Compliance Tip of the Day: Why Engage in Pre-acquisition Due Diligence
Compliance Tip of the Day: Bringing Predictive Analytics into Your Compliance Regime
Compliance into the Weeds: Sanctions Compliance Failures: Lessons from Harman International and Interactive Brokers
Sanctions Compliance Failures: Lessons from Harman International and Interactive Brokers
Adventures in Compliance: The Novels – The Hound of the Baskervilles, Introduction and Compliance Lessons Learned
Compliance Tip of the Day: Assessing Internal Controls
Compliance Tip of the Day: COSO Objective 5 – Monitoring Activities
Compliance Tip of the Day: COSO Objective 2 - Risk Assessment
FCPA Compliance Report: Fraud Risk Management - Insights and Experiences with Peter Schablik
#Risk New York Speaker Series – Inside Behavioral Insights: Tom Hardin on Compliance at #RiskNYC
Compliance Tip of the Day: COSO Framework
#Risk New York Speaker Series: Exploring AI Risks in Compliance with Gwen Hassan
Healthcare Enterprise Risk Management
Compliance Tip of the Day: Assessing Internal Controls in International Operations
Managing Sanctions Compliance
Regulatory Ramblings: Episode 68 - Why Geopolitical Risk Matters to Compliance and Legal Staff with Mark Nuttal and Chad Olsen
FCPA Compliance Report: Amanda Carty on a Due Diligence and Risk Management
Episode 364 -- Five Strategies to Mitigate a New Risk Environment
Strengthening Compliance: Lessons From the OCC's Consent Order With Patriot Bank — Payments Pros – The Payments Law Podcast
Compliance and AI: Ali Khan on Implementing AI Risk Management Systems
When developing breakthrough technology, startups face a critical decision: pursue patent protection or maintain trade secrets. The choice depends on your technology's detectability and vulnerability to reverse engineering....more
Spring has arrived, and in addition to cleaning, it’s a good time to reassess how your company is handling its trade secrets. Far from being static, trade secret innovations, processes, and data evolve over time. Business...more
What exactly is data exfiltration, and why should organizations be concerned about it? Data exfiltration is the movement or migration of company-owned trade secrets or intellectual property outside of the enterprise. It...more
Last week I had the pleasure of sitting down and discussing the legal implications of AI with a group of General Counsels. This group of GCs represented companies from the Fortune 100 all the way to mid-size enterprises. That...more
Ready or not, artificial intelligence (“AI”) is here, and even if your company hasn’t introduced or approved the use of AI, chances are your employees are already using it....more
Public companies should take note of several recent developments, including: ..Reversal of the Pegasystems trade secrets lawsuit that nevertheless preserves guidance to take care when describing litigation as “without...more
On 24 June 2024, the European Union (EU) adopted its 14th sanctions package directed against Russia, imposing an asset freeze against an additional 116 individuals and entities and expanding sectoral sanctions targeting key...more
While the global pandemic has highlighted the perils of remote work, decades of collective experience undertaking internal investigations for corporations and their advisors in connection with the misappropriation of...more
It is often said that the best defense is a good offense. That is certainly true if you are an employer conducting a risk assessment of potential employee defections that could expose your company to losses of valuable...more
Following Germany's initial attempt last year to implement the EU Whistleblower Directive (Directive (EU) 2019/1937), aimed at ensuring harmonized and improved protection of whistleblowers throughout Europe, the Federal...more
Private activity bonds may finance projects that rely on novel technology subject to intellectual property protections, such as patents, trade secrets, and know-how. The novelty of the technology presents unique risks for...more
Welcome to Morrison & Foerster’s quarterly newsletter on dispute resolution. In this newsletter, we address recent developments in arbitrations, investigations, and commercial and intellectual property litigation that may...more
As businesses consider how to transition to a "new normal," a thorough review of intellectual property (IP) assets and a protocol for managing those assets should be part of the planning process. For many companies, the...more
On April 14, 2020, California Governor Gavin Newsom outlined the six “critical indicators” the state will monitor during the next phase of its COVID-19 response as it considers when to modify its statewide shelter-in-place...more
In December 2019, the Division of Corporation Finance (Staff) of the U.S. Securities and Exchange Commission (SEC) published new "CF Disclosure Guidance: Topic No. 8" (Guidance) regarding disclosure obligations companies...more
The SEC has issued new guidance it believes will assist public companies both in assessing materiality and in drafting disclosure related to risks to technology and intellectual property that may result from conducting...more
Intellectual Property co-chair Amy Goldsmith joined Litigation partner and host Rich Schoenstein to discuss disclosing confidential information during a two-episode discussion on Law Brief, Tarter Krinsky & Drogin’s new...more
Intellectual Property co-chair Amy Goldsmith joined Litigation partner and host Rich Schoenstein to discuss trade secrets and disclosing confidential information during a two-episode discussion on Law Brief, Tarter Krinsky &...more
It’s Friday afternoon and the conversation goes a little like this, “Wait, what? They’re leaving? Where are they going? Is there any opportunity to help them reconsider?” When a key employee departs an organization, it can...more
During a recent seminar I was asked, “What can companies do to stop the loss of trade secrets to places like China?” The questioner seemed stressed and a bit angry, perhaps reflecting a certain frustration that there may not...more
When we think about trade secrets, we usually focus on keeping our own data safe. But an even bigger risk comes from hiring employees who can infect our systems with confidential information from a competitor. Companies often...more
The historic reform of the Toxic Substances Control Act overhauls the United States’ primary chemical safety law for the first time in 40 years. Following months of closed-door negotiations, the US House of...more
Protecting Trade Secrets in the Era of the Data Breach - The prevalence of data breaches cannot be ignored. New data breaches continue to occur one after an-other. In the first half of 2015 alone there were reports of...more
Something lost is always in the last place you look (by definition). It can also sometimes be in the first. Although technology has made it possible for outsiders to manipulate and infiltrate your company’s systems...more
Disputes regarding trade secrets and corporate espionage are becoming perpetual fixtures in the news. One of the most common scenarios is that a key employee departs to join a competitor and his or her former employer quickly...more