments Pros – The Payments Law Podcast
DE Talk | If It’s Not in Writing, It Never Happened: Applicant Tracking & Recordkeeping Strategies to Ensure OFCCP Compliance
California Regulation of Charitable Fundraising Platforms Part 2 - Reporting Due Diligence, Recordkeeping, and Disclosure Rules
Episode 312 -- Eddie Green, CEO SnippetSentry, on Communications Preservation Risks
Episode 298 -- Electronics Communications Risks and Ephemeral Messaging
A Look Into the FDA and USDA Regulatory Regimes
Nonprofit Basics: Meeting Minutes Best Practices
The Risk Roundtable: Best Practices for Litigation to Help After an Accident
PLI's inSecurities Podcast - Compliance and Enforcement Considerations for Private Funds & RIAs
California Employment News: Best Practices for Maintaining Employee Records
OSHA Recordkeeping Regulations: Understanding the Fine Print
FLSA and Wage and Hour Issues for Restaurants
#WorkforceWednesday: OSHA Updates COVID-19 Guidance, NLRB GC’s Priorities, Biometrics at Work - Employment Law This Week®
[Webinar] Common Massachusetts Cannabis Business Compliance Pitfalls
Risk Prevention Strategies: Avoiding Costly FLSA Missteps
How to Navigate the After Effects of the U.S. Stimulus Packages
Regulation Best Interest Videocast Series: Regulation BI Recordkeeping Requirements
Podcast: Private Fund Regulatory Update – Network and Cloud Storage
The need for an effective HR Tech Stack in consulting has never been more critical. With firms competing for top talent, having a well-structured and efficient HR system can make a huge difference....more
The Department of Justice (“DOJ”) published its final regulations on “Preventing Access to U.S. Sensitive Personal Data and Government-Related Data by Countries of Concern or Covered Persons” (the “Final Rule”). The Final...more
On January 8, 2025, the Department of Justice (“DOJ”) published its Final Rule to implement President Biden’s Executive Order 14117, “Preventing Access to Americans’ Bulk Sensitive Personal Data and United States...more
On 21 April 2021, the European Commission unveiled a proposal for an EU Artificial Intelligence Regulation (“Proposal”). The Proposal recognizes that AI offers significant benefits and opportunities for the EU market, but...more
Under GDPR, companies are required to keep certain records of their processing activities. There has been some question about the types of records controllers should keep. To help clarify the questions arising from many...more
It’s hard to keep up with all the recent changes to labor and employment law. While the law always seems to evolve at a rapid pace, there have been an unprecedented number of changes for the past few years—and this past month...more
• The NFA has determined that registered CPOs must implement an internal controls system and highlighted best practices for such a framework. • In response to certain frequently asked questions, the NFA has also updated its...more
On April 18, 2018, the Government of Canada published the final regulations relating to mandatory reporting of privacy breaches under Canada’s Personal Information Protection and Electronic Documents Act (“PIPEDA”). ...more
On September 1, 2018, five new requirements included in the New York State Department of Financial Services’ (DFS) Cybersecurity Regulation go into effect – (1) audit trails, (2) application security, (3) data disposal...more
In less than four months, the General Data Protection Regulation (the "GDPR" or the "Regulation") will take effect in the European Union/European Economic Area, giving individuals in the EU/EEA greater control over their...more
In this alert, we provide a detailed overview of the final rules, Regulation Crowdfunding, which will be applicable to crowdfunding offerings conducted in reliance on Section 4(a)(6) of the Securities Act of 1933 as amended...more
The CFTC recently approved the National Futures Association’s interpretive notice (the “Cybersecurity Notice”) on the general requirements that members should implement for their information systems security programs...more