10 For 10: Top Compliance Stories For the Week Ending August 23, 2025
Daily Compliance News: August 22, 2025, The WADA Returns Edition
Operationalizing Trust at Scale: Evolving Compliance: Neta Meidav on the Diligent Acquisition and AI Integration
Daily Compliance News: August 18, 2025, The All Corruption Edition
Herb Stapleton's FBI Experience Proves to be Asset to Dinsmore's Corporate Team
False Claims Act Insights - Beyond Adversarialism: How to Steer FCA Investigations
Episode 381 -- Cadence Design Pays $140 Million to Settle Trade Violations
Adventures in Compliance: The Novels - The Valley of Fear, Sherlock Holmes’ Investigative Techniques for Today’s Challenges
LathamTECH in Focus: Move Fast, Stay Compliant
Adventures in Compliance: The Novels - The Valley of Fear, Introduction and Compliance Lessons Learned
10 For 10: Top Compliance Stories For the Week Ending, August 2, 2025
Daily Compliance News: July 30, 2025, The Corruption Kill Business Edition
Suluki Secrets: Behind the Scenes of Reasonable Investigations — FCRA Focus Podcast
Just Press "Play"
Episode 379 -- Update on False Claims Act and Customs Evasion Liability
Daily Compliance News: July 28, 2025, The Where is Grasshopper when you need him Edition
Daily Compliance News: July 25, 2025, The New Sheriff in Town Edition
Avoiding a Bored Board
Podcast - “I Lied Like a Dog!”
Daily Compliance News: July 21, 2025, The More Reasons Not to Go to China Edition
Introduction - Financial fraud represents a persistent threat to economic stability, undermining trust among businesses, investors, and the general public. As India’s financial ecosystem expands and transactions become...more
Need Assessment, Vetting, and Identification of a Reliable Expert in the Digital Forensics Process - Whether your organization is looking for advisory and expert support for an internal investigation into allegations of...more
As data volumes grow, the use of technology to make sense of it is increasing – especially within disputes and investigations where the key data is buried within thousands or millions of documents, emails, text messages,...more
Last week, HHS published its final rule outlining disincentives for certain healthcare providers that have committed information blocking (the Final Rule). The Final Rule also provides information related to OIG’s...more
The Cybersecurity and Infrastructure Agency (CISA) is seeking comment on a proposed rule to implement reporting requirements for critical infrastructure entities, including health care entities, on cyberattacks and ransomware...more
One of the biggest threats to modern corporations involves departing employees who take confidential business information (CBI) and/or trade secrets with them prior to or upon their departure. Indeed, the misappropriation of...more
Editor’s Note: In a rapidly evolving technological landscape, understanding the capabilities and limitations of platforms like Microsoft 365 (M365) is crucial for law firms, especially in the realms of eDiscovery and...more
Report on Patient Privacy Volume 23, no 7 (July 2023) In two public talks this spring, Melanie Fontes Rainer, director of the HHS Office for Civil Rights (OCR), said completing the 2021 proposed regulation extensively...more
On July 3, 2023, the US Department of Health and Human Services Office of Inspector General (OIG) published its long-awaited final rule implementing the 21st Century Cures Act provisions authorizing OIG to investigate claims...more
Forensic engineering and accident investigation is a diverse and comprehensive field that involves the examination and analysis of both physical and electronic evidence. An integral part of the accident investigation process...more
It’s been another interesting year in the world of legal technology, and we here at Hanzo have covered a variety of topics in 2022. Last week, we covered the first 10 of our top 20 ediscovery and compliance blogs. Today we...more
A Federal Trade Commission Civil Investigative Demand is an administrative subpoena utilized by the Federal Trade Commission (and other regulatory agencies, such as a state Attorney General) to obtain documentary materials...more
Multi-national organizations battle fraud and corruption risks daily given the size, scale, and complexities of their businesses, increased regulation and enforcement, and challenges preparing for a post-pandemic fraud...more
Back in May 2019, the Trump Administration issued Executive Order 13873, which was meant to police the use of certain information and communications technology and services (ICTS) purchased from "foreign adversaries." Then,...more
Absent proper precautions, companies may be forced to produce or otherwise disclose third-party forensic reports generated during a post-breach investigation. Historically, when a data breach has occurred, companies have...more
One of the first things a company should do when it suspects that its trade secrets have been compromised or that an employee has violated post-employment restrictive covenants is to conduct an investigation. ...more
Today’s data climate presents unique challenges and opportunities for legal professionals responsible for conducting investigations. As data volumes accelerate and new data types continue to emerge, traditional approaches to...more
With cybercrime on the rise, organizations have increasingly found themselves subject to litigation or regulatory investigations related to breaches. Documents and information created before breaches, such as security...more