10 For 10: Top Compliance Stories For the Week Ending August 23, 2025
AI Today in 5: August 22, 2025, The Angst Episode
Compliance into the Weeds: The Dark Side of AI in Employee Training
Compliance Tip of the Day: AI Assistant for Compliance
Compliance Tip of the Day: Co-Thinking with AI
Compliance Tip of the Day: AI, Continuous Monitoring and Compliance
Money-Saving Licensing Tips for Startups
Just Press "Play"
Lawyers Beware: There Could Be Serious Ethics Issues With The New AI Browsers
Project Catalyst an Economic Development Video Podcast | Episode 16: Powering Alabama’s Economic Progress with Leigh Davis of Alabama Power Company
LathamTECH in Focus: Navigating National Security: The Impact of FDI Reviews on Tech M&A
Podcast - Ejecución de facturas electrónicas
The Privacy Insider Podcast Episode 16: Protecting Privacy at Every Walk of Life with France Bélanger and Donna Wertalik of Virginia Tech
Julie Mortimer of Mills & Reeve on The Right Way to Kickstart Your CRM Strategy - Passle's CMO Series Podcast EP176
Sunday Book Review: July 20, 2025, The Best Books on Business Edition
Hospice Insights Podcast - AI in Action: Exploring How AI Is Helping Hospices Do Things in New Ways
Empowerment Through Hero Generation with Nicole a`Beckett and Dr. Shruti Roy
How to Rank in the Age of AI Search: On Record PR
SBR-Authors Podcast: A Journey Through Memoir, Technology, and Grief with Tony Stewart
Episode 373 -- Christian Focacci on Current Developments in AI and Risk Management
Encryption is one of several cornerstones of a robust information security program. Articles on quantum computing often include the compelling narrative that encryption is at risk, but as with any revolutionary technology,...more
In the final days of the Biden Administration, the US Department of Health and Human Services (HHS) Office for Civil Rights (OCR) issued a notice of proposed rulemaking (NPRM) to modify the Security Rule under the Health...more
The most pressing question around the new FIRRMA regulations is “Will my transaction be covered?” To provide a bit of guidance on that point, we present an illustration from our upcoming Second Edition of The CFIUS Book due...more
The good news is that, for the most part, State resisted the temptation to do something just a little different in the ITAR regulation, so the joint Commerce-State solution works. The chart below provides a quick side-by-side...more
On November 29, 2018, in a speech at the Georgetown University Law School, Deputy Attorney General Rod Rosenstein renewed his call for tech companies to build into their products the means for law enforcement to legally...more
Content owners and their attorneys have been enthusiastically anticipating the use of blockchain as a mechanism for royalty accounting, recording the chain of title of intellectual property interests, and protecting, tracking...more
In a precedential ruling, the Third Circuit Court of Appeals this week upheld a lower court’s ruling holding a criminal defendant in contempt for refusing to decrypt two external hard drives that were seized during a child...more
On September 20, 2016, the Bureau of Industry and Security (BIS) of the U.S. Commerce Department amended the Export Administration Regulations (EAR) and the list of goods, software and technology that are controlled under the...more
The promise of blockchain technology for the music industry is its ability to solve the problem of “shared facts” and to provide transparency in real time or near-real time. Advancing digital technology has created new...more
Encryption seems to be in the news quite a bit lately. Electronic retailers and government organizations have become targets of computer hackers across the globe, attacking their servers and obtaining sensitive information...more
The U.S. Department of Commerce Bureau of Industry and Security (BIS) recently published a proposed rule enhancing controls on certain cybersecurity items under the Export Administration Regulations (EAR). Specifically, the...more
The Financial Industry Regulatory Authority (FINRA) agreed to settle its enforcement action with Sterne Agee & Leach, Inc. (Sterne) this week for $225,000. The enforcement action followed the loss of an unencrypted laptop by...more
In September 2014, Apple introduced a new mobile-operating system called iOS8. iOS8 offers enhanced data-encryption protection to Apple users and the content stored on their mobile devices. Apple's advancements in...more
Increasingly interconnected global businesses need to focus on how export controls and trade sanctions can affect their cross-border activities in unexpected ways. For decades, the US Government has used trade...more
The Bureau of Industry and Security (BIS) recently issued a $750,000 fine against an Intel subsidiary for the unlawful exportation of software products that enable encryption. This is a sharp departure from BIS’s historical...more
As technology developers continue to push the envelope on services and applications affecting the daily lives of consumers, the intersection of technology and privacy is becoming increasingly fraught with legal implications...more