The End of Whac-A-Mole Compliance: A Global Approach to Anti-Corruption Actions
02 December 2014
In light of China’s significant crackdown on corruption, targeting foreign and domestic companies, it is clear that the approach most companies take to FCPA compliance will no longer suffice. Rather than jumping from jurisdiction to jurisdiction to address potential issues, companies need to implement a well-designed compliance program to ensure that they do not become targets in countries that are following China’s lead and stepping up enforcement. Learn more in “The End of Whac-A-Mole Compliance: A Global Approach to Anti-Corruption Actions,” co-authored by San Francisco Partner Aaron Murphy and Daniel Seltzer.
Reprinted with permission from the Association of Corporate Counsel, © 2014. All Rights Reserved. www.acc.com
Reprinted with permission from the Association of Corporate Counsel, © 2014. All Rights Reserved. www.acc.com
Related Insights
27 May 2025
Events
The RIF Roadmap: Tools and Tactics for a Smooth and Compliant Transition
Join us for an insightful discussion on proactive workforce planning in today's dynamic economic and regulatory landscape.
16 May 2025
Manufacturing Industry Advisor
Reese’s Law: The Evolving Regulatory and Enforcement Landscape for Consumer Products Containing Button Cell or Coin Batteries
Over the past year, manufacturers, importers, distributors, and retailers of consumer products containing button cell and coin batteries (or products intended to contain them) have continued to adapt to the requirements of Reese’s Law and the Consumer Product Safety Commission’s corresponding enforcement efforts.
29 May 2025
Events
May 2025 Midwest Cyber Security Alliance Meeting | What Happens After a Breach: Practical Tips for the Notification Process
Join us on Thursday, May 29, 2025, at the next Midwest Cyber Security Alliance Meeting. Brandon Hollinder, Esq., and Adam Botter from Epiq will provide practical tips and insights on organizing the data mining and subsequent notification process after a cybersecurity breach.