Illness, Disability, and Workplace Performance: A Guide for Employers
Episode 384 -- Third-Party Risks and Sanctions
Building a Team of Trusted Advisors
ERGs: Valuable or Vulnerable?
Navigating U.S.-China Relations: Lessons From History for Today’s Global Economy
Work This Way: A Labor & Employment Law Podcast | How Employers Can Protect Intellectual Property with Bryan Baysinger of Maynard Nexsen
Regulatory Rollback: Impact of the CFPB's Withdrawal of Overdraft and Deposit Account Fee Guidance on Financial Institutions and Related Litigation Risks — The Consumer Finance Podcast
Protect Yourself and Your Business with Indemnification Understanding
False Claims Act Insights - An FCA Perspective on Artificial Intelligence in the Healthcare Industry
Data Driven Compliance: The Failure to Prevent Fraud Offense: Insights for US General Counsels with Mike DeBernardis
AI Today in 5: August 22, 2025, The Angst Episode
The Privacy Insider Podcast Episode 17: Security, Cyber-Intel, and a Sense of Humor with Nir Rothenberg of Rapyd
Demystifying Wage and Hour Audits: One-on-One with Courtney McFate
Compliance Tip of the Day: Using AI to Embed Your Compliance Program
Daily Compliance News: August 22, 2025, The WADA Returns Edition
Culture Crafters: Building a Culture of Accountability in the Face of Disasters
Hot Topics in International Trade - The Daunting Task of Export Compliance With Braumiller Law Group
New FLSA Notice Standard, DOL’s PAID Program, Axed Wage and Hour Penalties - #WorkforceWednesday® - Employment Law This Week®
Cuando la marca viaja en turista y sin registro
Compliance Tip of the Day: Trust and Verify
In this episode of What’s the Tea in L&E, Healthcare Regulatory and Compliance attorney Lindsey Brock joins host Leah Stiegler to unpack a new Virginia law that went into effect on July 1, 2025, introducing updated reporting...more
Compliance training is one of the most important responsibilities of the compliance officer. A provider’s best defense to non-compliance is well-trained employees who understand and follow your policies....more
The annual Cost of a Data Breach Report (Report) published by IBM is reliably full of helpful cybersecurity data. This year is no different. After reviewing the Report, we pulled out some interesting data points. Of course,...more
Given the choice between credit card data and digital health records, cybercriminals prefer the latter. A stolen credit card can be canceled. Electronic protected health information (ePHI) with its treasure-trove of...more
We are excited to bring the healthcare compliance sessions and updates to you as an interactive, online experience. Watch, listen, and ask questions. Each hour, attendees will be able to select from four concurrent sessions....more
In today’s world, hospitals have to be prepared for anything and everything, and not just medical emergencies. They have to be prepared to handle all types of workplace violence, from active shooters to abuse from...more
Are your employees instructed on the proper (and improper) use of social media? Does your organization have policies and provide training on the appropriate handling of sensitive information? A recent United States Department...more
In our last article, we showed you how to evaluate where your organization sits on the landscape of readiness and preparedness. In this concluding article, we identify concrete steps you can immediately employ to move your...more
Seyfarth Synopsis: NIOSH reiterated last week that healthcare workers are exposed to a wide range of hazards on the job and healthcare employers may not be following best practices to protect against these hazards....more