Risk Management

Lehigh Valley Health Network Agrees To Settle Class Action Over Ransomware Attack

Lehigh Valley Health Network Agrees To Settle Class Action Over Ransomware Attack

Lehigh Valley Health Network settles a class action for $65 million after a ransomware attack exposed patient data, including sensitive medical records and images.

Unmanaged Devices Are a Growing Security Risk

Unmanaged Devices Are a Growing Security Risk

Unmanaged devices pose a serious security risk. Discover how companies can pass audits and security assessments without addressing their risks.

Infosys McCamish Settles Class Actions Over 2023 Ransomware Attack

Infosys McCamish Settles Class Actions Over 2023 Ransomware Attack

Learn about Infosys McCamish’s settlement of lawsuits over a ransomware attack that exposed the data of over 6 million individuals.

Compliance Considerations for Updated SEC Marketing Rule Guidance

Compliance Considerations for Updated SEC Marketing Rule Guidance

Read more about the Securities and Exchange Commission (SEC) Marketing Rule updates that clarify performance data use in ads, easing compliance burdens for advisers while reinforcing disclosure expectations.

Latest CTA Update: FinCEN Narrows Corporate Transparency Act Scope

Latest CTA Update: FinCEN Narrows Corporate Transparency Act Scope

What’s next for CTA compliance? Learn more about FinCEN’s new rule that narrows the Corporate Transparency Act, exempting most US entities from reporting.

Federal Contractor Minimum Wage and Labor Policies Continue to Shift: Key Implications for Compliance

Federal Contractor Minimum Wage and Labor Policies Continue to Shift: Key Implications for Compliance

Read how President Trump rescinded the federal contractor minimum wage EO, sparking compliance challenges amongst shifting pay and regulatory requirements.

How AI, Data, and Collaboration Are Reshaping Legal Ops in 2025

How AI, Data, and Collaboration Are Reshaping Legal Ops in 2025

AI, data, and collaboration are redefining legal ops in 2025. Learn how they are driving efficiency and strategy for corporate legal departments.

A Structured Three-Phase Approach to Vendor Management

A Structured Three-Phase Approach to Vendor Management

Discover how legal ops can use a structured three-phase approach to vendor management through engagement, enforcement, and an examination of data-driven insights.

FTC Enforcement in Digital Health: Past Trends and Future Implications

FTC Enforcement in Digital Health: Past Trends and Future Implications

FTC enforcement of digital health data is evolving, but scrutiny remains high. Read how companies must ensure compliance to avoid penalties and reputational risks.

Hackers Still Exploiting Google Calendar in Phishing and Malware Attacks

Hackers Still Exploiting Google Calendar in Phishing and Malware Attacks

Learn more about how hackers use Google Calendar to spread malware through fake invites and phishing links, tricking users into revealing personal information.

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top