AI Today in 5: August 5, 2025, The AI at the SEC Episode
From the Editor’s Desk: Compliance Week’s Insights and Reflections from July to August 2025
10 For 10: Top Compliance Stories For the Week Ending July 19, 2025
Daily Compliance News: July 18, 2025, The Don’t Alter Docs Edition
Five Tips for a New Public Company Director
Compliance Tip of the Day: New FCPA Enforcement Memo - What Does it Say?
Compliance into the Weeds: Changes in FCPA Enforcement
The LathamTECH Podcast — Where Digital Assets Slot Into a Shifting Fintech Regulatory Landscape: Insights From the US, UK, and EU
10 For 10: Top Compliance Stories For the Week Ending May 17, 2025
Daily Compliance News: May 13, 2025, The Leaving on a Jet Plane Edition
Everything Compliance: Episode 153, The CW 25 Edition
Navigating the Future of Payment Stablecoins: Legislative Updates and Market Implications — The Crypto Exchange Podcast
Daily Compliance News: April 22, 2025, The Upping Your Game Edition
Daily Compliance News: April 9, 2025, The Corruption at the DOJ Edition
10 For 10: Top Compliance Stories For The Week Ending April 5, 2025
Daily Compliance News: April 4, 2025, The Tariffs on Penguins Edition
Daily Compliance News: April 3, 2025, The Tribute to Ice Edition
Great Women in Compliance: The Future of Enforcement with Jennifer Lee
Regulatory Ramblings: Episode 65 – The Trump Administration’s Decision to Halt FCPA Enforcement – The Implications for Asia and the World with Tom Fox, Malcolm Nance, and Philip Rohlik
The SEC’s amended Regulation S-P, adopted last year, will soon enhance data privacy protections for broker-dealers, investment companies, registered investment advisors, and transfer agents. The updated rule requires these...more
Data breaches made headlines throughout 2024, affecting governments, health care groups, and telecoms. Follow-on litigation has kept pace. Nearly 4,000 class actions involving data privacy issues are estimated to be filed in...more
Threat actors are evolving. Our Privacy, Cyber & Data Strategy Team explains how ransomware gangs have changed their tactics and how companies can respond to the threat while navigating new scrutiny from investors and...more
A flurry of legislative activity over the past year has brought meaningful changes to a variety of privacy and security provisions in state and federal law. At the state level, as in 2022, we have seen a handful of changes to...more
The year 2022 saw a groundswell of interest in privacy rights and related legislation. Five states enacted new laws or regulations aimed at protecting a general right to privacy, while the U.S. government came closer than...more
The Federal Trade Commission (“FTC”) announced on Monday that it is settling a case against Drizly and its CEO stemming from a 2020 data breach that impacted roughly 2.5 million consumers. The proposed order not only...more
The disposal of hardware in the wrong manner can leave an organization offside its regulatory obligations under privacy legislation. Depending on the residence of the individuals or entities whose personal data is stored by...more
The month of March has seen significant developments in the cybersecurity and data protection space. Here are four key legal developments that could be critical to your business. . . ...more
The close of 2019 witnessed a significant development in data security law that impacts companies regulated with respect to or engaged in the trading of public securities, as well as those companies that provide services to...more
In the aftermath of the Securities and Exchange Commission’s (“SEC”) latest Report of Investigation (“Report”) regarding cyberattacks via “spoofed or manipulated electronic communications,” companies should prepare to adjust...more
On February 21, 2018, the U.S. Securities and Exchange Commission (SEC) issued updates to its interpretive guidance on how public companies should disclose cybersecurity breaches and risks. There are two core messages at...more
The SEC announced last week that an investment adviser had agreed to settle charges that it failed to take required steps to protect against and respond effectively to a cybersecurity breach. The action comes on the heels of...more