On December 3, 2024, the U.S. District Court for the Eastern District of Texas issued a nationwide preliminary injunction in Texas Top Cop Shop, Inc., et al. v. Garland, et al., temporarily halting the enforcement of the...more
12/10/2024
/ Anti-Corruption ,
Anti-Money Laundering ,
Beneficial Owner ,
Constitutional Challenges ,
Corporate Transparency Act ,
Corruption ,
Financial Crimes ,
FinCEN ,
National Security ,
Popular ,
Preliminary Injunctions ,
Regulatory Requirements ,
Reporting Requirements
The Corporate Transparency Act (CTA), the federal initiative to limit money laundering, tax evasion, and other illicit activities, took effect on Jan. 1, 2024. The CTA requires many businesses and their owners to register...more
11/13/2024
/ Anti-Corruption ,
Anti-Money Laundering ,
Beneficial Owner ,
Cooperative Compliance Regime ,
Corporate Transparency Act ,
Filing Deadlines ,
Financial Crimes ,
FinCEN ,
National Security ,
Ownership Interest ,
Popular ,
Regulatory Requirements ,
Reporting Requirements
According to a recent U.S. Government Interagency report, ransomware is the fastest growing malware threat, targeting users of all types. An incredible 51 percent of respondents in a January 2017 study by the Ponemon...more
10/30/2017
/ Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Electronic Medical Records ,
Hackers ,
Health Care Providers ,
Health Insurance Portability and Accountability Act (HIPAA) ,
HIPAA Breach ,
Information Technology ,
Malware ,
OCR ,
Personally Identifiable Information ,
PHI ,
Popular ,
Ransomware ,
Risk Management ,
Security Rule ,
State Data Breach Notification Statutes
As its next step in the creation and implementation of a cybersecurity plan, the State of Connecticut has created a Cybersecurity Strategy document. This strategy specifically highlights the roles and vulnerabilities of state...more
According to a recent US Government Interagency report, ransomware is the fastest growing malware threat, targeting users of all types, including health care facilities. This past spring, for example, the WannaCry ransomware...more
7/11/2017
/ Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Hackers ,
Health Care Providers ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Malware ,
OCR ,
PHI ,
Popular ,
Ransomware