10 For 10: Top Compliance Stories For the Week Ending, August 2, 2025
Daily Compliance News: August 1, 2025, The All AI Edition
Daily Compliance News: July 25, 2025, The New Sheriff in Town Edition
All Things Investigations – Navigating Secondary Tariffs with Mike Huneke and Brent Carlson
FCPA Compliance Report: The Impact of Secondary Tariffs on Global Trade with Mike Huneke and Brent Carlson
Daily Compliance News: July 21, 2025, The More Reasons Not to Go to China Edition
Regulatory Ramblings: Episode 73 - Geopolitical Risk: Thai Tensions / Sanctions, Tariffs & FCPA Enforcement in Asia
Daily Compliance News: June 23, 2025, The Is Walmart Cool Edition
Regulatory Ramblings: Episode 71 – Crypto Fault Lines: Stablecoins, Meme Coins & the Fight for Clarity PLUS: Sanctions, Shell Companies & Fragmented Global Trade
Episode 372 -- DOJ Applies False Claims Act to Tariff and Trade Violations
Hot Topics in International Trade - Tariff Mitigation Strategies
Daily Compliance News: May 30, 2025, The Leissner Sentenced Edition
Regulatory Ramblings: Episode 70 – Lessons for Compliance from a Law Enforcement Career + Regional Geopolitical Risks in 2025 with Mark Nuttall and Steve Vickers
Daily Compliance News: May 21, 2025, The I Want You Back Edition
Hot Topics in International Trade Terrified by Tariffs Braumiller Law
2 Gurus Talk Compliance: Episode 52 – The Big Jet Plane Edition
10 For 10: Top Compliance Stories For the Week Ending May 10, 2025
Daily Compliance News: May 6, 2025 the Made in China Edition
Daily Compliance News: May 5, 2025, The Washing Edition
Daily Compliance News: April 30, 2025, The 4 AM Wake-Up Call Edition
The United States Data Security Program (DSP) represents a significant regulatory undertaking by the US government to control the flow of bulk sensitive data to specific foreign countries, for national security purposes....more
On April 8, the U.S. Department of Justice’s (DOJ) Final Rule, codified at 28 CFR Part 202, (Final Rule), implementing President Biden’s Executive Order 14117 “Preventing Access to U.S. Sensitive Personal Data and...more
The U.S. Department of Homeland Security (DHS) recently published new security requirements for certain restricted transactions covered by the U.S. Department of Justice’s (DOJ) sensitive data export rules. ...more
On January 17, 2025, days before the inauguration, former President Joe Biden issued an executive order titled Strengthening and Promoting Innovation in the Nation's Cybersecurity (EO 14144). Building on previous efforts,...more
The U.S. Department of Justice (“DOJ”) published its final rule (“Final Rule”) on January 8, 2025, that will prohibit or restrict transfer of certain data of U.S. persons to countries of concern, including to China. The Final...more
On Friday, December 27, 2024, the Justice Department issued a final rule to address “urgent national security risks posed by access to U.S. sensitive personal and government-related data from countries of concern and covered...more
On April 20, 2024, the House of Representatives passed H.R.8038, the 21st Century Peace through Strength Act ("supplemental"), which includes a version of H.R.7520, the Protecting Americans' Data from Foreign Adversaries Act...more
In a sweeping, coordinated effort across federal agencies, the US government has taken a giant leap forward to prevent access to data that could be exploited to the detriment of national security. On February 28, 2024,...more
Sunday, September 20, 2020, was intended to be the day on which prohibitions would go into effect on ByteDance Ltd. (ByteDance) and Tencent Holdings Ltd. (Tencent) and their subsidiaries—makers of the TikTok and WeChat apps,...more
UNITED STATES - Regulatory—Policy, Best Practices, and Standards - Cybersecurity Standards Issued for Government Contractors - On January 31, the Office of the Under Secretary of Defense for Acquisition and...more
On January 20, 2017, businessman Donald J. Trump was sworn in as the 45th President of the United States following a contentious and unconventional 2016 presidential election. Republicans also successfully maintained control...more
With interconnectivity and use of digital storage expanding, cyberthreats posed by nation states, commercial competitors, company insiders, transnational organised crime and ‘hacktivists’ are growing on a global basis. Recent...more