Daily Compliance News: July 21, 2025, The More Reasons Not to Go to China Edition
Daily Compliance News: July 7, 2025 the Disaster on the River Edition
Podcast - New Guidance on Complying with FTC Rule on Deceptive and Unfair Fees
State AG Pulse | The Inside Scoop: On Being Chief Deputy
Consumer Finance Monitor Podcast Episode: Challenges of Using the Current Law to Address Dark Patterns, with Guest Gregory Dickinson, Assistant Professor, St. Thomas University
Consumer Finance Monitor Podcast Episode: Should Written Contracts be Eliminated for Small Dollar Transactions? With David Hoffman, University of Pennsylvania Carey Law School
Troutman Pepper Attorneys Update Fair Lending Handbook for the American Association of Bank Directors - The Consumer Finance Podcast
Season 2 Episode 4 - Russia Enforcement and the involvement of DOJ's Task Force KleptoCapture
PLI's inSecurities Podcast: A View From the Inside
Consumer Finance Podcast Monitor Episode: The Consumer Financial Protection Bureau’s Final Section 1071 Rule on Small Business Data Collection: What You Need to Know, Part II, Guest David Skanderson
Podcast Episode 179: How to Start and Succeed at Creating Your Law Firm Podcast
Winstead HOA Law Webinar: Deed Restriction Compliance – Legal Process
The Labor Law Insider - Pause Before You Discipline: NLRB Turns Against Civility in Lion Elastomers Decision
A Glimpse Into the Other Side: Understanding the Perspective of Government Enforcers
The Justice Insiders Podcast: The Latest on Russia Sanctions and the Enhanced Enforcement Environment
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 142: Erica Barnes, Maynard Nexsen Attorney
PLI's inSecurities Podcast: Whistling the Same Tune: Building an Effective Whistleblower Program
Time to Amend the Defend Trade Secrets Act
PODCAST: Williams Mullen's Trending Now - An IP Podcast: NIL - Trending Issues Related to the NCAA’s Name, Image and Likeness Policy in 2023
PLI's inSecurities Podcast - Compliance and Enforcement Considerations for Private Funds & RIAs
According to Cybersecurity Dive, “Americans lost $16.6 billion to cyber fraud and internet crimes last year (2024), up 33% from the previous year. Phishing, spoofing and extortion topped the list of complaints, but investment...more
The NIS 2 Directive requires a wide range of in-scope organizations to adopt robust cybersecurity measures and incident response plans....more
On April 4, 2024, the Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) officially published its Notice of Proposed Rulemaking (NPRM) detailing significant new cybersecurity...more
Data security is a top concern for organizations in today’s digital landscape. It protects data from unauthorized access, use, modification, or disclosure, and requires implementing technical, administrative, and physical...more
Agility and resiliency remain essential attributes for manufacturers in 2023. Manufacturers are no longer focused on figuring out when things will return to “normal.” Instead, they are applying lessons learned from the...more
On February 17, 2023, the US Department of Health and Human Services Office for Civil Rights (OCR) released two companion reports to Congress detailing its actions in 2021 to enforce the privacy, security, and breach...more
Gain critical strategies for managing reviews in the new Team Telecom environment. The American Conference Institute’s 2nd National Team Telecom Conference will take place in Washington D.C. on April 25, 2022, one day...more
Amid the escalating conflict in Ukraine and concerns of Russian cyber threats to the United States, President Joe Biden recently signed a $1.5 trillion government spending deal with serious cybersecurity reporting obligations...more
On February 23, 2022, Assistant Attorney General Matthew Olsen announced that the DOJ’s China Initiative was officially ending. He also announced DOJ’s new national security strategy - Strategy for Countering Nation-State...more
The U.S. Government is continuing its frequent and highly visible use of denied party lists as an important tool in administering the export control laws. Each of the Bureau of Industry and Security (BIS), the Office of...more
Companies and consumers alike are under perpetual assault from bad actors as IoT, work from home, and cloud migration – all intended to improve productivity – have expanded the cyber attack surface. The continually evolving...more