Compliance Tip of the Day: AI and 3rd Party Risk Management
Adventures in Compliance: The Novels – The Hound of the Baskervilles: Uncovering M&A Compliance Lessons
We get Privacy for work – Episode 6: The Potential Privacy Risks Inherent to Mergers and Acquisitions
Daily Compliance News: July 24, 2025, The In Phone Hell Edition
LathamTECH in Focus: Tech Deals: The Emerging Focus of FDI Regulators?
Compliance into the Weeds: Sanctions Compliance Failures: Lessons from Harman International and Interactive Brokers
All Things Investigation: Due Diligence and Drama: A Deep Dive into Art World with Daniel Weiner
Episode 377 -- Refocusing Due Diligence on Cartels and TCOs
Essential Steps to Sell Your Business
FCPA Compliance Report: Stay the Course: Ellen Lafferty on Navigating Anti-Corruption Compliance in 2025
Adventures in Compliance: The Novels – The Hound of the Baskervilles, Introduction and Compliance Lessons Learned
Risk New York Speaker Series: AI Investments and Political Uncertainty with Chris Mason
Regulatory Ramblings: Episode 71 – Crypto Fault Lines: Stablecoins, Meme Coins & the Fight for Clarity PLUS: Sanctions, Shell Companies & Fragmented Global Trade
Episode 373 -- Christian Focacci on Current Developments in AI and Risk Management
Podcast - A Comparative Guide to Obtaining an FCL: DCSA vs. the Intelligence Community
Compliance in the Former Soviet Central Asian Republics
Inside a $175M Deal: Tim McLoughlin & Joshua Hayes Live From RDU Startup Week
Tariffs and Trade Series: What Investors Need to Know
Managing Sanctions Compliance
Understanding Human Trafficking and Modern Slavery: A Business Imperative with Clint Palermo
What Is Vendor Onboarding? Vendor onboarding is the process of establishing a company as an approved provider of technology, goods, or services to your organization. It’s also an essential early step in the vendor risk...more
Keypoint: The New York State Department of Financial Services (NYDFS) issued an industry letter outlining the threats posed to U.S. companies who hire remote technology workers linked to North Korea and may embezzle funds...more
Effective information security is no longer just dependent on an organisation’s own internal cybersecurity controls. The UK Information Commissioner’s Office (ICO) highlights that third-party service providers are processing...more
Revised regulations restricting investments in Chinese companies developing semiconductors and microelectronics, quantum information technologies, and artificial intelligence systems are taking shape and could soon be in...more
In the aftermath of what could be one of the most widespread global information technology outages in history, organizations are putting a renewed focus on combating old vulnerabilities that can have cascading effects. ...more
On June 21, 2024, the Biden administration rolled out its outbound investment screening regulations. Last year, the Biden administration published an advanced notice of proposed rulemaking (ANPRM) that outlined the broad...more
...As the world grapples with the rapid advancement of artificial intelligence (AI) technologies, concerns about the potential risks and unintended consequences have understandably taken center stage. While some advocate for...more
Last week, Paul Hastings attended the Securities and Exchange Commission (SEC) Speaks 2024 event presented by the Practising Law Institute (PLI) in cooperation with the SEC on April 1 and 2. The SEC Speaks program provides...more
What is a Management Body? Under both DORA and NIS2, a management body can be a body with managerial and/or supervisory functions. The powers and structure of management bodies vary within the EU Member State, and managerial...more
StoneTurn Partner Sarah Keeling and Senior Adviser Richard Mackintosh host a discussion on the evolving risk landscape, examining geopolitical shifts, emerging threats in the Middle East, and the impact of AI on security....more
Numerous laws (U.K. Bribery Act guidance document, German Supply Chain Act, Foreign Corrupt Practices Act resource guide, OECD Due Diligence Guidance for Responsible Supply Chains of Minerals from Conflict-Affected and...more
A Federal Trade Commission Civil Investigative Demand is an administrative subpoena utilized by the Federal Trade Commission (and other regulatory agencies, such as a state Attorney General) to obtain documentary materials...more
Before a deal closes on a merger or acquisition, due diligence investigation will ensue to confirm goal alignment and identify any obstacles present. There are several integral components of this process such as identifying...more
Cyber risks are increasing, and as a result, due diligence inquiries and valuations are increasingly focusing on the cybersecurity and privacy risks inherent in a business’s collection, use, retention and disposal of data. ...more
Find out why IT plays a critical role throughout the entire M&A process....more
In an era of increased M&A transactions, organizations must understand the risks and potential liabilities associated with the personal information they obtain on their customers, vendors, and employees....more
For a whole decade, ACI’s U.S. Export & Reexport Compliance for Canadian Operations conference continues to stand apart as the only practical, comprehensive event of its kind for the export compliance community in Canada. ...more
Now that DOD has released the final version of the Cybersecurity Maturity Model Certification (CMMC) guidelines, all contractors that work directly or indirectly on Department of Defense (DOD) contracts should be preparing to...more
The concept of human rights due diligence is at the heart of the UN Guiding Principles on Business and Human Rights (“UNGPs“) and is finding its way into a growing body of legislation around the world...more
Due to the dramatic increase and changing nature of cyber risks, mergers and acquisitions due diligence should expand to address cyber risks, available risk mitigation practices, and available insurance. Acquiring companies...more
Global companies are getting compliance overload, especially when it comes to third party risks. As we have seen over the years, third-party risk management involves significant risks on anti-corruption, AML, fraud,...more
It’s Friday and time for another overview of developments in the field of business and human rights that we’ve been monitoring. This week’s post includes: a revised Toolkit on National Action Plans on business and human...more
Four Things Compliance Practitioner Should Know About the Eurasian Economic Union - An effective Compliance risk management at emerging markets for any business significantly depends on timeous observation of changes in...more
The Securities and Exchange Commission (SEC) settled a Foreign Corrupt Practices Act (FCPA) enforcement action against an individual earlier this month when it announced the resolution of a matter involving Jun Ping Zhang,...more
The CFTC recently approved the National Futures Association’s interpretive notice (the “Cybersecurity Notice”) on the general requirements that members should implement for their information systems security programs...more