FCPA Compliance Report: The Impact of Secondary Tariffs on Global Trade with Mike Huneke and Brent Carlson
Daily Compliance News: July 21, 2025, The More Reasons Not to Go to China Edition
Regulatory Ramblings: Episode 73 - Geopolitical Risk: Thai Tensions / Sanctions, Tariffs & FCPA Enforcement in Asia
Daily Compliance News: June 23, 2025, The Is Walmart Cool Edition
Regulatory Ramblings: Episode 71 – Crypto Fault Lines: Stablecoins, Meme Coins & the Fight for Clarity PLUS: Sanctions, Shell Companies & Fragmented Global Trade
Episode 372 -- DOJ Applies False Claims Act to Tariff and Trade Violations
Hot Topics in International Trade - Tariff Mitigation Strategies
Daily Compliance News: May 30, 2025, The Leissner Sentenced Edition
Regulatory Ramblings: Episode 70 – Lessons for Compliance from a Law Enforcement Career + Regional Geopolitical Risks in 2025 with Mark Nuttall and Steve Vickers
Daily Compliance News: May 21, 2025, The I Want You Back Edition
Hot Topics in International Trade Terrified by Tariffs Braumiller Law
2 Gurus Talk Compliance: Episode 52 – The Big Jet Plane Edition
10 For 10: Top Compliance Stories For the Week Ending May 10, 2025
Daily Compliance News: May 6, 2025 the Made in China Edition
Daily Compliance News: May 5, 2025, The Washing Edition
Daily Compliance News: April 30, 2025, The 4 AM Wake-Up Call Edition
10 For 10: Top Compliance Stories For the Week Ending April 26, 2025
Daily Compliance News: April 25, 2025, The Trouble in Travel Edition
What's the Buzz in the Battery World With Roger Miksad, BCI – Battery + Storage Podcast
State AG Pulse | “Don’t Mess With Our Health or Our Kids!”
The Cybersecurity and Infrastructure Security Agency (CISA) has agreed to make public a report from 2022 about US telecommunications networks' flawed security practices which relate to the Salt Typhoon attacks experienced by...more
This monthly report outlines key developments in China’s data protection sector for May. The following events merit special attention...more
The Measures outline requirements and procedures for self-initiated and regulator-mandated compliance audits from May 1, 2025....more
The instant popularity of China’s DeepSeek-V3 generative artificial intelligence model underscores why companies should craft stronger GenAI policies that minimize the risks of employees exposing sensitive data, violating...more
On April 8, the National Security Division of the U.S. Department of Justice’s (DOJ) new rule on cross-border data transfers takes effect. It restricts U.S. businesses from transferring certain bulk sensitive personal data to...more
This monthly report outlines key developments in China’s data protection sector for March. The following events merit special attention...more
During the 2025 Chinese New Year, DeepSeek, a Chinese artificial intelligence (“AI”) model, garnered intense global attention and sparked heated discussions. It surpassed ChatGPT, which had been in the spotlight previously,...more
New York, Texas, and Virginia are the first states to ban DeepSeek, the Chinese-owned generative artificial intelligence (AI) application, on state-owned devices and networks....more
On January 13, 2025, the Department of Commerce’s Bureau of Industry and Security (BIS) published an Interim Final Rule (IFR) that expands controls on advanced computing integrated circuits (ICs or chips) and model weights...more
Everyone seems to be talking about DeepSeek, and its latest AI technologies. But what is DeepSeek? What has it produced? And why is everyone talking about them? This client update is intended to provide some of the basic...more
On June 21, 2024, the US Department of the Treasury (Treasury) released proposed new federal regulations (Proposed Rules) that, if implemented, would prohibit or require notification of a broad range of outbound investment...more
The Interim AI Measures is China's first specific, administrative regulation on the management of generative AI services. Laws/Regulations directly regulating AI (the “AI Regulations”) The Cyberspace Administration of China,...more
On March 22, 2024, the Cybersecurity Administration of China (CAC), issued the long-awaited new Regulations on Promoting and Regulating Cross-Border Data Flows (the New Regulations) for compliance with China's Personal...more
A data controller that is not a critical information infrastructure operator that cumulatively exports personal information (excluding any sensitive personal information) of less than 100,000 individuals since January 1 of...more
In one of the most clear-eyed and sobering assessments of the cyberthreat China poses to our nation’s critical infrastructure, the country’s foremost cybersecurity leaders recently testified that the Chinese Communist Party...more
Cross-border transfer of evidence in litigation or arbitration proceedings is no longer innocuous in today’s world, with countries frequently at odds with each other over data security regulations. This was unexpected a...more
Commercial bribery enforcement also became more active, as the authorities marked the 30th anniversary of the PRC Anti-Unfair Competition Law. The revision of the PRC Anti-Espionage Law raised some concerns about national...more
The Cyberspace Administration of China (“CAC”) on September 28, 2023 issued the draft Provisions on the Regulation and Promotion of Cross-Border Data Flows (“draft Provisions”), just one year after China’s data export...more
Not only is the People’s Republic of China (PRC) a threat with its use of TikTok, but it also supports threat actors that have for years attacked U.S. based companies as well as the governments of the U.S. and Japan....more
U.S.-based multinationals with employees in the People’s Republic of China (PRC) are confronting a November 30 deadline to implement China’s new cross-border data transfer mechanism—the Standard Contract. This implementation...more
The EU Artificial Intelligence Act (or “AI Act”) is the world’s first legislation to regulate the use of AI. It leaves room for “technical soft law”; but, inevitably (being the first and being broad in scope), it will set...more
China's Cybersecurity Law ("CSL"), Personal Information Protection Law ("PIPL") and Data Security Law ("DSL") set a series of rules and requirements for the cross-border transfer of personal information located in China....more
From long-standing laws to incoming legislation, global nonprofits must understand the requirements and prepare for scrutiny in their handling of personal data. U.S. privacy regulations are currently a complex framework of...more
Regulator proposes requiring content moderation, algorithmic transparency, data protection and security, nondiscrimination, and quality of training data - Regulators around the globe are paying close attention to the...more
Introduction - Recent years have brought a dramatic increase in the number of countries that have comprehensive privacy and data security laws. As the world has become increasingly digital, privacy and data protection have...more