AI and the False Claims Act
Disparate Impact & Enforcement Rollbacks: What’s the Tea in L&E?
What’s in Your Operating Agreement? Legal Tips for Healthcare Providers
A New Brand of Uncertainty? — PE Pathways Podcast
The Rise of OTAs in Defense Contracting: Opportunities, Risks, and What Contractors Need to Know
Breaking the Cycle: Flooding, Infrastructure, and Climate Law in Practice
No Password Required: Former Lead Attorney at U.S. Cyber Command, Cyber Law Strategist, and Appreciator of ‘Mad Men’ Hats
Understanding BBB Ratings: Building Trust and Mitigating Risks — Regulatory Oversight Podcast
Beyond the Bylaws: The Medical Staff Show - Need to Know: How to Manage Medical Staff Confidentiality and Privilege Protections
False Claims Act Insights - The Mathematics of Nuclear FCA Verdicts
PODCAST: Williams Mullen's Benefits Companion - Cost, Care and Captives: A Mid-Size Employer’s Guide to Benefit Trends
Lawyers Beware: There Could Be Serious Ethics Issues With The New AI Browsers
Avoiding a Bored Board
We get Privacy for work – Episode 6: The Potential Privacy Risks Inherent to Mergers and Acquisitions
LathamTECH in Focus: Tech Deals: The Emerging Focus of FDI Regulators?
Podcast - Tips for Maintaining FTC Compliance When Using AI
Compliance Tip of the Day: Rethinking Corporate AI Governance Through Design Intelligence
The Presumption of Innocence Podcast: Episode 66 - Tariff Uncertainty and Compliance Risks for Businesses
Daily Compliance News: July 22, 2025, The I-9 Hell Edition
The second post in our data loss prevention series offers a roadmap for implementing Microsoft Purview DLP to secure sensitive data in AI-influenced environments. From discovery and classification to policy enforcement,...more
Information leaks can range from internal decisions and salary data to intellectual property, strategy documents, or board minutes. Whether caused by accident or intent, all leaks demand immediate, structured action. Even...more
Learn how to enhance your approach to data loss prevention with AI in mind, including what capabilities are essential for your organization and how to deploy Microsoft Purview DLP to address your needs. The information...more
As the corporate workplace continues to evolve—encompassing hybrid work environments, bring your own device policies, and cloud-based storage—companies are well-advised to consider areas of increased vulnerability and whether...more
Join us in a unique discussion regarding the cross-functional activities eDiscovery, IT, Compliance, Data Governance, and Security leaders often participate in while managing a large corporation’s information. Tips and tricks...more
The Committee on Foreign Investment in the United States (CFIUS) is a U.S. government interagency committee with the responsibility to review foreign investments in U.S. businesses and real estate transactions for national...more
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) recently issued a Ransomware Profile identifying steps organizations can take to prevent, respond to and recover from...more
While business risks abound, including intensified cybersecurity attacks, the impact of rapid technological advances and increasing regulations, there are healthy ways to uncover and mitigate risks. Organizations are...more
In today’s connected world, businesses face constant pressure to improve their cybersecurity practices and to confirm that they are meeting industry standards. To continue helping businesses achieve those goals, the SEC...more
On January 27, 2020, the SEC’s Office of Compliance Inspections and Examinations (OCIE) announced its most recent Cybersecurity and Resiliency Observations. This report highlights specific practices that have been, and can be...more