Podcast - “I Lied Like a Dog!”
Sittenfeld v. United States – Campaign Contributions as Crimes?
Podcast - Persistence and Determination
Episode 377 -- Refocusing Due Diligence on Cartels and TCOs
10 For 10: Top Compliance Stories For the Week Ending, July 12, 2025
RICO Section 1962(b): Acquisition or Maintenance of Control Over Legitimate Enterprises — RICO Report Podcast
Podcast - The Seeds of Corruption
False Claims Act Insights - Bitter Pills: DOJ Targets Pharmacies for FCA Enforcement
Episode 374 -- Justice Department Resumes FCPA Enforcement with New, Focused Guidance
Daily Compliance News: June 16, 2025, The Golden Share Edition
The JustPod: Defending the "Evil Genius:" A Conversation with Leonard Ambrose
The Presumption of Innocence Podcast: Episode 62 - The Tragic Toll of Conspiracy Theories: The Seth Rich Story
SBR-Author’s Podcast: The Unseen Life of an Undercover Agent: A Conversation with Charlie Spillers
Podcast - "Ready for Trial?"
Podcast - The Law as a Force for Change
The JustPod: A Discussion with Defense Counsel Rocco Cipparone and Angie Levy on January 6 Prosecutions
False Claims Act Insights - Trump DOJ Sharpens Its Focus on Healthcare Fraud
The JustPod: A murder-for-hire allegation, public corruption trial, and notable acquittal
Podcast - Every Case Is a New World
Earlier this year, we wrote on the Fourth Circuit's en banc rehearing in United States v. Chatrie, a criminal appeal addressing whether a geofence warrant used to locate the defendant in a bank robbery trial was a...more
On January 17, the District of Columbia Circuit issued a pivotal opinion regarding the Fifth Amendment rights of a defendant-appellant compelled by the FBI to unlock his cellphone using his thumbprint. The D.C. Circuit’s...more
The Internal Revenue Service (IRS) sent thousands of taxpayers a letter, alerting them of an unauthorized inspection or disclosure of their tax return or return information by a former IRS contractor, Charles Littlejohn....more
Once the hard part of dealing with INTERPOL is over, and an individual’s Red Notice is removed, many difficulties that come with a Red Notice become obsolete. Though this is true, occasionally there are remaining challenges,...more
North Dakota criminal law currently contains penalties for misusing the personal information of another. That law has been expanded, and beginning August 1, 2019, it is a class B felony to use a skimmer or scanning device to...more
A supermarket chain in the United Kingdom has been all over the press after it was held liable for a data breach by a rogue employee. This article analyzes the appellate court’s judgment to set out what it means for employers...more
ANTICORRUPTION DEVELOPMENTS - $34 Million SEC Settlement for Legg Mason - On August 27, 2018, the Securities and Exchange Commission (SEC) announced that Legg Mason Inc. will pay more than $34 million to settle an...more
On Monday, July 18, 2016, the U.S. District Court for the Southern District of Texas sentenced former St. Louis Cardinals scouting director Chris Correa to nearly four years in prison for the hacking of the Houston Astros’...more
Welcome to the third issue of Focus on China Compliance for 2015. According to the FCPA Blog’s October 2015 Corporate Investigations List, China leads the countries reported to be involved in FCPA investigations with 29...more
Today, I wrap up my series on why I think compliance is at the Tipping Point. However as it is a Friday in October, I continue my tribute to the Man in the Shadows, producer Val Lewton, whose films for RKO had some of the...more
Adviser to European Court of Justice Says US-EU Safe Harbor Should Be Declared Invalid - An advisory opinion issued by the advocate general to the European Court of Justice states that the U.S.-EU Safe Harbor should be...more
One of the more dramatic privacy law developments in China in 2014 was the August criminal conviction of foreign nationals Peter Humphrey and Yu Yingzeng for their violation of Article 253 of the Criminal Law (??) associated...more
Manufacturers with operations, employees, and/or customers in China must be aware of a long list of China-specific data-flow and content restrictions. Data-flow restrictions in particular affect manufacturers employing or...more
Under section 56 of the Data Protection Act 1998 (DPA), it is now a criminal offence for any person or organisation to require an individual to submit a ‘subject access request’ (i.e. the right for an individual to access any...more