10 For 10: Top Compliance Stories For the Week Ending August 23, 2025
Daily Compliance News: August 22, 2025, The WADA Returns Edition
Operationalizing Trust at Scale: Evolving Compliance: Neta Meidav on the Diligent Acquisition and AI Integration
Daily Compliance News: August 18, 2025, The All Corruption Edition
Herb Stapleton's FBI Experience Proves to be Asset to Dinsmore's Corporate Team
False Claims Act Insights - Beyond Adversarialism: How to Steer FCA Investigations
Episode 381 -- Cadence Design Pays $140 Million to Settle Trade Violations
Adventures in Compliance: The Novels - The Valley of Fear, Sherlock Holmes’ Investigative Techniques for Today’s Challenges
LathamTECH in Focus: Move Fast, Stay Compliant
Adventures in Compliance: The Novels - The Valley of Fear, Introduction and Compliance Lessons Learned
10 For 10: Top Compliance Stories For the Week Ending, August 2, 2025
Daily Compliance News: July 30, 2025, The Corruption Kill Business Edition
Suluki Secrets: Behind the Scenes of Reasonable Investigations — FCRA Focus Podcast
Just Press "Play"
Episode 379 -- Update on False Claims Act and Customs Evasion Liability
Daily Compliance News: July 28, 2025, The Where is Grasshopper when you need him Edition
Daily Compliance News: July 25, 2025, The New Sheriff in Town Edition
Avoiding a Bored Board
Podcast - “I Lied Like a Dog!”
Daily Compliance News: July 21, 2025, The More Reasons Not to Go to China Edition
Introduction - Financial fraud represents a persistent threat to economic stability, undermining trust among businesses, investors, and the general public. As India’s financial ecosystem expands and transactions become...more
Introduction: Understanding Cloud Data in the Modern Digital Landscape - In today’s hyper-connected digital world, we interact with vast amounts of data, much of which isn’t stored locally on our devices but instead...more
Forensic collection and analysis are the processes of gathering large quantities of data from electronic devices and Cloud based data sources, preserving them, and examining the information. Both law firms and corporations...more
Editor’s Note: Email remains the most reliable and comprehensive source of evidence in digital investigations, often providing insights that other platforms cannot. As threats become more sophisticated and data volumes grow,...more
Editor’s Note: As digital threats become increasingly sophisticated and data volumes continue to surge, email remains a cornerstone of modern investigations. In this timely webcast, HaystackID® experts John Wilson and Rene...more
Need Assessment, Vetting, and Identification of a Reliable Expert in the Digital Forensics Process - Whether your organization is looking for advisory and expert support for an internal investigation into allegations of...more
Picture this: A corporate investigator stares at a mountain of digital evidence—emails, chat logs, spreadsheets, and mobile device data. With a sigh, they prepare for weeks of painstaking manual review, knowing that the clock...more
The digital forensics landscape in the private sector is witnessing a metamorphosis. The relentless growth and diversification of data necessitates a paradigm shift in how organizations approach investigations. Fragmented...more
‘Dear Mary,’ is Troutman Pepper’s Incidents + Investigations team’s advice column. Here, you will find Mary’s answers to questions about anything and everything cyber-related – data breaches, forensic investigations, how to...more
For eDiscovery and digital forensics experts, there are some frequently occurring actions we’ve seen that can hamper our ability to perform thorough and effective forensics investigations. This blog is designed to give a...more
More organizations continue to adopt blockchain technologies. According to Grand View Research, the global blockchain technology market value was estimated at 10.02 billion in 2022. Analysts forecast a compound annual growth...more
Corporate entities have significant responsibilities in managing and allocating resources effectively. The need to ensure proper use of funds for critical development and construction projects, as well as other large-scale...more
Forensic technology is moving forward at a rapid pace. Americans are bombarded by high tech forensics in every TV show or movie they watch. From CSI to MacGyver, investigators solve their cases and problems with innovative...more
Editor’s Note: On February 16, 2022, HaystackID shared an educational webcast designed to present and explore the foundations of analytics and highlight workflows, methods, and applications that can be leveraged in compliance...more
In the wake of a data breach, counsel will often require the assistance of a forensic firm in order to provide legal advice to their client. The forensic analysis—which is often memorialized in a report to counsel—is crucial...more
Our Privacy, Cyber & Data Strategy Team delves into how a federal court decided that a data breach forensic report was discoverable despite efforts to protect it under attorney-client privilege and work product protections...more
In late March, our Research and Operations team looked into practice areas that will not only continue at the same pace during the pandemic, but potentially thrive. One of these was trade secret matters, which our research...more
Like all other aspects of life, the forensic investigations of existing and new subrogation claims has been significantly impacted by the COVID-19 pandemic. Senior Mechanical Engineer and Certified Fire Investigator, C....more
One of the first things a company should do when it suspects that its trade secrets have been compromised or that an employee has violated post-employment restrictive covenants is to conduct an investigation. ...more
With cybercrime on the rise, organizations have increasingly found themselves subject to litigation or regulatory investigations related to breaches. Documents and information created before breaches, such as security...more