News & Analysis as of

Compliance Regulatory Agenda EDGAR

Compliance programs typically refer to formalized institutional procedures within corporations and organizations to detect, prevent and respond to indvidual and widespread instances of regulatory violations. ... more +
Compliance programs typically refer to formalized institutional procedures within corporations and organizations to detect, prevent and respond to indvidual and widespread instances of regulatory violations.  In response to many corporate scandals evidencing rampant unethical business practices, many nations, including the United States, began passing strict regulatory frameworks aimed at curbing these abuses. Notable pieces of legislation in this area include the U.S. Foreign Corrupt Practices Act (FCPA), Sarbanes-Oxley (SOX), and the U.K. Bribery Act, to name a few. The foregoing statutes and the severe penalties often associated with them form the basis of many modern institutional compliance programs. less -
Morrison & Foerster LLP

Reminder: Prepare for EDGAR Next

On September 27, 2024, the U.S. Securities and Exchange Commission (the SEC) adopted amendments to Regulation S-T, resulting in major changes to the Electronic Data Gathering, Analysis, and Retrieval (EDGAR) System for SEC...more

Perkins Coie

Are You Ready for What’s (EDGAR) Next?

Perkins Coie on

Here’s a friendly reminder that the EDGAR Next transition is fast approaching. If your company has not yet begun preparations, we urge you to start planning now. As you may recall, on September 27, 2024, the U.S. Securities...more

White & Case LLP

Prepare Now for Edgar Next

White & Case LLP on

On September 27, 2024, the Securities and Exchange Commission (the "SEC") adopted rule and form amendments to the Commission's Electronic Data Gathering, Analysis, and Retrieval ("EDGAR") system to improve access to and...more

Ropes & Gray LLP

Capital Markets & Governance Insights - January 2025

Ropes & Gray LLP on

Companies should not minimize the extent of a material cybersecurity incident by omitting material facts regarding the scope and potential impact of the incident. Cybersecurity risk factor disclosures should be tailored to a...more

4 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide