Compliance Tip of the Day: Leveraging AI for Real-Time Third-Party Risk Management
Episode 365 -- Four Sanctions Cases Everyone Should Know
The Privacy Insider Podcast Episode 12: Compliance Is Good Business: Getting Beyond Fines with Tom Fox of Compliance Podcast Network
Bar Exam Toolbox Podcast Episode 296: Listen and Learn -- Third-Party Rights in Contracts (Part 1 - Rules)
Corporate Use of Third-Party Artificial Intelligence (AI) Tools
One Month to More Effective Written Standards: Day 17 – Policies for Third-Parties
Third Party Observation in Patent Prosecution in China
Consumer Finance Monitor Podcast Episode: Recent Federal and State Debt Collection Developments
Thobekile Cynthia Khumalo on Third Party Due Diligence
Protecting Trade Secrets When Facing Lawsuits or Alternative Dispute Resolution Procedures
Education Data Privacy and Security Laws: Best Practices for School Districts
Episode 162 -- Jessica Sanderson on How to Conduct a Remote Third Party Audit
VIDEO: Update on Third Party Workers’ Compensation Settlements in Pennsylvania
Episode 120: Interview of NAVEX Global Third-Party Risk Officials: Chris Bailey and Stephen Gooding
Subro Sense Podcast - Unpacking Product Claims Against Amazon
Business Succession Planning: Strategies for the Transition
E17: Carpenter Decision Builds Up Privacy from #SCOTUS
Day 17 of One Month to More Effective Continuous Improvement-Financial Health Monitoring
Day 6 of One Month to More Effective Continuous Improvement-Data Analytics and the Monitoring of Third Parties
FCPA COMPLIANCE REPORT-EPISODE 337, JAMES GELLERT ON ASSESSING 3RD PARTY FINANCIAL HEALTH FOR COMPLIANCE
In the ever-evolving world of cybersecurity, even organizations that meet stringent security standards can be victims of sophisticated cyberattacks. A notable example of this is the December 8, 2024 cybersecurity incident...more
In light of recent cyberattacks targeting the federal government and United States supply chains, President Biden’s administration has released an Executive Order (the “Order”) in an attempt to modernize and enhance the...more
On October 15, 2024, the Department of Defense (DoD) published the long-anticipated first part of its final rule (the Final Rule) for the Cybersecurity Maturity Model Certification (CMMC) program. After the implementation of...more
After an unusually short time at OMB, earlier today, OSHA revealed a pre-publication version of its Final Worker Walkaround Representative Designation Process Rule. The Official Final Rule will issue when it is published in...more
On July 28, the U.S. Department of Labor, Office of Labor-Management Standards, issued its final revision of Form LM-10 and a Fact Sheet. The revised form will require employers who use labor “persuaders” to indicate when the...more
Per Executive Order 14028, Improving the Nation’s Cybersecurity, the Office of Management and Budget (OMB) issued a memorandum on September 14, 2022 requiring federal agencies to only use software from software producers that...more
Breaking into federal government contracting can be daunting. There are ever-changing compliance obligations to consider and complex bidding and proposal submission requirements to navigate. An entire industry of sales...more
A unique aspect of doing business with the federal government is the built-in limits on a contractor’s right to assign the contract or the right to payment under the contract to third parties. The Anti-Assignment Act (41...more
The Federal Circuit’s recent decision in Boeing Co. v. Secretary of Air Force, 983 F.3d 1321 (Fed. Cir. 2020), provides some useful clarity on the contents of the restrictive markings and legends that contractors affix to the...more
Contract review is one of the most onerous (and important) processes in any due diligence process when buying or selling a company. We all know that those contracts are the backbone of many businesses- they document the...more
The U.S. Court of Appeals for the Federal Circuit interprets DFARS technical data rights clause to allow contractors to mark technical data delivered to the government to restrict the rights of non-government third parties. ...more
The U.S. Department of Defense (DoD) has issued a long-awaited interim rule to safeguard unclassified information in the possession of defense contractors by making periodic assessments of a company’s cybersecurity compliance...more
Once CMMC has been rolled out, nearly all DoD contractors will need to be assessed by a third party for the issuance of a CMMC Certificate. The Interim Rule provides for a phased rollout over five years for all contractors...more
A key area of focus in the Department of Defense’s (DoD) gradual rollout of its Cybersecurity Maturity Model Certification (CMMC) is the training and accreditation of third-party assessors that will be responsible for...more
Recent Government Accountability Office (GAO) protest decision on standing holds key implications for government contract asset deals. GAO held that contractor who had sold relevant contract assets to another company...more
Given the recent PilieroMazza webinar on Data Rights in federal contracting, we have had a number of clients raise concerns or questions about the government’s “march-in” rights under the Bayh-Dole Act, which controls certain...more
Just because your company does not contract directly with the government does not necessarily mean you are not subject to the many requirements associated with government contractors. Those who provide goods and services to...more