Steps Your Nonprofit Can Take to Mitigate Fraud Risks - Part 2
A Third Party's Perspective on Third Party Risk
Implications of the SEC Cybersecurity Disclosure Rule
Privacy Issues from Third-Party Website Tags
What's the Tea in L&E? Employee Devices: What is #NSFW?
Preparing for a Government Healthcare Audit
Tackling Credit Push Fraud: Understanding Nacha's Risk Management Package (Part Two) — Payments Pros: The Payments Law Podcast
Compliance into The Weeds: The Complexity of Risk Assessments
Behavioral Health Compliance
The Importance of Assessment Areas
RegFi Episode 8: The Technological Path to Outcomes-Based Regulation with Matt Van Buskirk
What Physicians Need to Understand About Balance Billing
What Nonprofit Board Leadership Needs To Know About Internal Investigations
Taking a Behavioral Approach to Compliance
Episode 291 -- Interview of Mary Shirley on Her New Compliance Book
ChatGPT Risks for Compliance Programs
Season 2 Episode 3 - The Role of Ethics and Compliance Programs in International Business
In the Boardroom With Resnick and Fuller - Episode 4
What Non-Financial Institutions Need to Know About Gramm-Leach-Bliley
"Board-er" Patrol in Privacy and Cyberattacks - Unauthorized Access Podcast
Public companies should take note of several recent developments, including: ..Reversal of the Pegasystems trade secrets lawsuit that nevertheless preserves guidance to take care when describing litigation as “without...more
On 24 June 2024, the European Union (EU) adopted its 14th sanctions package directed against Russia, imposing an asset freeze against an additional 116 individuals and entities and expanding sectoral sanctions targeting key...more
While the global pandemic has highlighted the perils of remote work, decades of collective experience undertaking internal investigations for corporations and their advisors in connection with the misappropriation of...more
It is often said that the best defense is a good offense. That is certainly true if you are an employer conducting a risk assessment of potential employee defections that could expose your company to losses of valuable...more
Following Germany's initial attempt last year to implement the EU Whistleblower Directive (Directive (EU) 2019/1937), aimed at ensuring harmonized and improved protection of whistleblowers throughout Europe, the Federal...more
Private activity bonds may finance projects that rely on novel technology subject to intellectual property protections, such as patents, trade secrets, and know-how. The novelty of the technology presents unique risks for...more
Welcome to Morrison & Foerster’s quarterly newsletter on dispute resolution. In this newsletter, we address recent developments in arbitrations, investigations, and commercial and intellectual property litigation that may...more
When a company, for the soundest of business reasons, is exploring placing its crown jewels, its intellectual assets, in the hands of a third party, proper internal controls are vital. A company’s internal controls may...more
As businesses consider how to transition to a "new normal," a thorough review of intellectual property (IP) assets and a protocol for managing those assets should be part of the planning process. For many companies, the...more
On April 14, 2020, California Governor Gavin Newsom outlined the six “critical indicators” the state will monitor during the next phase of its COVID-19 response as it considers when to modify its statewide shelter-in-place...more
In December 2019, the Division of Corporation Finance (Staff) of the U.S. Securities and Exchange Commission (SEC) published new "CF Disclosure Guidance: Topic No. 8" (Guidance) regarding disclosure obligations companies...more
The SEC has issued new guidance it believes will assist public companies both in assessing materiality and in drafting disclosure related to risks to technology and intellectual property that may result from conducting...more
Intellectual Property co-chair Amy Goldsmith joined Litigation partner and host Rich Schoenstein to discuss disclosing confidential information during a two-episode discussion on Law Brief, Tarter Krinsky & Drogin’s new...more
Intellectual Property co-chair Amy Goldsmith joined Litigation partner and host Rich Schoenstein to discuss trade secrets and disclosing confidential information during a two-episode discussion on Law Brief, Tarter Krinsky &...more
It’s Friday afternoon and the conversation goes a little like this, “Wait, what? They’re leaving? Where are they going? Is there any opportunity to help them reconsider?” When a key employee departs an organization, it can...more
During a recent seminar I was asked, “What can companies do to stop the loss of trade secrets to places like China?” The questioner seemed stressed and a bit angry, perhaps reflecting a certain frustration that there may not...more
When we think about trade secrets, we usually focus on keeping our own data safe. But an even bigger risk comes from hiring employees who can infect our systems with confidential information from a competitor. Companies often...more
The historic reform of the Toxic Substances Control Act overhauls the United States’ primary chemical safety law for the first time in 40 years. Following months of closed-door negotiations, the US House of...more
Protecting Trade Secrets in the Era of the Data Breach - The prevalence of data breaches cannot be ignored. New data breaches continue to occur one after an-other. In the first half of 2015 alone there were reports of...more
Something lost is always in the last place you look (by definition). It can also sometimes be in the first. Although technology has made it possible for outsiders to manipulate and infiltrate your company’s systems...more
Disputes regarding trade secrets and corporate espionage are becoming perpetual fixtures in the news. One of the most common scenarios is that a key employee departs to join a competitor and his or her former employer quickly...more
Every day the headlines report another Fortune 500 company suffering a hacking incident. For companies, the hack itself creates substantial risks of economic devastation caused by the theft of valuable trade secrets. Add to...more