Podcast - Regulating AI in Healthcare: The Road Ahead
Mid-Year Labor & Employment Law Update: Key Developments and Compliance Strategies
Sunday Book Review: July 13, 2025, The Best Books on History Edition
Compliance into the Weeds: Changes in FCPA Enforcement
Amend (Don’t End) DEI: What SHRM’s BEAM Framework Means for Law Firms - On Record PR
Navigating Renewable Energy: Insights from the ACP Siting and Permitting Conference - Energy Law Insights
New Executive Order Targets Disparate Impact Claims Nationwide - #WorkforceWednesday® - Employment Law This Week®
2024-2025 Bid Protest Decisions with Far-Reaching Impacts for Government Contractors
Consumer Finance Monitor Podcast Episode: The Impact of the Election on the FTC
What Every Law Firm Leader Can Learn from Law Day and the Perkins Coie Ruling: On Record PR
The Changing Landscape of EEOC Enforcement and Disparate Impact
Compliance Tip of the Day: Standing at the Turning Point
ESG Essentials: What You Need To Know Now - Episode 19 - Power Struggles: Federal vs. State Authority in Energy Law
Episode 366 -- DOJ Issues Data Security Program Requirements
Non-Competes Eased, Anti-DEI Rule Blocked, Contractor Rule in Limbo - Employment Law This Week® - #WorkforceWednesday®
CHPS Podcast Episode 3: Unlocking America's Mineral Potential
CHPS Podcast Episode 2: Bitcoin in the Halls of Power
Clocking in with PilieroMazza: Latest Developments on DEI Executive Order and Action Items before April 21 Deadline
Executive Actions Impact Federally Funded Research: What Institutions Should Do Now – Diagnosing Health Care Video Podcast
The United States Data Security Program (DSP) represents a significant regulatory undertaking by the US government to control the flow of bulk sensitive data to specific foreign countries, for national security purposes....more
On April 8, the U.S. Department of Justice’s (DOJ) Final Rule, codified at 28 CFR Part 202, (Final Rule), implementing President Biden’s Executive Order 14117 “Preventing Access to U.S. Sensitive Personal Data and...more
The U.S. Department of Homeland Security (DHS) recently published new security requirements for certain restricted transactions covered by the U.S. Department of Justice’s (DOJ) sensitive data export rules. ...more
On January 17, 2025, days before the inauguration, former President Joe Biden issued an executive order titled Strengthening and Promoting Innovation in the Nation's Cybersecurity (EO 14144). Building on previous efforts,...more
The U.S. Department of Justice (“DOJ”) published its final rule (“Final Rule”) on January 8, 2025, that will prohibit or restrict transfer of certain data of U.S. persons to countries of concern, including to China. The Final...more
On Friday, December 27, 2024, the Justice Department issued a final rule to address “urgent national security risks posed by access to U.S. sensitive personal and government-related data from countries of concern and covered...more
On April 20, 2024, the House of Representatives passed H.R.8038, the 21st Century Peace through Strength Act ("supplemental"), which includes a version of H.R.7520, the Protecting Americans' Data from Foreign Adversaries Act...more
In a sweeping, coordinated effort across federal agencies, the US government has taken a giant leap forward to prevent access to data that could be exploited to the detriment of national security. On February 28, 2024,...more
Sunday, September 20, 2020, was intended to be the day on which prohibitions would go into effect on ByteDance Ltd. (ByteDance) and Tencent Holdings Ltd. (Tencent) and their subsidiaries—makers of the TikTok and WeChat apps,...more
UNITED STATES - Regulatory—Policy, Best Practices, and Standards - Cybersecurity Standards Issued for Government Contractors - On January 31, the Office of the Under Secretary of Defense for Acquisition and...more
On January 20, 2017, businessman Donald J. Trump was sworn in as the 45th President of the United States following a contentious and unconventional 2016 presidential election. Republicans also successfully maintained control...more
With interconnectivity and use of digital storage expanding, cyberthreats posed by nation states, commercial competitors, company insiders, transnational organised crime and ‘hacktivists’ are growing on a global basis. Recent...more