Episode 368 — LRN Issues New Report Highlighting Growing Gap in Compliance Program Performance
Compliance Tip of the Day: Empowering Middle Managers to Drive Compliance Transformation
Top Healthcare Compliance Priorities for 2025
ADA Compliance for Medical and Dental Practices: Responding to Inquiries and Investigations
Innovation in Compliance: Exploring the Intersection of Compliance, Technology, and AI with Ben Sperry
What Every Law Firm Leader Can Learn from Law Day and the Perkins Coie Ruling: On Record PR
Compliance Tip of the Day: Elevating Compliance Through Connected Middle Managers
Compliance into the Weeds: USRA Declination Case Study - Self-Disclosure Best Practices
Compliance Tip of the Day: Middle Managers as Ethical Cornerstones
Understanding Human Trafficking and Modern Slavery: A Business Imperative with Clint Palermo
SBR Author’s Podcast: Understanding Complexity with Dr. Jean Boulton, Part 2: The Power of Simple Principles in Ethics and Compliance
Daily Compliance News: May 6, 2025 the Made in China Edition
Driven by Data: Auto Finance Trends Uncovered - Moving the Metal: The Auto Finance Podcast
Compliance Tip of the Day: Middle Managers as Compliance Change Agents
Adventures in Compliance: The Novels – A Study in Scarlet, Dr. Watson
FCPA Compliance Report: Ethical Decision - Making in Times of Change
Daily Compliance News: May 5, 2025, The Washing Edition
Because that's what heroes Do: Deep Space 9 – Episode 31: Extreme Measures – Great Sci Fi and Moral Dilemmas
Compliance Tip of the Day – Role of Chatbots in Compliance
AGG Talks: Cross-Border Business Podcast - Episode 28: How Life Sciences Companies Can Create a Culture of Compliance When Expanding to the U.S. Market
Quantum computing (QC) is poised to disrupt cybersecurity in ways that business leaders and legal professionals cannot afford to ignore. But what exactly is quantum computing, why does it pose such a significant threat to...more
Everyone is talking about DeepSeek for its increase performance and efficiency. However, with that comes additional risks, as DeepSeek is subject to Chinese national law, and there are still many unanswered questions...more
As NATO’s strategic priorities evolve, the accession of Finland and Sweden marks a significant shift in the alliance’s defense landscape. With these Nordic nations integrating into NATO’s security framework, their defense...more
The guidelines specify the requirements for data controllers to conduct risk assessments related to the transfer or disclosure of personal data outside the Kingdom. ...more
U.S. companies and organizations have entered a new era of sweeping restrictions on cross-border data transfers. The Department of Justice's (DOJ) Final Rule, "Preventing Access to U.S. Sensitive Personal Data and...more
In an era where cyber threats are escalating, healthcare has emerged as a critical battleground for security. Its significance has become increasingly crucial as the intersection of healthcare, cybersecurity, and technology...more
As we noted in Federal Cybersecurity Policy in 2025: What to Watch in Changing Times, key parts of the Cybersecurity Information Sharing Act of 2015 (CISA 2015), the United States’ foundational cybersecurity information...more
The United Kingdom is taking a strategic approach to artificial intelligence (AI) adoption within its public sector to drive economic growth and improve public services. Central to this effort is the UK’s AI Playbook, a...more
This Tuesday, Michael Kratsios, who is President Donald Trump’s nominee for Director of the White House Office of Science and Technology Policy (OSTP), will appear before the Senate Commerce Committee for a hearing. During...more
North Korean IT operatives are infiltrating U.S. and Western companies using stolen or fabricated identities, VPNs, and U.S.-based co-conspirators to gain unauthorized access to corporate systems. These insider threats pose...more
Soon after the Chinese generative artificial intelligence (AI) company DeepSeek emerged to compete with ChatGPT and Gemini, it was forced offline when “large-scale malicious attacks” targeted its servers. Speculation points...more
In his final days in office, President Biden signed an ambitious executive order to improve the federal government's approach to cybersecurity. How this sweeping order will fare under the Trump Administration is difficult to...more
The Department of Justice (“DOJ”) published its final regulations on “Preventing Access to U.S. Sensitive Personal Data and Government-Related Data by Countries of Concern or Covered Persons” (the “Final Rule”). The Final...more
On January 8, 2025, the Department of Justice (“DOJ”) published its final rule addressing Executive Order (E.O.) 14117, “Preventing Access to Americans’ Bulk Sensitive Personal Data and United States Government-Related Data...more
In the ever-evolving world of cybersecurity, even organizations that meet stringent security standards can be victims of sophisticated cyberattacks. A notable example of this is the December 8, 2024 cybersecurity incident...more
As of January 23, 2025, the regulation discussed below has not been withdrawn by the Trump administration and is not subject to automatic withdrawal under President Trump’s Executive Order freezing regulations. It currently...more
On January 17, 2025, days before the inauguration, former President Joe Biden issued an executive order titled Strengthening and Promoting Innovation in the Nation's Cybersecurity (EO 14144). Building on previous efforts,...more
On January 7, 2025, the Department of Homeland Security released its first “Playbook for Public Sector Generative Artificial Intelligence Deployment (“Playbook”) to serve as a comprehensive guide for DHS and other public...more
On January 8, 2025, the Department of Justice (“DOJ”) published its Final Rule to implement President Biden’s Executive Order 14117, “Preventing Access to Americans’ Bulk Sensitive Personal Data and United States...more
To kick off the New Year (and as is now tradition, since we put out a similar Recap & Forecast last year), Sheppard Mullin’s Governmental Practice Cybersecurity & Data Protection Team has prepared a cybersecurity-focused 2024...more
The rule imposes substantial new diligence, reporting, cybersecurity, and auditing obligations on companies. On December 27, 2024, the U.S. Department of Justice (“DOJ”) issued a final rule implementing Executive Order...more
At what point has a director served too long? What about term limits? A mandatory retirement age? When do a director’s skills become stale? These issues are addressed in this issue of The Informed Board, as well as why proxy...more
The deadline for EU countries to transpose the expanded cybersecurity directive, NIS 2, into national law is 17 October 2024, but the implementation status varies significantly from country to country. Some of the member...more
Welcome to our seventh 2024 issue of Decoded - our technology law insights e-newsletter. We have a few events we want to pass along to those interested in technology, but also other areas of law and business. ...more
The US relies on existing federal laws and guidelines to regulate AI but aims to introduce AI legislation and a federal regulation authority. Laws/Regulations directly regulating AI (the “AI Regulations”) Currently,...more