10 For 10: Top Compliance Stories For the Week Ending, August 2, 2025
Data Driven Compliance: Understanding the ECCTA and Its Impact on Fraud Prevention with Vince Walden
Everything Compliance: Episode 158, The No to Corruption in Ukraine Edition
Daily Compliance News: July 31, 2025. The Forgotten Generation Edition
Daily Compliance News: July 31, 2025 the Forgotten Generation Edition
Understanding BBB Ratings: Building Trust and Mitigating Risks — Regulatory Oversight Podcast
Episode 379 -- Update on False Claims Act and Customs Evasion Liability
Data Driven Compliance: Understanding the UK’s New Failure to Prevent Fraud Offense with Sam Tate
Everything Compliance: Episode 157, The Q2 2025 Great Women in Compliance Edition
Daily Compliance News: July 22, 2025, The I-9 Hell Edition
Compliance Tip of the Day: Avoiding CCO Liability
2 Gurus Talk Compliance: Episode 55 – The From Worse to Worser Edition
Daily Compliance News: July 17, 2025, The COSO Yanked Edition
Wire Fraud Litigants Beware: Fourth Circuit Ruling Protects the Banks — The Consumer Finance Podcast
All Things Investigation: Due Diligence and Drama: A Deep Dive into Art World with Daniel Weiner
Daily Compliance News: July 14, 2025, The Secret Business Sauce-Reading Edition
Adventures in Compliance: The Novels – The Hound of the Baskervilles: Uncovering Compliance – Lessons from The Hound of the Baskervilles
Compliance Tip of the Day: Lessons from Internal Control Failures
Adventures in Compliance: The Novels – The Hound of the Baskervilles, Introduction and Compliance Lessons Learned
Compliance Tip of the Day: Assessing Internal Controls
On July 7, 2025, Pennsylvania Governor Josh Shapiro enacted a new Digital Forgery Law by signing SB 649 into law, which will take effect in 60 days. SB 649 creates “new criminal penalties for anyone who uses artificial...more
North Korean IT operatives are infiltrating U.S. and Western companies using stolen or fabricated identities, VPNs, and U.S.-based co-conspirators to gain unauthorized access to corporate systems. These insider threats pose...more
In a series of three articles, we will address the ascendency of account takeover (“ATO”) and business email compromise (“BEC”) fraud — the unfortunate occurrence where a payor or intended payee’s account is compromised,...more
ACI and CRN are excited to welcome you back to New York City this Spring for our 12th Legal, Regulatory & Compliance Forum on Dietary Supplements. Network and collaborate with over 150 industry stakeholders to explore how...more
On February 15, 2024, the Federal Trade Commission (FTC) issued a Supplemental Notice of Proposed Rulemaking (SNPRM) that proposes to hold liable entities that provide “goods or services” used by fraudsters to illegally...more
Messaging is one of the most trusted forms of communications today, with more than 2.2 trillion texts exchanged on America’s wireless networks in 2022 alone. Yesterday, at CTIA’s ConnectMobile forum in Las Vegas as part of...more
With scams evolving and growing in volume and maturity, it is more important than ever before to be vigilant about what information is available to nefarious actors. This article provides common scam scenarios, tips for...more
Cyber fraud has been around as long as the internet itself, but cyber criminals are more sophisticated than ever. While any experienced email user can spot a phony “Nigerian Prince” a mile away, even the most vigilant...more
A Minnesota federal district court has held that a software company is entitled to coverage for losses related to diverted billing emails under its business interruption coverage, rejecting the insurer’s argument that the...more
The United States District Court for the District of Minnesota, applying Minnesota law, has held that an insured’s loss resulting from the insured’s payment of fraudulent invoices received from a bad actor who hacked into the...more
On August 12, 2022, the U.S. District Court for the District of Minnesota dismissed a policyholder’s complaint seeking a declaration that $600,000 in social engineering fraud loss fell within a crime policy’s computer fraud...more
Unscrupulous actors may make misleading statements, use deceptive behavior, or produce falsified statements or documents to induce you to invest in what you are led to believe is a legitimate business opportunity – from real...more
A recent Utah Court of Appeals opinion, HKS Architects, Inc. v. MSM Enterprises Ltd. 2021 UT App. 70, puts contractors and designers on notice that they need to pay attention to receivables and excuses for non-payment. The...more
In a Press Release issued on October 14 2021 by the Office of Massachusetts Attorney General Maura Healy, a potentially groundbreaking settlement was announced. Below is an excerpt from the release, followed by our takeaways....more
In Episode 7 of Digging Deeper, Chris Morgan Jones and Darren Matthews explore how fraudsters find new avenues to take advantage of a business, and some cases where investigators cracked the code on bad actors....more
There is a common misconception that claims for intentional conduct are not covered under your insurance policy. In fact, insurance policies commonly provide coverage for intentional misconduct. For example, directors and...more
How much of the Paycheck Protection Program (“PPP”) will end up in the hands of bad actors? With several hundreds of billions of dollars in the PPP bucket, fraud, misuse, and misdirection of funds is already being identified...more
On Tuesday, July 25, 2017, SEC Chairman Jay Clayton spoke at the U.S. Chamber of Commerce Center for Capital Markets Competitiveness (CCMC). During the panel, Chairman Clayton discussed the Commission’s priorities on a...more
Tomorrow, March 15 is enshrined as one of the most famous days of all-time, the “Ides of March”. On this day in 44 BC, the “Dictator for Life” Julius Caesar was assassinated by a group of Roman nobleman who did not want...more
The SEC has adopted final rules to implement Section 926 of the Dodd-Frank Wall Street Reform and Consumer Protection Act. Section 926 required the SEC to adopt rules that disqualify securities offerings involving certain...more