LathamTECH in Focus: How Should Crypto Companies Be Thinking About New Laws?
Regulatory Rollback: Impact on Industry of CFPB's Withdrawal of Fair Lending and UDAAP Informal Guidance — The Consumer Finance Podcast
Cannabis Law Now Podcast - The 4-1-1 on Cannabis Receiverships from a Top Cannabis Receiver
The LathamTECH Podcast — Where Digital Assets Slot Into a Shifting Fintech Regulatory Landscape: Insights From the US, UK, and EU
Podcast - New Guidance on Complying with FTC Rule on Deceptive and Unfair Fees
Tenant Tales and Reseller Realities: Inside the FCRA Arena With Eric Ellman — FCRA Focus Podcast
State AGs Unite: New Privacy Task Force Signals Shift in Regulatory Power Dynamics — Regulatory Oversight Podcast
Podcast - Navigating the New Landscape of Private Equity in Healthcare
Compliance Tip of the Day: Podcasting for Compliance Training
Everything Compliance: Episode 154, The Law Firms in Trouble Edition
The fatal flaws in the 2023 CRA rule
Compliance Tip of the Day: Measuring Compliance Training Effectiveness
New Executive Order Targets Disparate Impact Claims Nationwide - #WorkforceWednesday® - Employment Law This Week®
Welcoming a New Payment Pro: Jason Cover Joins the Payments Pros Podcast — Payments Pros – The Payments Law Podcast
Constangy Clips Ep. 10 - 3 Ways the GDPR Is Evolving with Today’s Tech Landscape
Medicaid Cuts: Potential Challenges and Legal Implications for Long-Term Care Facilities — Assisted Living and the Law Podcast
Rewriting the Rules: The Supreme Court's Landmark Decision on Clean Water Act Permits
Tariffs and Trade Series: What Boards of Directors Need to Know
Compliance Tip of the Day: Compliance Training Frequency
Under the Hood: Exploring the CFPB's 2025 Focus — Moving the Metal: The Auto Finance Podcast
Imagine receiving an email from an unknown actor claiming to have taken approximately 2 terabytes of data from your organization’s network. The threat actor provides a file tree and sample files to substantiate its claim....more
When we are retained by clients to guide them through a cyber-attack in which information has been stolen by a threat actor, we almost always find that the client has unnecessarily stored sensitive information far beyond the...more
Every organization needs to develop an effective data retention policy to gain visibility and control over its information. But given the increasing complexity of today’s data systems and the constantly evolving regulatory...more
A lot of attention is now being paid to the topic of data governance, and what it means versus data management. Within the last few years, data governance has leapt from an esoteric term bandied about only by IT...more