Compliance Tip of the Day: Why Engage in Pre-acquisition Due Diligence
Compliance Tip of the Day: Bringing Predictive Analytics into Your Compliance Regime
Compliance into the Weeds: Sanctions Compliance Failures: Lessons from Harman International and Interactive Brokers
Sanctions Compliance Failures: Lessons from Harman International and Interactive Brokers
Adventures in Compliance: The Novels – The Hound of the Baskervilles, Introduction and Compliance Lessons Learned
Compliance Tip of the Day: Assessing Internal Controls
Compliance Tip of the Day: COSO Objective 5 – Monitoring Activities
Compliance Tip of the Day: COSO Objective 2 - Risk Assessment
FCPA Compliance Report: Fraud Risk Management - Insights and Experiences with Peter Schablik
#Risk New York Speaker Series – Inside Behavioral Insights: Tom Hardin on Compliance at #RiskNYC
Compliance Tip of the Day: COSO Framework
#Risk New York Speaker Series: Exploring AI Risks in Compliance with Gwen Hassan
Healthcare Enterprise Risk Management
Compliance Tip of the Day: Assessing Internal Controls in International Operations
Managing Sanctions Compliance
Regulatory Ramblings: Episode 68 - Why Geopolitical Risk Matters to Compliance and Legal Staff with Mark Nuttal and Chad Olsen
FCPA Compliance Report: Amanda Carty on a Due Diligence and Risk Management
Episode 364 -- Five Strategies to Mitigate a New Risk Environment
Strengthening Compliance: Lessons From the OCC's Consent Order With Patriot Bank — Payments Pros – The Payments Law Podcast
Compliance and AI: Ali Khan on Implementing AI Risk Management Systems
When developing breakthrough technology, startups face a critical decision: pursue patent protection or maintain trade secrets. The choice depends on your technology's detectability and vulnerability to reverse engineering....more
Spring has arrived, and in addition to cleaning, it’s a good time to reassess how your company is handling its trade secrets. Far from being static, trade secret innovations, processes, and data evolve over time. Business...more
It is often said that the best defense is a good offense. That is certainly true if you are an employer conducting a risk assessment of potential employee defections that could expose your company to losses of valuable...more
As businesses consider how to transition to a "new normal," a thorough review of intellectual property (IP) assets and a protocol for managing those assets should be part of the planning process. For many companies, the...more
On April 14, 2020, California Governor Gavin Newsom outlined the six “critical indicators” the state will monitor during the next phase of its COVID-19 response as it considers when to modify its statewide shelter-in-place...more
Intellectual Property co-chair Amy Goldsmith joined Litigation partner and host Rich Schoenstein to discuss disclosing confidential information during a two-episode discussion on Law Brief, Tarter Krinsky & Drogin’s new...more
Intellectual Property co-chair Amy Goldsmith joined Litigation partner and host Rich Schoenstein to discuss trade secrets and disclosing confidential information during a two-episode discussion on Law Brief, Tarter Krinsky &...more
It’s Friday afternoon and the conversation goes a little like this, “Wait, what? They’re leaving? Where are they going? Is there any opportunity to help them reconsider?” When a key employee departs an organization, it can...more
When we think about trade secrets, we usually focus on keeping our own data safe. But an even bigger risk comes from hiring employees who can infect our systems with confidential information from a competitor. Companies often...more
The historic reform of the Toxic Substances Control Act overhauls the United States’ primary chemical safety law for the first time in 40 years. Following months of closed-door negotiations, the US House of...more
Protecting Trade Secrets in the Era of the Data Breach - The prevalence of data breaches cannot be ignored. New data breaches continue to occur one after an-other. In the first half of 2015 alone there were reports of...more
Something lost is always in the last place you look (by definition). It can also sometimes be in the first. Although technology has made it possible for outsiders to manipulate and infiltrate your company’s systems...more