10 For 10: Top Compliance Stories For the Week Ending August 23, 2025
Daily Compliance News: August 22, 2025, The WADA Returns Edition
Operationalizing Trust at Scale: Evolving Compliance: Neta Meidav on the Diligent Acquisition and AI Integration
Daily Compliance News: August 18, 2025, The All Corruption Edition
Herb Stapleton's FBI Experience Proves to be Asset to Dinsmore's Corporate Team
False Claims Act Insights - Beyond Adversarialism: How to Steer FCA Investigations
Episode 381 -- Cadence Design Pays $140 Million to Settle Trade Violations
Adventures in Compliance: The Novels - The Valley of Fear, Sherlock Holmes’ Investigative Techniques for Today’s Challenges
LathamTECH in Focus: Move Fast, Stay Compliant
Adventures in Compliance: The Novels - The Valley of Fear, Introduction and Compliance Lessons Learned
10 For 10: Top Compliance Stories For the Week Ending, August 2, 2025
Daily Compliance News: July 30, 2025, The Corruption Kill Business Edition
Suluki Secrets: Behind the Scenes of Reasonable Investigations — FCRA Focus Podcast
Just Press "Play"
Episode 379 -- Update on False Claims Act and Customs Evasion Liability
Daily Compliance News: July 28, 2025, The Where is Grasshopper when you need him Edition
Daily Compliance News: July 25, 2025, The New Sheriff in Town Edition
Avoiding a Bored Board
Podcast - “I Lied Like a Dog!”
Daily Compliance News: July 21, 2025, The More Reasons Not to Go to China Edition
In this line of work, I am often asked if law enforcement is ever successful in finding and punishing the threat actors who have wreaked havoc on U.S. businesses and stolen millions of dollars in ransomware attacks. I am so...more
With Herb Stapleton’s recent arrival to the Firm’s corporate team, Dinsmore adds a powerful asset to help clients stay ahead of cyber threats…or manage the fallout when the worst happens. As a former FBI agent and Special...more
On this episode, we sit down with Trevor Hilligoss, director of security research and the research and innovation division of SpyCloud Labs. From his beginnings in the Army Criminal Investigation Division to his leadership...more
Let’s review for a moment. It’s not a HIPAA violation to be a victim of ransomware. It’s not a HIPAA violation to pay a ransom. It’s up to the covered entity (CE) to determine if a security or privacy incident is a...more
Last week, the Ohio Supreme Court ruled that victims of anonymous online attacks have an extension of time to file a lawsuit, holding that they can file a suit one year from date the targeted publication is discovered. This...more
Who will notify the potentially millions of individuals whose information might have been jeopardized by the massive cyberattack on Change Healthcare? Since the affiliate of UnitedHealth Group (UHG) first reported the...more
Cyberhackers—potentially frustrated by their limited ability to extort ransom from health care entities in attacks—have started extorting the patients themselves, threatening them with the release of information or...more
The Cybersecurity and Infrastructure Agency (CISA) is seeking comment on a proposed rule to implement reporting requirements for critical infrastructure entities, including health care entities, on cyberattacks and ransomware...more
The Department of Health and Human Services (HHS) Office for Civil Rights (OCR) recently announced its second settlement in four months growing out of a ransomware attack on a health care business. Maryland-based Green Ridge...more
On December 7, 2023, OCR released a statement that it was settling a phishing cyber-attack investigation into Lafourche Medical Group (the Medical Group) which specializes in emergency medicine, occupational medicine, and...more
Report on Patient Privacy 23, no. 10 (October, 2023) Kaiser Foundation Health Plan Inc. and Kaiser Foundation Hospitals will pay California $49 million to resolve allegations that they unlawfully disposed of hazardous waste,...more
Editor’s Note: In a rapidly evolving technological landscape, understanding the capabilities and limitations of platforms like Microsoft 365 (M365) is crucial for law firms, especially in the realms of eDiscovery and...more
A recent Forbes article details the significant growth of family offices worldwide, particularly in North America. While not as large as titans like Walton Enterprises LLC or Bezos Expeditions, these new single and...more
The Data Security Incident Response Report features insights and metrics from 1,270+ incidents that members of the firm’s DADM Practice Group helped clients manage in 2021. This episode takes us deeper into ransomware. ...more
Compliance teams looking to stay ahead of the changing landscape need to be up to date on the latest developments. Join us for Global Compliance Updates in collaboration with the DIFC Academy, on 2–3 November 2021. This...more
Our Privacy, Cyber & Data Strategy Team delves into how a federal court decided that a data breach forensic report was discoverable despite efforts to protect it under attorney-client privilege and work product protections...more
A federal court recently added additional wrinkles to one of the most important aspects of responding to a data breach: a forensic investigative report. The court ordered a law firm to turn over a report produced by a...more
The travel giant Sabre Corp. has reached an agreement with multiple State Attorneys General to pay $2.4 million and make certain changes in its cybersecurity policies to settle a multi-state investigation into a 2017 data...more
Our annual Clinical Practice Compliance Conference provides information about the latest government initiatives related to physicians and clinics, and physician integrity trends. Unite with your colleagues to discuss...more
On 15 July 2019, an unprecedented cyber-attack in Bulgaria was announced. Hackers have stolen data from the National Revenue Agency (“NRA”) relating to around 70% of Bulgaria’s population, including foreign nationals and...more
In the aftermath of the Securities and Exchange Commission’s (“SEC”) latest Report of Investigation (“Report”) regarding cyberattacks via “spoofed or manipulated electronic communications,” companies should prepare to adjust...more
As more names emerge from the dark web data dump of Ashley Madison customers, lawyers around the globe have found a very willing group of would-be plaintiffs. Interestingly, all of these plaintiffs are named “Doe,” which must...more
The massive holiday hacking of consumer information belonging to Target and Neiman Marcus customers has the impacted retailers under a microscope. State Attorneys General across the country have banded together to launch a...more