Managing Whistlelbowers
10 For 10: Top Compliance Stories For the Week Ending August 23, 2025
Daily Compliance News: August 22, 2025, The WADA Returns Edition
Operationalizing Trust at Scale: Evolving Compliance: Neta Meidav on the Diligent Acquisition and AI Integration
Daily Compliance News: August 18, 2025, The All Corruption Edition
Herb Stapleton's FBI Experience Proves to be Asset to Dinsmore's Corporate Team
False Claims Act Insights - Beyond Adversarialism: How to Steer FCA Investigations
Episode 381 -- Cadence Design Pays $140 Million to Settle Trade Violations
Adventures in Compliance: The Novels - The Valley of Fear, Sherlock Holmes’ Investigative Techniques for Today’s Challenges
LathamTECH in Focus: Move Fast, Stay Compliant
Adventures in Compliance: The Novels - The Valley of Fear, Introduction and Compliance Lessons Learned
10 For 10: Top Compliance Stories For the Week Ending, August 2, 2025
Daily Compliance News: July 30, 2025, The Corruption Kill Business Edition
Suluki Secrets: Behind the Scenes of Reasonable Investigations — FCRA Focus Podcast
Just Press "Play"
Episode 379 -- Update on False Claims Act and Customs Evasion Liability
Daily Compliance News: July 28, 2025, The Where is Grasshopper when you need him Edition
Daily Compliance News: July 25, 2025, The New Sheriff in Town Edition
Avoiding a Bored Board
Podcast - “I Lied Like a Dog!”
In the first half of 2025, competition authorities across Europe have continued to vigorously use their intrusive dawn raid powers in diverse economic sectors. These operations require diligent and thorough preparation as...more
Email remains one of the most critical and challenging data sources in investigations. Whether responding to cybersecurity incidents, managing eDiscovery demands, or handling regulatory audits, organizations have to quickly...more
White-collar crimes present investigators with intricate challenges that require precision, expertise, and advanced technology. In today’s high-profile investigations, the stakes couldn’t be higher, with reputations,...more
1) Preservation Demand. Send an evidence preservation notice to anyone you think may be liable or contributed to the fire (so the entity is on notice not to destroy, delete, or alter relevant evidence)....more
The intersection of litigation, investigations, and technology is becoming increasingly vital to the success of legal teams. As organizations face mounting pressures from data proliferation, complex regulatory landscapes, and...more
In this week’s Case of the Week, I dive into a critical decision from FTC v. Amazon.com, Inc. (August 1, 2024), which underscores the precarious nature of privilege in document production—particularly in the context of...more
The digital forensics landscape in the private sector is witnessing a metamorphosis. The relentless growth and diversification of data necessitates a paradigm shift in how organizations approach investigations. Fragmented...more
The U.S. Environmental Protection Agency (EPA) is responsible for enforcing the federal laws, regulations, and Executive Orders focused on protecting the environment for the benefit of the American people, threatened and...more
The digital revolution has irrevocably transformed the way we conduct business, and investigations are no exception. The surge in remote work models has rendered traditional on-site data collection methods increasingly...more
Linguistics plays a crucial role in investigations under the US Foreign Corrupt Practices Act, a regulation focused on combating bribery and corruption in international business transactions. These investigations typically...more
Employee separation is an event that commonly involves investigations and litigation, as well as eDiscovery. Cases can rely heavily on electronic evidence, so Dr. Gavin W. Manes of Avansic and Craig Ball of Ball in Your Court...more
Join the EDRM in an illuminating session with some of the leading experts in the field of digital forensics and collections, Steve Davis, John Simek & Mary Mack. With a rich career spanning over three decades, Steve has not...more
With the ever-increasing rate of cybercrimes, computers are more important than ever in investigations. They hold evidence in the form of emails, internet history, documents, and other key files related to investigations. ...more
Gone are the days when legal and investigation teams had to collect online evidence screen-by-screen using multiple tools. And that’s a very good thing. Whether you’re searching through websites and social media to...more
Keyword search has been around since the inception of eDiscovery. Keywords works well in standard eDiscovery since their definitive character enable legal professionals to provide a clear scope in search, and find everything...more
Civil investigative demands (“CIDs”) are powerful tools used by state and federal agencies to gather information that will be used to investigate and prosecute individuals, corporations, physicians, and executives, etc. for...more
On July 24, 2020, the Court of Chancery in Delaware rejected defendant Centene Corporation’s broad document requests and third-party subpoenas issued as part of a stockholder action to inspect books and records, but allowed...more
Post-review litigation preparation traditionally occurs over email, with competing versions of outlines sent back and forth until no one is sure what’s the most up to date. Manual drudgery abounds, whether it’s printing out...more
As the number of people who interact on social media surpasses the one billion mark, attorneys are catching-on and turning to various platforms for investigative purposes and as informal discovery tools. We all know that the...more