Hill Country Authors – Exploring the Challenges of a Green Transition with Tom Ortiz
Compliance Tip of the Day: Key M&A Enforcement Actions
AI Today in 5: August 5, 2025, The AI at the SEC Episode
From the Editor’s Desk: Compliance Week’s Insights and Reflections from July to August 2025
10 For 10: Top Compliance Stories For the Week Ending July 19, 2025
Daily Compliance News: July 18, 2025, The Don’t Alter Docs Edition
Five Tips for a New Public Company Director
Compliance Tip of the Day: New FCPA Enforcement Memo - What Does it Say?
Compliance into the Weeds: Changes in FCPA Enforcement
The LathamTECH Podcast — Where Digital Assets Slot Into a Shifting Fintech Regulatory Landscape: Insights From the US, UK, and EU
10 For 10: Top Compliance Stories For the Week Ending May 17, 2025
Daily Compliance News: May 13, 2025, The Leaving on a Jet Plane Edition
Everything Compliance: Episode 153, The CW 25 Edition
Navigating the Future of Payment Stablecoins: Legislative Updates and Market Implications — The Crypto Exchange Podcast
Daily Compliance News: April 22, 2025, The Upping Your Game Edition
Daily Compliance News: April 9, 2025, The Corruption at the DOJ Edition
10 For 10: Top Compliance Stories For The Week Ending April 5, 2025
Daily Compliance News: April 4, 2025, The Tariffs on Penguins Edition
Daily Compliance News: April 3, 2025, The Tribute to Ice Edition
Like a health inspection sticker in a restaurant’s front window, a GLBA privacy notice must provide clear and conspicuous disclosures about a financial institution’s practices relating to nonpublic personal information (NPI)....more
Orrick Partner Beth McGinn joins RegFi co-hosts Jerry Buckley and Sasha Leonhardt for our second episode focused on the proposed American Privacy Rights Act and its potential impact on the financial services industry. Beth...more
Key Point: The Federal Trade Commission (FTC) has amended the Safeguards Rule to require non-banking financial institutions to inform the FTC within 30 days of discovering any unauthorized acquisition of unencrypted customer...more
For years, federal cyber policy has been based on successful public-private partnerships, collaboration, and the promotion of voluntary standards that can be tailored to sector and organization-specific risk and needs....more
In today’s world, cybersecurity breaches and threats are pervasive concerns for any business entity, without exception. Working from home arrangements due to COVID-19 constraints only magnify the risk and create further...more