New FLSA Notice Standard, DOL’s PAID Program, Axed Wage and Hour Penalties - #WorkforceWednesday® - Employment Law This Week®
Cuando la marca viaja en turista y sin registro
Compliance Tip of the Day: Trust and Verify
Great Woman in Compliance: Building Strategic and Effective Risk Assessments
Compliance into the Weeds: The Dark Side of AI in Employee Training
Compliance Tip of the Day: AI Assistant for Compliance
Innovation in Compliance: Gaurav Kapoor on Risk Management and the Role of AI in GRC
Daily Compliance News: August 19, 2025, The AI Winter Edition
FCPA Compliance Report: Accountability in Times of Crisis: A Conversation with Tom Fox and Sam Silverstein
AI Today in 5: August 18, 2025, The AI Music Episode
Enhancing Card Partnerships and Compliance: A Conversation With Matthew Goldman — Payments Pros – The Payments Law Podcast
Compliance Tip of the Day: Costs and Benefits of AI
Compliance Tip of the Day: How a CFO Views Compliance and Risk
12 O’Clock High, A Podcast on Business Leadership – Leadership in Cybersecurity and Privacy with Robert Meyers
Data Driven Compliance – James Tillen on the Importance of Cross-Functional Collaboration in Complying with the FTPF Offense
AI Today in 5: August 15, 2025, The AI as Boss Episode
We get Privacy for work — Episode 7: What Is a WISP and Why Your Organization Must Have One
What to Do When Leadership Doesn’t Take Compliance Seriously
Daily Compliance News: August 14, 2025 The End of Dial Up Edition
Nonprofit Basics: Grant Agreements—Matching Grants, IP, Recoverable Grants & More
The European Commission has published the long-awaited guidelines clarifying how online platforms such as social media platforms, online marketplaces, app stores and other content-sharing services should protect minors under...more
In 2022, a company’s Chief Technical Officer started making internal complaints about alleged sex discrimination and retaliation at his place of employment and advocating for some female executives who were allegedly not...more
Remote worker fraud is expected to continue to proliferate in 2025. Fully remote hiring and work, particularly in the technology sector, continues to pose unique business and legal risks for companies. Just in December 2024,...more
To help organizations stay on top of the main developments in European digital compliance, Morrison Foerster’s European Digital Regulatory Compliance team reports on some of the main topical digital regulatory and compliance...more
Healthy food and beverage (“F&B”) companies frequently use social media to advertise. When used appropriately, social media campaigns can be incredibly effective tools to help emerging F&B companies reach target consumers,...more
Are Automakers Making Sufficient Efforts to Protect Customer Data? With the ever-expanding Internet of Things, data privacy is a growing concern in today’s digital age. The automotive industry is no exception. The National...more
Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more
The Cybersecurity and Infrastructure Security Agency (CISA) recently issued guidance on protecting the security of organizations’ social media accounts to reduce the risk of unauthorized access to those accounts....more
Malware goes commercial. Last year, Jeff Bezos’ phone was hacked after he received a message on WhatsApp containing a line of malware code. The incident has shed light on the malware, aka spyware, industry. Companies sell...more
Facebook wages a war on misinformation. On Monday, Facebook announced it will start removing videos altered by artificial intelligence that are likely to mislead people into thinking that a subject of the video made...more
WhatsApp, the popular instant messaging app announced a hack and the exposure of a security flaw this week. The flaw injected malware onto users’ phones, potentially exposing their otherwise encrypted data and messages. ...more
What are the biggest, most interesting stories in the ever-changing worlds of cybersecurity, risk mitigation, and information governance?...more
Hogan Lovells partner Winston Maxwell spoke at the executive roundtable on artificial intelligence and online hate speech, organised on January 31, 2019 by CERRE, the Centre on Regulation in Europe....more
For many companies, customer information ranks among its most important assets. Yet these days, employees often keep this sensitive customer information in electronic locations that are not readily accessible to or controlled...more
Roseanne Barr, known for her big mouth and abrasive humor, is no stranger to controversy. (I still cringe when I recall her rendition of the national anthem.) Unfortunately for her, and the more than 200 people who worked on...more
It is well known that hackers and fraudsters surf Facebook to find individuals who have not protected their information through Facebook’s privacy settings. People put a lot of information on Facebook that is very personal...more
Facebook, Instagram, YouTube, and other social media platforms have become the format of choice for many companies that want to advertise their products and services. At the same time, the U.S. Federal Trade Commission (FTC)...more
Protecting your digital assets is as important as protecting your physical assets. Never think, “It won’t happen to me”—everyone has something that cyber criminals can steal. Stay secure by following a few basic guidelines....more
Another mechanism for continuous improvement of your compliance program is through risk-based monitoring. Under Prong 5 of the DOJ’s Evaluation of Corporate Compliance Programs, is the following topic and question: Manifested...more
Newspaper headlines, television airwaves, and social media links are filled with companies dealing with crises on a near-daily basis. Just as Samsung learned in 2016 when its phones were catching on fire, and as United...more
The Federal Trade Commission (FTC) recently published a reminder to debt collectors of the Fair Debt Collection Practices Act (FDCPA) compliance risks that are created by the use of social media or text messages in connection...more
A new report released by Osterman Research, sponsored by Actiance, GWAVA and Smarsh, tells us that social media is one of the biggest security threats for companies. Malware is increasingly making its way into companies via...more
Communication via social media is now standard practice, to some extent, at almost all public companies. What once seemed limited to technology and other “forward-thinking” companies has now made its way into the even the...more
In the past five years, employers both big and small have become accustomed to social media and increased technology in the workplace. Everyone and their parents are on Facebook, and one cannot go anywhere without being asked...more
There's much to be sorted out at the intersection of social media and the law, as evidenced by the following collection of popular reads on JD Supra....more