Risk Management

FDIC Proposes New Rule to Regulate Bank-Fintech Custodial Deposit Accounts

FDIC Proposes New Rule to Regulate Bank-Fintech Custodial Deposit Accounts

Learn about a new FDIC-proposed rule targeting bank-fintech custodial accounts with stricter recordkeeping, reconciliations, and compliance reporting regulations.

Human Rights in Supply Chains: ESG Regulations and Compliance Strategies

DOJ Files $100M Lawsuit Against Ship Owner for Francis Scott Key Bridge Collapse

Read more about The Department of Justice’s $100M claim against ship owners for the Francis Scott Key Bridge collapse, which killed six, citing negligence and reckless conduct.

Analyzing the Supreme Court Ruling on the Time Bar and Copyright Infringement Claims

Analyzing the Supreme Court Ruling on the Time Bar and Copyright Infringement Claims

Learn what you and your organization should know about copyright infringement claims and the recent Supreme Court ruling on time bars.

How Companies Should Mitigate the Risks of Digital Accessibility Litigation

How Companies Should Mitigate the Risks of Digital Accessibility Litigation

Learn what steps your company should take to mitigate the risks of digital accessibility litigation.

Key Compliance Requirements for EU Regulatory Changes in 2024 and Beyond

Key Compliance Requirements for EU Regulatory Changes in 2024 and Beyond

Stay ahead of EU regulatory changes with insights on key compliance directives, from sustainability reporting to AI oversight, impacting businesses in 2024.

Legal and Compliance Strategies for Managing Risks in Renewable Energy Projects

Legal and Compliance Strategies for Managing Risks in Renewable Energy Projects

Discover how developers can manage the evolving risks in renewable energy projects, from supply chain challenges to compliance with the Inflation Reduction Act.

Supply Chain Cybersecurity Rule One: Take a Hard Look at Your Suppliers

Supply Chain Cybersecurity Rule One: Take a Hard Look at Your Suppliers

Read how supply chain cybersecurity isn’t just about defenses. Professor SK Jeong says vulnerabilities often lie with your suppliers.

CrowdStrike Outage Highlights the Vulnerability of Digital Ecosystems

CrowdStrike Outage Highlights the Vulnerability of Digital Ecosystems

Explore how the use of AI in a company’s system amplifies the vulnerability of digital ecosystems and networks, as exemplified by the CrowdStrike incident.

successful partnership

Enhancing Cross-Departmental Collaboration for Improved Risk Management

Discover how shared technology systems can strengthen cross-departmental collaboration and improve risk management and compliance in your organization.

research experiment and medical trial being done by a scientist

Provider Consolidation Is Driving Litigation In Healthcare Data Breach Lawsuits

Read how provider consolidation ups the ante for healthcare data breach lawsuits and why settlement is the preferred option for resolution.

Get our free daily newsletter

Subscribe for the latest news and business legal developments.

Scroll to Top