Data Driven Compliance: Understanding the ECCTA and Its Impact with Jonathan Armstrong
Suluki Secrets: Behind the Scenes of Reasonable Investigations — FCRA Focus Podcast
Understanding BBB Ratings: Building Trust and Mitigating Risks — Regulatory Oversight Podcast
PODCAST: PODCAST: Williams Mullen's Trending Now: An IP Podcast - Cease and Desist Letters: Protecting Your Intellectual Property the Right Way
Daily Compliance News: July 21, 2025, The More Reasons Not to Go to China Edition
Daily Compliance News: July 7, 2025 the Disaster on the River Edition
Podcast - New Guidance on Complying with FTC Rule on Deceptive and Unfair Fees
State AG Pulse | The Inside Scoop: On Being Chief Deputy
Because that's what heroes Do: Deep Space 9 – Episode 31: Extreme Measures – Great Sci Fi and Moral Dilemmas
FCPA Compliance Report: Eric Morehead on Understanding The Role and Function of The U.S. Sentencing Commission
Consumer Finance Monitor Podcast Episode: Challenges of Using the Current Law to Address Dark Patterns, with Guest Gregory Dickinson, Assistant Professor, St. Thomas University
Consumer Finance Monitor Podcast Episode: Should Written Contracts be Eliminated for Small Dollar Transactions? With David Hoffman, University of Pennsylvania Carey Law School
Troutman Pepper Attorneys Update Fair Lending Handbook for the American Association of Bank Directors - The Consumer Finance Podcast
Season 2 Episode 4 - Russia Enforcement and the involvement of DOJ's Task Force KleptoCapture
PLI's inSecurities Podcast: A View From the Inside
Consumer Finance Podcast Monitor Episode: The Consumer Financial Protection Bureau’s Final Section 1071 Rule on Small Business Data Collection: What You Need to Know, Part II, Guest David Skanderson
Podcast Episode 179: How to Start and Succeed at Creating Your Law Firm Podcast
Winstead HOA Law Webinar: Deed Restriction Compliance – Legal Process
The Labor Law Insider - Pause Before You Discipline: NLRB Turns Against Civility in Lion Elastomers Decision
A Glimpse Into the Other Side: Understanding the Perspective of Government Enforcers
What's Changed? The U.S. Department of Justice (DOJ) published a Data Security Program (DSP), pursuant to a final rule (Final Rule), which became effective on April 8, 2025....more
On January 8, 2025, the Department of Justice (“DOJ”) published its final rule addressing Executive Order (E.O.) 14117, “Preventing Access to Americans’ Bulk Sensitive Personal Data and United States Government-Related Data...more
On January 8, 2025, the Department of Justice (“DOJ”) published its Final Rule to implement President Biden’s Executive Order 14117, “Preventing Access to Americans’ Bulk Sensitive Personal Data and United States...more
While the balance of security, privacy, and public safety has always been a concern, recent cyberattacks have highlighted conflicting guidance by United States government officials, creating potential pitfalls for businesses....more
Proposed cybersecurity regulation may face changes or challenges in view of the incoming Trump administration that is intent on reducing the perceived regulatory burden on American companies and streamlining government...more
On April 4, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) published its much-anticipated Notice of Proposed Rule Making for the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA)....more
On March 27, 2024, the Cybersecurity and Infrastructure Security Agency (CISA), an operational component of the Department of Homeland Security (DHS), posted for public inspection its long-anticipated notice of proposed...more
2024 is shaping up to be a very active year for regulatory and enforcement developments in the healthcare industry – developments that concern not just hospitals and nursing facilities, but many non-healthcare companies as...more
On March 15, 2022, President Biden signed into law the Cyber Incident Reporting for Critical Infrastructure Act (the Act) as part of the Consolidated Appropriations Act of 2022. The Act requires "critical sector" entities to...more
The Apache Log4j vulnerability continues to command significant attention throughout the public and private sectors. In a recent interview, the director of the US Cybersecurity and Infrastructure Security Agency (CISA)...more