Podcast - Too Dirty for Dirty Crime
Bar Exam Toolbox Podcast Episode 321: Listen and Learn -- Criminal Procedure: Identifications (Part 1)
Podcast - The Godfather of Houston
Law School Toolbox Podcast Episode 516: Listen and Learn -- Elements of a Crime
What crimes are reported to INTERPOL?
Episode 381 -- Cadence Design Pays $140 Million to Settle Trade Violations
Podcast - Bring Out the Bad Stuff
Just Press "Play"
10 For 10: Top Compliance Stories For the Week Ending, July 26, 2025
Daily Compliance News: July 23, 2025 the Pardon in the Wind? Edition
Podcast - “I Lied Like a Dog!”
Sittenfeld v. United States – Campaign Contributions as Crimes?
Podcast - Persistence and Determination
Episode 377 -- Refocusing Due Diligence on Cartels and TCOs
10 For 10: Top Compliance Stories For the Week Ending, July 12, 2025
RICO Section 1962(b): Acquisition or Maintenance of Control Over Legitimate Enterprises — RICO Report Podcast
Podcast - The Seeds of Corruption
False Claims Act Insights - Bitter Pills: DOJ Targets Pharmacies for FCA Enforcement
Episode 374 -- Justice Department Resumes FCPA Enforcement with New, Focused Guidance
This year’s NAAG Presidential Initiative Summit held August 5-6, 2025 in Portsmouth, NH, was hosted by New Hampshire AG and NAAG President John Formella, brought together state AGs, law enforcement officials, federal...more
Executive Summary - We entered 2025 with the world in turmoil, a new American administration in the White House, and various global actors—friends and foes alike—still actively vying for the attention of the American public. ...more
New concerns from Ireland’s Data Protection Commission about Facebook’s protection of information from American government surveillance may soon force the social networking giant to “overhaul its operations to keep data on...more
On March 27, 2019, the German Federal Ministry of the Interior (GMI) proposed a new bill (the "Draft Bill") for a so-called IT Security Act 2.0 (IT-SiG 2.0). In an effort to take a front-runner role in Europe, Germany has...more
Here’s a scenario that might be common enough in your day-to-day life: imagine that you’ve misplaced your wallet. (Apparently, Americans do this a lot. Statistics show we spend two and a half days each year looking for...more
Your social media content is not only susceptible to hacking; it’s also susceptible to disclosure requests from civil litigants (see our Sept. 14 blog post for more details) and even prosecutors without your consent if they...more