(Podcast) California Employment News: Back to the Basics of Employee Pay Days
Compliance Tip of the Day: Multiplying the Influence of Compliance
Innovation in Compliance: Navigating Regulatory Changes and Compliance in Trade and Data Privacy with Stephanie Font
Compliance tip of the Day: Communication Through Persuasion
All Things Investigations: Task Force Strategies - Addressing New Government Priorities
10 For 10: Top Compliance Stories For the Week Ending May 10, 2025
Compliance Tip of the Day: Middle Managers as the Eyes and Ears of Compliance
Everything Compliance: Episode 153, The CW 25 Edition
ADA Compliance for Medical and Dental Practices: Responding to Inquiries and Investigations
Innovation in Compliance: Exploring the Intersection of Compliance, Technology, and AI with Ben Sperry
Compliance Tip of the Day: Elevating Compliance Through Connected Middle Managers
Understanding Human Trafficking and Modern Slavery: A Business Imperative with Clint Palermo
Shout Outs and Rants: Episode 153, The CW 25 Edition
Daily Compliance News: May 6, 2025 the Made in China Edition
Compliance Tip of the Day: Middle Managers as Compliance Change Agents
FCPA Compliance Report: Ethical Decision - Making in Times of Change
10 For 10: Top Compliance Stories For the Week Ending, May 3, 2025
Compliance Tip of the Day: Standing at the Turning Point
2 Gurus Talk Compliance: Episode 51 – The Compliance Week at 20 Edition
Federal Court Strikes Down FDA Rule on LDTs - Thought Leaders in Health Law®
In late March 2025, the Florida Bar Board of Governors unanimously endorsed the recommendation of its Special Committee on Cybersecurity and Privacy Law that law firms should adopt written incident response plans (IRPs) to...more
Asking the right questions within your organization is key to effectively managing cyber risk. Here are 10 questions that you should ask your team...more
On 19 March 2025, the Legislative Council (the “LegCo”) passed the Protection of Critical Infrastructure (Computer System) Bill (the “Bill”), which is due to come into effect on 1 January 2026. This is a significant step in...more
Chinese data regulators are intensifying their focus on the data protection compliance audit obligations under the Personal Information Protection Law (“PIPL“), with the release of the Administrative Measures for Personal...more
On January 15, 2025, the Federal Acquisition Regulatory Council published a proposed rule (the FAR CUI Rule) that would amend the Federal Acquisition Regulation (FAR) to impose government-wide cybersecurity, training, and...more
A massive data breach hit one of the country’s largest education software providers. According to EducationWeek, PowerSchool provides school software products to more than 16,000 customers, largely K-12 schools, that serve 50...more
On 17 October 2024, the European Commission adopted the first Implementing Regulation under the Network and Information Security 2 Directive (EU) 2022/2555 (NIS2), focusing on digital infrastructures and services. The...more
Looking for compliance education and networking in your area? SCCE’s Regional Compliance & Ethics Conferences offer convenient, local compliance education for practitioners in a variety of locations across the globe, and...more
Last month, the Federal Acquisition Regulatory Council proposed new cybersecurity and incident reporting regulations for federal contractors on behalf of the Department of Defense (DoD), the General Services Administration...more
A ransomware attack is no company’s idea of a good time, but I do sense one positive development emerging from the epidemic of attacks we’ve witnessed this year: Boards and senior management agree that they must move beyond a...more
At the end of January, the U.S. Securities and Exchange’s Office of Compliance Inspections and Examinations (OCIE) released its “Observations on Cybersecurity and Resiliency Practices” (Observations)....more
The outbreak of the 2019 Novel Coronavirus (2019-nCoV) has created a number of questions and compliance challenges for employers in the United States as well as across the globe. This is a fluid and rapidly changing...more
Prepare your organization to respond to the ever-increasing emphasis on healthcare compliance issues by enforcement authorities. Hear first-hand from government officials about regulatory changes, expectations, and key...more
Businesses are increasingly relying on the cloud to store confidential and sensitive information. One-third of information technology budgets are used for cloud services. Rapid growth in cloud storage is expected over the...more
Join us on Thursday 19 September for the Hogan Lovells Privacy and Cybersecurity KnowledgeShare in London. We will share our latest thinking on the key privacy and cybersecurity issues faced by those with data protection...more