from-tgc

Lawsuit Alleges Abandoned Oil Wells Leak Toxic Gases and Wastewater

Lawsuit Alleges Abandoned Oil Wells Leak Toxic Gases and Wastewater

Explore Chevron’s claim that it is plugging abandoned oil wells that leak rusty, contaminated wastewater and toxic gases without a court order.

Amazon Case Previews Regulatory Enforcement After Loper Bright

Amazon Case Previews Regulatory Enforcement After Loper Bright

Read how regulatory enforcement after Loper Bright is evolving after the DC Circuit’s Amazon ruling rejects agency deference, setting a precedent.

New Financial Incentives For Whistleblowers

New Financial Incentives For Whistleblowers

Discover why new financial incentives for whistleblowers may call for enhanced internal investigation procedures to handle a flood of allegations.

Can Salary Be a Surrogate for FLSA Overtime Exemptions?

Can Salary Be a Surrogate for FLSA Overtime Exemptions?

 Understand why salary as a stand-in for Fair Labor Standards AUnderstand why salary as a stand-in for FLSA overtime exemptions (executive, administrative, or professional) could split the US Supreme Court.

Key Compliance Requirements for EU Regulatory Changes in 2024 and Beyond

Key Compliance Requirements for EU Regulatory Changes in 2024 and Beyond

Stay ahead of EU regulatory changes with insights on key compliance directives, from sustainability reporting to AI oversight, impacting businesses in 2024.

Legal and Compliance Strategies for Managing Risks in Renewable Energy Projects

Legal and Compliance Strategies for Managing Risks in Renewable Energy Projects

Discover how developers can manage the evolving risks in renewable energy projects, from supply chain challenges to compliance with the Inflation Reduction Act.

How Canada's Cybersecurity Strategy Addresses Remote Work, Aging Infrastructure

How Canada’s Cybersecurity Strategy Addresses Remote Work, Aging Infrastructure

Discover how Canada’s cybersecurity strategy will make hybrid work more secure and create a security operations center to monitor cloud-connected devices.

Supply Chain Cyberattacks Leverage Trust Relationships Between Companies

Supply Chain Cyberattacks Leverage Trust Relationships Between Companies

Learn how supply chain cyberattacks use the trust between companies that share software to find and exploit weaknesses in their mutual cybersecurity.

Massive Increase In Cyber Threats Fueled By Use of Unsecured Work-From-Home Devices

Massive Increase In Cyber Threats Fueled By Use of Unsecured Work-From-Home Devices

Read how cyber threats have risen 400% since the pandemic, mostly because of unsecured work-from-home devices and networks.

Supply Chain Cybersecurity Rule One: Take a Hard Look at Your Suppliers

Supply Chain Cybersecurity Rule One: Take a Hard Look at Your Suppliers

Read how supply chain cybersecurity isn’t just about defenses. Professor SK Jeong says vulnerabilities often lie with your suppliers.

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top