DE Under 3: Court Held That Workday Was an “Agent” to Employers Licensing its AI Applicant Screening Tools
Business Associates Here, There, and Everywhere: When Does Your Service Provider Really Need to Sign a HIPAA Business Associate Agreement?
In House Counsel: How To Measure the Effectiveness of Your Staffing Strategy
Sitting with the C-Suite: Identifying Opportunities to Leverage Human Capital
The CCPA for the Land Title Industry: Service Providers and Sale of Data Under the CCPA
Podcast - Risk Management: Troubleshooting & Problem Solving
Cybersecurity in the investment management industry
FCPA Compliance and Ethics Report-Episode 157-Training of Third Parties Under the FCPA
Special Report: The Hot-ish Swag at LegalTech New York 2015
On March 24 2025, the European Commission (EC) adopted the final draft Delegated Regulation setting out Regulatory Technical Standards (RTS) for subcontracting ICT services supporting critical or important functions under the...more
The Department of Defense (DoD) published a Final Rule earlier this month formally implementing the Cybersecurity Maturity Model Certification (CMMC) Program. This Final Rule is the culmination of five years of work to...more
Strategies for Mitigating Unseen Threats and Managing 4th- and Nth-Party Risk in Your Modern Business. Organizations today have transitioned from using on-site server rooms to relying on third-party services and cloud...more
Some states will affirmatively require annual audits of a business’s data collection and processing practices and—in some cases—to submit those audits to state regulators. With new US state data protection laws taking...more
Earlier this month, our Immigration Group colleagues reported the Department of Homeland Security (DHS) would release a new regulation to expand the collection of biometric data in the enforcement and administration of...more
This week, we return to Sherlock Holmes-themed blog posts. We finished the review of The Adventures of Sherlock Holmes and now move on to The Memoirs of Sherlock Holmes. We began the adventure by considering one of the...more
Subcontractors, security, and audit and termination rights will require special consideration under forthcoming EBA outsourcing guidelines. Recent growth in divestiture and carve-out deals in the M&A landscape, including...more
What happens when legislative efforts are met with focused pressure from a variety of industries, civic groups and professional lobbyists? Witness pending Assembly Bill 5, a hopelessly confusing mixture rules and exceptions...more
Legal System - 1. Is your jurisdiction primarily a common law, civil law, customary law or theocratic law jurisdiction? Are the laws substantially derived from the laws of another jurisdiction and, if so, which? What...more
A Florida staffing agency which provides physicians to hospitals and nursing homes, has agreed to a $500,000 settlement with the U.S. Department of Health and Human Services, Office for Civil Rights. The settlement comes...more
Managing third party vendor relationships has always been an important function in banks. More recently it has become a hot topic for state and federal financial bank regulators. The increasing complexity of what vendors are...more
The building blocks of any Foreign Corrupt Practices Act (FCPA) anti-corruption compliance program lay the foundations for a best practices compliance program. For instance in the lifecycle management of third parties, most...more
On January 29, 2015, the U.S. Government released a final rule amending the Federal Acquisition Regulation (“FAR”). The final rule reflects changes to proposed amendments originally released in September 2013. The...more
On January 8, 2015, the Second Appellate district affirmed judgment of the lower court in State Ready Mix Inc. v. Moffatt & Nichol, and barred a concrete supplier from blaming a third party consultant for the concrete...more