Episode 381 -- Cadence Design Pays $140 Million to Settle Trade Violations
Fierce Competition Podcast | Antitrust Collusion in Labor Markets: Enforcement Trends on Both Sides of the Atlantic
Podcast - An Overview of State Attorney General Consumer Protection Enforcement
LathamTECH in Focus: Move Fast, Stay Compliant
Compliance Tip of the Day: Key M&A Enforcement Actions
Compliance into the Weeds: A Deep Dive into Cadence Design Systems’ Export Control Violations
Daily Compliance News: August 1, 2025, The All AI Edition
From the Editor’s Desk: Compliance Week’s Insights and Reflections from July to August 2025
Everything Compliance: Episode 158, The No to Corruption in Ukraine Edition
Daily Compliance News: July 31, 2025. The Forgotten Generation Edition
Mid-Year Labor & Employment Law Update: Key Developments and Compliance Strategies
Disparate Impact & Enforcement Rollbacks: What’s the Tea in L&E?
CSC Guidance Unveiled: NIL Enforcement and Implications for Collectives — Highway to NIL Podcast
Episode 379 -- Update on False Claims Act and Customs Evasion Liability
PODCAST: Williams Mullen's Trending Now: An IP Podcast - Cease and Desist Letters: Protecting Your Intellectual Property the Right Way
PODCAST: PODCAST: Williams Mullen's Trending Now: An IP Podcast - Cease and Desist Letters: Protecting Your Intellectual Property the Right Way
Data Driven Compliance: Understanding the UK’s New Failure to Prevent Fraud Offense with Sam Tate
Daily Compliance News: July 25, 2025, The New Sheriff in Town Edition
Quick Guide to Administrative Hearings
Compliance into the Weeds: Sanctions Compliance Failures: Lessons from Harman International and Interactive Brokers
A bite-sized summary of recent UK pension news Welcome to our latest update, in which we cover: Pensions Regulator: successful action to boost scheme funding Enforcement action by TPR, combined with a ruling from the...more
On July 31, the U.S. Department of Justice (DOJ) announced a settlement in United States ex rel. Lenore v. Illumina, Inc, the first case in which underlying cybersecurity issues formed the basis of a settlement under the...more
In November 2024, the Township of White Lake, Michigan, fell victim to a cyberattack resulting in the wiring of approximately $29 million to the unauthorized account of the culprit. Before White Lake imminently closed on its...more
Imagine a small, fast-growing tech company preparing to go public in 2025. The leadership team, relying on practices that were standard just a few years ago, drafts generic risk disclosures, leans on flexible governance...more
Two settlements recently announced by the U.S. Department of Health and Human Services (HHS), Office for Civil Rights (OCR) reinforce the agency’s emphasis on promoting thorough risk analysis to help prevent disclosure of...more
Key Point: “Winning the Race: America’s AI Action Plan,” the Trump Administration’s summary approach to federal artificial intelligence (AI) policy, and three new Executive Orders (EO) propose a wide-ranging federal strategy...more
- What is new: The EU’s Delegated Regulation on Subcontracting has come into force, completing the legal framework of the Digital Operational Resilience Act (DORA). Attention will now turn to enforcement. - Why it matters:...more
While many systems that are described as AI have been around for decades (e.g., internet search engines), today’s AI tools are much more powerful and are widely accessible. Generative AI and agentic AI extend the power of...more
The Securities and Exchange Commission (SEC) recently announced the withdrawal of several Biden-era regulations, including a proposed rule that would have required a broad range of platforms and financial intermediaries (such...more
In a long-awaited move, the EU Commission has published a proposal for a new EU “Space Bill”. Set to enter into force in 2030, this piece of legislation is aimed at harmonising a fragmented legal environment, in order to...more
The Federal Communications Commission (FCC) has taken significant steps to institutionalize national security within its regulatory framework through the creation of the Council on National Security (CNS). Chaired by Chairman...more
Government contractors should be on high alert following the recent announcement that Raytheon Company, its parent RTX Corporation, and Nightwing Group, LLC, have agreed to pay $8.4 million to resolve allegations of violating...more
The dramatic increase in global reach that the internet provides U.S.-based companies comes as a double edge sword. While it significantly increases a company’s potential customer pool, it also subjects companies to...more
Share on Twitter Share by Email Share Back to top HIPAA Security Risk Analyses (SRAs) should be the foundation of every digital health company’s cybersecurity compliance. Far more than a checkbox exercise, a comprehensive SRA...more
The intersection of privacy, cybersecurity, and AI is reshaping risk and regulation in fintech. In a recent episode of The Fintech and Blockchain Podcast, our team explored how fast-moving developments—from AI-powered...more
After years of regulatory uncertainty, the Trump administration has signaled a new approach to digital assets, including by establishing a working group focused on digital assets and nominating crypto-friendly chairs to the...more
Last week’s NFL draft highlighted more than the accomplishments of athletes at the combine or on the field. While there was extensive coverage of the merits of each player, one of the major headlines coming out of the draft...more
Our Privacy, Cyber & Data Strategy Team highlights the increasingly specific cybersecurity controls identified by regulators, explains why these enhanced cybersecurity controls have become the focus of regulators, and shares...more
Foreign nationals visiting the United States, and even returning U.S. citizens and other legal residents (with valid visas), face increasing digital privacy risks and potential entry challenges when arriving at U.S. ports of...more
As companies shift their thinking from “if” a cyberattack will happen to “when” an attack hits, the key differentiator in how a company emerges from an attack is often dictated by preparation and strategic planning in order...more
A recent United States Department of Justice (DOJ) announcement reinforces that enforcement of cybersecurity requirements under the False Claims Act (FCA) remains an ongoing risk. According to the press release, defense...more
Hong Kong’s Legislative Council passed the Protection of Critical Infrastructures (Computer Systems) Bill (the “CI Bill”) on March 19, 2025. This landmark legislation aims to enhance cybersecurity and minimize disruptions...more
In today’s heightened enforcement environment, compliance auditing isn’t just a best practice—it’s a necessity. Federal and state laws and industry guidance, including the Office of Inspector General (OIG) Compliance Program...more
On Friday, the U.S. Department of Health and Human Services (HHS), Office for Civil Rights (OCR) announced the fifth enforcement action under its Risk Analysis Initiative. In this case, OCR reached a settlement with Health...more
A HIPAA compliance assessment is an evaluation of an organization's practices, policies, and procedures to ensure that they align with requirements from the Health Insurance Portability and Accountability Act (“HIPAA”). It...more